IOC Report
End of Year Accounting for The Estate of Janet Delesanti-2.pdf

loading gif

Files

File Path
Type
Category
Malicious
End of Year Accounting for The Estate of Janet Delesanti-2.pdf
PDF document, version 1.7 (zip deflate encoded)
initial sample
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State~RF6b4127.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\a1dbb0a3-3c1f-4f51-b02f-517ea9075ddc.tmp
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\a492d5f3-9319-408c-9a52-3f2f2fb2ea2c.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db
SQLite 3.x database, last written using SQLite version 3040000, writer version 2, read version 2, file counter 1, database pages 1, cookie 0, schema 0, unknown 0 encoding, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db-shm
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\CreativeCloud\CoreSync\EntitySync-2024-12-24.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\RFL\LocalMapping\RFLDB230
SQLite 3.x database, last written using SQLite version 3040000, file counter 1, database pages 8, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\RFL\LocalMapping\RFLDB230-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-241224150903Z-555.bmp
PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 15, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 15
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Reader\Synchronizer\metadata\Synchronizer
SQLite 3.x database, last written using SQLite version 3040000, file counter 1, database pages 23, cookie 0x11, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Reader\Synchronizer\metadata\Synchronizer-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.5744
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AdobeFnt23.lst.5744
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 29, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 29
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.bin
data
dropped
C:\Users\user\AppData\Local\Temp\MSIabe99.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-12-24 10-09-00-538.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\40a3e4bb-0299-4d18-a1ca-dda1d161d51c.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\c989032e-e035-4212-8d55-689592bdd81e.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\e7fa39ca-df79-4df8-8d51-50dea4d63ed8.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\eec36a48-6e70-4061-8678-51a61da4cb5d.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\JSCache\GlobSettings
ASCII text
dropped
There are 51 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\End of Year Accounting for The Estate of Janet Delesanti-2.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=2084
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=7240
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=7340
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=7440
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=7540
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=7652
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2100 --field-trial-handle=1564,i,18128779800940889394,7499666708693846813,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Program Files\Adobe\Acrobat DC\Acrobat\RDCNotificationClient\FullTrustNotifier.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\RDCNotificationClient\FullTrustNotifier.exe" GetChannelUri
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://x1.i.lencr.org/
unknown
https://comments.adobe.
unknown
https://comments.adobe.r
unknown
https://wns.windows.com/1
unknown
https://android.notify.windows.com/iOSh
unknown
https://comments.adobe.i6g
unknown
https://android.notify.windows.com/iOS
unknown
https://comments.hZ
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppt
unknown

Domains

Name
IP
Malicious
x1.i.lencr.org
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\Privileged
syncFolderSetupDone
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Synchronizer\DC\Acrobat.com
tUniqueIdForEureka
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Synchronizer\DC\WebSocketNotifInfra
bisWSExpEnabled
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
21F98FBC000
heap
page read and write
1FA64E1D000
heap
page read and write
2DACA701000
heap
page read and write
1BE74BE5000
heap
page read and write
1FA64B78000
heap
page read and write
98F41FE000
stack
page read and write
B3DFFD000
stack
page read and write
1FA64BE6000
heap
page read and write
274C0F96000
heap
page read and write
1FA64B70000
heap
page read and write
2DACA870000
heap
page read and write
21F98FB2000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64BE6000
heap
page read and write
1A1F2285000
heap
page read and write
1FA64B6C000
heap
page read and write
1FA64E21000
heap
page read and write
15A7BD81000
heap
page read and write
1FA64B28000
heap
page read and write
1FA64B6C000
heap
page read and write
1A36F4EA000
heap
page read and write
1BE74C3D000
heap
page read and write
1FA64B4E000
heap
page read and write
1A1F2415000
heap
page read and write
1FA64E1E000
heap
page read and write
98F43FE000
stack
page read and write
1BE74BF4000
heap
page read and write
21F98FA9000
heap
page read and write
5EA0AF9000
stack
page read and write
21F98F92000
heap
page read and write
1FA64E76000
heap
page read and write
1A36F4E4000
heap
page read and write
2DACA767000
heap
page read and write
274C0FAA000
heap
page read and write
2B606E85000
heap
page read and write
274C0F98000
heap
page read and write
21F98FA2000
heap
page read and write
1FA64E50000
heap
page read and write
1FA62E4F000
heap
page read and write
2B606E95000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64E64000
heap
page read and write
1BE74C12000
heap
page read and write
1B429518000
heap
page read and write
1FA64E76000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA62F35000
heap
page read and write
1BE74BD0000
heap
page read and write
EB5F5FE000
stack
page read and write
1FA64BE6000
heap
page read and write
1BE74A80000
heap
page read and write
1A1F2410000
heap
page read and write
1FA64E6A000
heap
page read and write
1BE74C4B000
heap
page read and write
1FA64E4C000
heap
page read and write
21F98FB8000
heap
page read and write
2B606EC1000
heap
page read and write
21F98FDC000
heap
page read and write
15A7BD77000
heap
page read and write
1FA64E33000
heap
page read and write
1E647424000
heap
page read and write
1A1F22BD000
heap
page read and write
1BE74C1C000
heap
page read and write
1FA62E65000
heap
page read and write
1FA64E30000
heap
page read and write
1FA62E65000
heap
page read and write
1FA64E76000
heap
page read and write
2B606EA3000
heap
page read and write
21F99220000
heap
page read and write
1BE74C1C000
heap
page read and write
1FA62EF1000
heap
page read and write
2DACA688000
heap
page read and write
1A1F22AE000
heap
page read and write
2DACA70A000
heap
page read and write
1A36F4FD000
heap
page read and write
1FA62E65000
heap
page read and write
1FA64B91000
heap
page read and write
1FA64E66000
heap
page read and write
1FA64B6C000
heap
page read and write
1FA64B28000
heap
page read and write
1FA64E64000
heap
page read and write
1FA64E6A000
heap
page read and write
3AD3FE000
stack
page read and write
1E647330000
heap
page read and write
1FA64E30000
heap
page read and write
1B4294EF000
heap
page read and write
1A1F228B000
heap
page read and write
1FA64E30000
heap
page read and write
1A1F2283000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64B42000
heap
page read and write
B3DAFE000
stack
page read and write
1FA64E21000
heap
page read and write
274C1015000
heap
page read and write
1B429760000
heap
page read and write
1BE749A0000
heap
page read and write
21F98FF3000
heap
page read and write
1FA64E76000
heap
page read and write
34522FE000
stack
page read and write
1FA62E4F000
heap
page read and write
274C0F90000
heap
page read and write
1E647457000
heap
page read and write
146EF1F0000
heap
page read and write
1E647472000
heap
page read and write
1FA64BC5000
heap
page read and write
1A1F22DF000
heap
page read and write
1FA64B91000
heap
page read and write
1A36F4E1000
heap
page read and write
15A7BD76000
heap
page read and write
15A7BDCA000
heap
page read and write
1FA64E6A000
heap
page read and write
15A7BDCA000
heap
page read and write
1FA64E4C000
heap
page read and write
1A36F460000
heap
page read and write
274C0EC0000
heap
page read and write
1B4293D0000
heap
page read and write
1B42B340000
heap
page read and write
1B429522000
heap
page read and write
1FA64E21000
heap
page read and write
1BE74C00000
heap
page read and write
21F99050000
heap
page read and write
1BE74C17000
heap
page read and write
1FA64B70000
heap
page read and write
1B429765000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64BE6000
heap
page read and write
1A36F50A000
heap
page read and write
274C1015000
heap
page read and write
1FA64E74000
heap
page read and write
1FA62D00000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64B4B000
heap
page read and write
1FA64B42000
heap
page read and write
1FA64E33000
heap
page read and write
2B606E77000
heap
page read and write
21F98F38000
heap
page read and write
1BE74BF7000
heap
page read and write
1A1F22AB000
heap
page read and write
15A7BDF5000
heap
page read and write
21F98FC7000
heap
page read and write
298D000
stack
page read and write
1A1F22A6000
heap
page read and write
1FA64E6A000
heap
page read and write
797DBFF000
stack
page read and write
1FA64B42000
heap
page read and write
1FA64B42000
heap
page read and write
15A7BD78000
heap
page read and write
1BE74BE5000
heap
page read and write
225E000
stack
page read and write
EB5EEFC000
stack
page read and write
2B606E98000
heap
page read and write
2B606DD0000
heap
page read and write
1FA62EF1000
heap
page read and write
1E647370000
heap
page read and write
1BE74C10000
heap
page read and write
5EA0CFE000
stack
page read and write
1B429500000
heap
page read and write
1FA64BAD000
heap
page read and write
2DACA767000
heap
page read and write
1A1F2294000
heap
page read and write
1E647484000
heap
page read and write
2DACA746000
heap
page read and write
1FA64CC0000
heap
page read and write
1FA64E21000
heap
page read and write
1FA64B04000
heap
page read and write
1A1F2283000
heap
page read and write
1FA64B28000
heap
page read and write
1A1F2218000
heap
page read and write
1E6473FD000
heap
page read and write
1FA64E76000
heap
page read and write
1FA64B47000
heap
page read and write
1BE74BFD000
heap
page read and write
1FA64E54000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64E30000
heap
page read and write
25CF000
stack
page read and write
1B4294DE000
heap
page read and write
146ED3B0000
heap
page read and write
1FA64E50000
heap
page read and write
1FA64E30000
heap
page read and write
221E000
stack
page read and write
2DACA734000
heap
page read and write
EB5EBFE000
stack
page read and write
5EA0EFF000
stack
page read and write
1E647440000
heap
page read and write
1BE74C10000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64B42000
heap
page read and write
1E64740F000
heap
page read and write
1E647426000
heap
page read and write
1FA64E21000
heap
page read and write
1FA64E4C000
heap
page read and write
1A1F22AE000
heap
page read and write
21F98FF3000
heap
page read and write
274C0FC0000
heap
page read and write
1E647457000
heap
page read and write
1B4294E5000
heap
page read and write
21DC000
stack
page read and write
910E9FF000
stack
page read and write
1FA64BE6000
heap
page read and write
1FA64B56000
heap
page read and write
1FA62E9E000
heap
page read and write
1FA64B47000
heap
page read and write
DA29FE000
stack
page read and write
15A7BD8C000
heap
page read and write
2B606E7E000
heap
page read and write
1A1F2283000
heap
page read and write
C6142F9000
stack
page read and write
1B429477000
heap
page read and write
1FA64BE6000
heap
page read and write
274C1003000
heap
page read and write
1E6473F8000
heap
page read and write
1A36F4FB000
heap
page read and write
1FA64E22000
heap
page read and write
2DACA6F0000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64E76000
heap
page read and write
1FA64E74000
heap
page read and write
2B606ED5000
heap
page read and write
4FD000
stack
page read and write
1FA64E76000
heap
page read and write
2B606E79000
heap
page read and write
1E647457000
heap
page read and write
2B606E7E000
heap
page read and write
1A36F4ED000
heap
page read and write
1B4294E4000
heap
page read and write
1FA64B4E000
heap
page read and write
1FA64E4C000
heap
page read and write
15A7BD6E000
heap
page read and write
2B606ED5000
heap
page read and write
DA2DFE000
stack
page read and write
1A1F22D8000
heap
page read and write
1FA64E1D000
heap
page read and write
EB5F1FF000
stack
page read and write
1FA64E4C000
heap
page read and write
1FA64E6A000
heap
page read and write
1B429538000
heap
page read and write
1FA64E33000
heap
page read and write
1FA64E30000
heap
page read and write
2DACAA85000
heap
page read and write
1FA64E30000
heap
page read and write
146ED46B000
heap
page read and write
1FA64E74000
heap
page read and write
98F40FE000
stack
page read and write
1FA64E21000
heap
page read and write
B3DCFE000
stack
page read and write
1E64740C000
heap
page read and write
1FA64E74000
heap
page read and write
21F98FB2000
heap
page read and write
DA2FFD000
stack
page read and write
1BE74BFA000
heap
page read and write
3ACDFE000
stack
page read and write
910ECFD000
stack
page read and write
15A7BB50000
heap
page read and write
1BE74C13000
heap
page read and write
2B606EC3000
heap
page read and write
2B606ED8000
heap
page read and write
1FA64E76000
heap
page read and write
3ACFFF000
stack
page read and write
1FA64E33000
heap
page read and write
1E64741A000
heap
page read and write
3AD1FE000
stack
page read and write
1FA64E30000
heap
page read and write
1FA64E33000
heap
page read and write
1A1F228B000
heap
page read and write
1A1F227C000
heap
page read and write
1FA64E21000
heap
page read and write
1FA64E21000
heap
page read and write
274C0F20000
heap
page read and write
910EAFE000
stack
page read and write
1FA64E4C000
heap
page read and write
1B429544000
heap
page read and write
274C0FC3000
heap
page read and write
1B4294EF000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64E76000
heap
page read and write
1FA64E66000
heap
page read and write
EB5E8FE000
stack
page read and write
2B607140000
heap
page read and write
1FA64B91000
heap
page read and write
274C0EC5000
heap
page read and write
1FA64B4E000
heap
page read and write
2DACA6F3000
heap
page read and write
1A36F440000
heap
page read and write
1FA64B28000
heap
page read and write
1B4294FB000
heap
page read and write
274C0FAB000
heap
page read and write
797DEFD000
stack
page read and write
2DACA757000
heap
page read and write
1FA64B78000
heap
page read and write
1FA64E6A000
heap
page read and write
1A1F22AB000
heap
page read and write
1FA62E9E000
heap
page read and write
1E6473FB000
heap
page read and write
1B429509000
heap
page read and write
2B606EC1000
heap
page read and write
1FA62E4F000
heap
page read and write
1FA64E6A000
heap
page read and write
1FA64E30000
heap
page read and write
1A36F507000
heap
page read and write
280D000
stack
page read and write
1FA64E4C000
heap
page read and write
274C0F93000
heap
page read and write
1A36F4E3000
heap
page read and write
1FA62E9E000
heap
page read and write
E343BFE000
stack
page read and write
1A36F4FE000
heap
page read and write
1FA64E4C000
heap
page read and write
1A1F22C2000
heap
page read and write
146ED320000
heap
page read and write
1A1F227D000
heap
page read and write
274C0FF0000
heap
page read and write
1A36F4DA000
heap
page read and write
2ACE000
stack
page read and write
2B606E7E000
heap
page read and write
15A7BDA5000
heap
page read and write
1FA64E76000
heap
page read and write
284B000
stack
page read and write
1FA64E4C000
heap
page read and write
2DACA738000
heap
page read and write
1B429531000
heap
page read and write
2DACA73A000
heap
page read and write
1BE74D10000
heap
page read and write
1006FF000
stack
page read and write
146ED3BC000
heap
page read and write
1BE74BFC000
heap
page read and write
1FA64E66000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64B28000
heap
page read and write
EB5EDFE000
stack
page read and write
1FA64E30000
heap
page read and write
146EF2F4000
heap
page read and write
1FA64E30000
heap
page read and write
910EDFE000
stack
page read and write
15A7BDF5000
heap
page read and write
1FA64E33000
heap
page read and write
2B607145000
heap
page read and write
274C0FF0000
heap
page read and write
1FA64E6A000
heap
page read and write
15A7BD7B000
heap
page read and write
1A36F4E9000
heap
page read and write
1FA64B31000
heap
page read and write
2DACAA80000
heap
page read and write
1FA64B70000
heap
page read and write
21F98E50000
heap
page read and write
DA2AFE000
stack
page read and write
1FA64E74000
heap
page read and write
1FA64E21000
heap
page read and write
274C1015000
heap
page read and write
1BE74C04000
heap
page read and write
1FA64E64000
heap
page read and write
1FA64E21000
heap
page read and write
3ACEFE000
stack
page read and write
1FA64B47000
heap
page read and write
21F98FB1000
heap
page read and write
1FA64E33000
heap
page read and write
1FA64B47000
heap
page read and write
274C0FF0000
heap
page read and write
1A1F229A000
heap
page read and write
1A1F22AE000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64E4C000
heap
page read and write
1A36F4EA000
heap
page read and write
15A7BD81000
heap
page read and write
1FA64E22000
heap
page read and write
2B606ED8000
heap
page read and write
274C0FB2000
heap
page read and write
C6145FF000
stack
page read and write
15A7BDE2000
heap
page read and write
1FA64E30000
heap
page read and write
700000
heap
page read and write
1A1F2286000
heap
page read and write
1A1F22B3000
heap
page read and write
1FA64B50000
heap
page read and write
1A371230000
heap
page read and write
1FA64E30000
heap
page read and write
B3DBFE000
stack
page read and write
1BE74BFD000
heap
page read and write
274C0FBF000
heap
page read and write
2B606E74000
heap
page read and write
2DACA72F000
heap
page read and write
E343DFF000
stack
page read and write
EB5E9FE000
stack
page read and write
21F98FCD000
heap
page read and write
1A36F507000
heap
page read and write
15A7BD86000
heap
page read and write
2DACA718000
heap
page read and write
17C000
stack
page read and write
274C0FB7000
heap
page read and write
1E647404000
heap
page read and write
EB5F6ED000
stack
page read and write
1FA64E64000
heap
page read and write
1FA64E21000
heap
page read and write
1FA64E4C000
heap
page read and write
1B4294E7000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64E74000
heap
page read and write
5EA12FF000
stack
page read and write
15A7BD83000
heap
page read and write
21F98FFF000
heap
page read and write
2DACA735000
heap
page read and write
1FA64E4C000
heap
page read and write
21F98FEF000
heap
page read and write
1BE74C10000
heap
page read and write
1B42950A000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64E4C000
heap
page read and write
2DACA6EC000
heap
page read and write
2B606EC1000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA62F00000
heap
page read and write
EB5ECFE000
stack
page read and write
98F44FF000
stack
page read and write
1A1F22AF000
heap
page read and write
1BE74C07000
heap
page read and write
2DACA746000
heap
page read and write
1FA62E9E000
heap
page read and write
2DACA73A000
heap
page read and write
294D000
stack
page read and write
1BE74C15000
heap
page read and write
1FA64E66000
heap
page read and write
1BE74C09000
heap
page read and write
1E647484000
heap
page read and write
1FA64E4C000
heap
page read and write
21F99010000
heap
page read and write
2DACA767000
heap
page read and write
1FA64B10000
heap
page read and write
3451B79000
stack
page read and write
274C0F84000
heap
page read and write
1FA64E76000
heap
page read and write
1FA64E74000
heap
page read and write
2B606FD0000
heap
page read and write
21F98FF3000
heap
page read and write
C6144FE000
stack
page read and write
15A7BDB4000
heap
page read and write
1E6473EF000
heap
page read and write
15A7BD6B000
heap
page read and write
34524FD000
stack
page read and write
1FA64E33000
heap
page read and write
1B4293C0000
heap
page read and write
274C0FB5000
heap
page read and write
1BE74BFE000
heap
page read and write
1FA64E4C000
heap
page read and write
21F99225000
heap
page read and write
1A1F22AE000
heap
page read and write
2DACA718000
heap
page read and write
1FA64B0F000
heap
page read and write
2B607090000
heap
page read and write
1FA64B5A000
heap
page read and write
1FA64E33000
heap
page read and write
146ED2F0000
heap
page read and write
146ED418000
heap
page read and write
2DACA6EA000
heap
page read and write
2B606E88000
heap
page read and write
1FA64B6E000
heap
page read and write
1FA64E4C000
heap
page read and write
2B606E07000
heap
page read and write
1FA64B78000
heap
page read and write
1BE74C4B000
heap
page read and write
1B4294D5000
heap
page read and write
1FA64B5A000
heap
page read and write
1A36F520000
heap
page read and write
1009FB000
stack
page read and write
21F98FC1000
heap
page read and write
1B4294DD000
heap
page read and write
15A7BD45000
heap
page read and write
1FA64E64000
heap
page read and write
1A1F2282000
heap
page read and write
15A7BD70000
heap
page read and write
34521FE000
stack
page read and write
1E647402000
heap
page read and write
2B606E9D000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64C00000
unkown
page read and write
1FA64E4C000
heap
page read and write
274C1015000
heap
page read and write
1B42952E000
heap
page read and write
1FA64E21000
heap
page read and write
1FA64B5A000
heap
page read and write
2B606E81000
heap
page read and write
100BFF000
stack
page read and write
1FA64E76000
heap
page read and write
2DACA73A000
heap
page read and write
C6149FD000
stack
page read and write
1FA62E9E000
heap
page read and write
1B4294C1000
heap
page read and write
1FA64E6A000
heap
page read and write
EB5EAFD000
stack
page read and write
21F99022000
heap
page read and write
1E647463000
heap
page read and write
1FA64BE6000
heap
page read and write
1FA64E4C000
heap
page read and write
8FE000
stack
page read and write
1FA64E21000
heap
page read and write
1FA62E65000
heap
page read and write
1FA64E74000
heap
page read and write
1B429521000
heap
page read and write
1FA64E76000
heap
page read and write
26CE000
stack
page read and write
1FA64AF5000
heap
page read and write
229E000
stack
page read and write
1FA64B42000
heap
page read and write
1FA64E76000
heap
page read and write
1FA64E1D000
heap
page read and write
2DACA6F2000
heap
page read and write
1FA64B0F000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64B4E000
heap
page read and write
1A1F227C000
heap
page read and write
1FA64B31000
heap
page read and write
1FA64B78000
heap
page read and write
1FA64E76000
heap
page read and write
15A7BDF6000
heap
page read and write
B3DEFF000
stack
page read and write
1FA64AF6000
heap
page read and write
1A1F228B000
heap
page read and write
1FA64E1D000
heap
page read and write
1E647407000
heap
page read and write
B3DDFE000
stack
page read and write
1FA64B31000
heap
page read and write
1FA64B8F000
heap
page read and write
EB5F4FE000
stack
page read and write
1BE74BE9000
heap
page read and write
1FA64E64000
heap
page read and write
2DACA767000
heap
page read and write
1FA64E21000
heap
page read and write
5EA10FE000
stack
page read and write
3AD2FF000
stack
page read and write
1000F9000
stack
page read and write
1A36F4D8000
heap
page read and write
1B4293F0000
heap
page read and write
15A7BFE0000
heap
page read and write
1008FE000
stack
page read and write
1A1F225D000
heap
page read and write
EB5E4FE000
stack
page read and write
2DACA6FA000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64BDE000
heap
page read and write
EB5F8FF000
stack
page read and write
1FA64E33000
heap
page read and write
1A36F4EA000
heap
page read and write
1FA64B47000
heap
page read and write
274C0FCD000
heap
page read and write
274C0F9A000
heap
page read and write
1FA64AF0000
heap
page read and write
910EBFE000
stack
page read and write
1FA64B5A000
heap
page read and write
B3D8F9000
stack
page read and write
1FA62E9E000
heap
page read and write
797D9FE000
stack
page read and write
1FA64E21000
heap
page read and write
1A1F229B000
heap
page read and write
1FA64E33000
heap
page read and write
146ED413000
heap
page read and write
1A36F470000
heap
page read and write
1B4294D9000
heap
page read and write
1FA64E1F000
heap
page read and write
15A7BDAF000
heap
page read and write
1FA64E22000
heap
page read and write
1FA64E22000
heap
page read and write
1A1F229F000
heap
page read and write
1FA64E76000
heap
page read and write
6CE000
stack
page read and write
1E64740B000
heap
page read and write
1FA64E66000
heap
page read and write
1FA64E66000
heap
page read and write
797DDFE000
stack
page read and write
1BE74BE8000
heap
page read and write
1FA64E66000
heap
page read and write
EB5E10B000
stack
page read and write
1B429515000
heap
page read and write
1E647457000
heap
page read and write
21F98FA2000
heap
page read and write
1FA64E66000
heap
page read and write
1FA64E64000
heap
page read and write
274C0F82000
heap
page read and write
1FA64E30000
heap
page read and write
70A000
heap
page read and write
274C0E90000
heap
page read and write
1FA64E76000
heap
page read and write
1FA64B91000
heap
page read and write
1A1F2210000
heap
page read and write
1B4294F1000
heap
page read and write
1FA64BCE000
heap
page read and write
15A7BD77000
heap
page read and write
1FA64E76000
heap
page read and write
1FA64E6A000
heap
page read and write
1FA64B01000
heap
page read and write
21F98F95000
heap
page read and write
1FA64E61000
heap
page read and write
22C5000
heap
page read and write
1FA64E76000
heap
page read and write
1FA64E4C000
heap
page read and write
1A36F465000
heap
page read and write
1FA64E64000
heap
page read and write
1FA64B5A000
heap
page read and write
21F98FEF000
heap
page read and write
EB5EFFE000
stack
page read and write
146EF2F0000
heap
page read and write
2DACA734000
heap
page read and write
1FA64E66000
heap
page read and write
1FA64AF6000
heap
page read and write
1FA64E26000
heap
page read and write
98F45FD000
stack
page read and write
1FA64B4E000
heap
page read and write
15A7BC50000
heap
page read and write
274C0F85000
heap
page read and write
1A36F500000
heap
page read and write
2B606E6D000
heap
page read and write
274C0F90000
heap
page read and write
1B4294E5000
heap
page read and write
1FA64E76000
heap
page read and write
1FA64E76000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64E61000
heap
page read and write
1A1F22AB000
heap
page read and write
EB5F7ED000
stack
page read and write
100DF6000
stack
page read and write
1A1F22A8000
heap
page read and write
2DACA718000
heap
page read and write
EB5F2FE000
stack
page read and write
15A7BFE5000
heap
page read and write
1FA64B28000
heap
page read and write
3451FFE000
stack
page read and write
2DACA715000
heap
page read and write
1FA64B1A000
heap
page read and write
2B606E96000
heap
page read and write
1BE74BF4000
heap
page read and write
1FA64E4C000
heap
page read and write
1BE74C07000
heap
page read and write
1FA64E4C000
heap
page read and write
1E64742F000
heap
page read and write
274C0FBA000
heap
page read and write
1E647421000
heap
page read and write
1F0000
heap
page read and write
2DACA6E6000
heap
page read and write
1FA64E76000
heap
page read and write
EB5F6FC000
stack
page read and write
1FA62EF1000
heap
page read and write
1FA64E76000
heap
page read and write
1FA64E76000
heap
page read and write
2BCF000
stack
page read and write
1FA64E33000
heap
page read and write
274C0FAF000
heap
page read and write
274C0E80000
heap
page read and write
270E000
stack
page read and write
1FA64E1D000
heap
page read and write
21F98FCE000
heap
page read and write
1FA64E66000
heap
page read and write
1FA64B4E000
heap
page read and write
1FA62E4F000
heap
page read and write
1FA64B31000
heap
page read and write
1E64740D000
heap
page read and write
B3D9FE000
stack
page read and write
1BE74AA0000
heap
page read and write
1FA64E76000
heap
page read and write
146ED4A9000
heap
page read and write
1FA62E65000
heap
page read and write
1FA64B28000
heap
page read and write
1FA64E4C000
heap
page read and write
1B429544000
heap
page read and write
1A1F2080000
heap
page read and write
1FA64B50000
heap
page read and write
1FA64E30000
heap
page read and write
1FA64E33000
heap
page read and write
500000
heap
page read and write
1BE74C3E000
heap
page read and write
C614AFE000
stack
page read and write
1FA64B28000
heap
page read and write
2B606EC3000
heap
page read and write
1FA64B6E000
heap
page read and write
E3442FF000
stack
page read and write
2DACA700000
heap
page read and write
2DACA6FB000
heap
page read and write
2B606E00000
heap
page read and write
1A1F2280000
heap
page read and write
21F98FDF000
heap
page read and write
34525FF000
stack
page read and write
21F98FB4000
heap
page read and write
1BE74C1E000
heap
page read and write
1FA64E22000
heap
page read and write
21F99022000
heap
page read and write
1FA64B70000
heap
page read and write
1FA64E21000
heap
page read and write
1FA64B50000
heap
page read and write
2B606EBE000
heap
page read and write
1B429504000
heap
page read and write
1FA64BE6000
heap
page read and write
21F99022000
heap
page read and write
1BE74C4B000
heap
page read and write
1FA64E74000
heap
page read and write
15A7BD67000
heap
page read and write
15A7BDCA000
heap
page read and write
DA2CFE000
stack
page read and write
1FA62EF1000
heap
page read and write
1FA64B31000
heap
page read and write
1E64743D000
heap
page read and write
1FA64E80000
heap
page read and write
1A1F22A5000
heap
page read and write
1A1F228A000
heap
page read and write
1FA64E26000
heap
page read and write
910E6FF000
stack
page read and write
1FA64B70000
heap
page read and write
C6143FE000
stack
page read and write
2B606EC1000
heap
page read and write
1A36F4D5000
heap
page read and write
1E647398000
heap
page read and write
274C0F9A000
heap
page read and write
1E647411000
heap
page read and write
1FA64B1E000
heap
page read and write
21F98FB3000
heap
page read and write
1A1F22A2000
heap
page read and write
15A7BDF5000
heap
page read and write
1FA64B28000
heap
page read and write
1FA64E76000
heap
page read and write
34523FF000
stack
page read and write
1E6473FC000
heap
page read and write
1FA64B1A000
heap
page read and write
1FA62E29000
heap
page read and write
EB5F9FE000
stack
page read and write
1E0000
heap
page read and write
274C0FB2000
heap
page read and write
1A1F22A3000
heap
page read and write
797DFFE000
stack
page read and write
1A1F22A6000
heap
page read and write
1FA64E10000
heap
page read and write
1FA64BE8000
heap
page read and write
1FA64E21000
heap
page read and write
1E647484000
heap
page read and write
2B606DC0000
heap
page read and write
98F3FFE000
stack
page read and write
15A7BD08000
heap
page read and write
1FA64E33000
heap
page read and write
1A36F4DB000
heap
page read and write
1E647405000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64E1F000
heap
page read and write
1E6473F5000
heap
page read and write
1E64742D000
heap
page read and write
21F98FFF000
heap
page read and write
3AD4FD000
stack
page read and write
1FA64B5A000
heap
page read and write
2B606EA0000
heap
page read and write
2A8E000
stack
page read and write
21F98F30000
heap
page read and write
1FA64E21000
heap
page read and write
146ED3B6000
heap
page read and write
1FA64E64000
heap
page read and write
1FA64E21000
heap
page read and write
1FA64E74000
heap
page read and write
1FA62EF1000
heap
page read and write
DA2BFF000
stack
page read and write
1A1F2283000
heap
page read and write
1E647411000
heap
page read and write
21F98FED000
heap
page read and write
2DACA6FB000
heap
page read and write
1FA64E22000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64B47000
heap
page read and write
2DACA70E000
heap
page read and write
1FA64E76000
heap
page read and write
1FA64E26000
heap
page read and write
1A36F521000
heap
page read and write
1FA64E76000
heap
page read and write
2B606EDB000
heap
page read and write
1E647411000
heap
page read and write
1FA64BE6000
heap
page read and write
2DACA746000
heap
page read and write
1FA64E33000
heap
page read and write
E343AFE000
stack
page read and write
1FA64E33000
heap
page read and write
1A36F4F7000
heap
page read and write
21F98FBE000
heap
page read and write
274C0ED0000
heap
page read and write
1FA64E4C000
heap
page read and write
274C0F8D000
heap
page read and write
70E000
heap
page read and write
1FA64E76000
heap
page read and write
1A36F420000
heap
page read and write
1B4294E9000
heap
page read and write
21F98FA1000
heap
page read and write
797DAFF000
stack
page read and write
1FA64E76000
heap
page read and write
1FA64E66000
heap
page read and write
1FA64E30000
heap
page read and write
1FA64E64000
heap
page read and write
2B606E8A000
heap
page read and write
2DACA890000
heap
page read and write
1FA64E76000
heap
page read and write
DA30FE000
stack
page read and write
1BE74B80000
heap
page read and write
274C0F92000
heap
page read and write
B3E0FE000
stack
page read and write
2B606EDB000
heap
page read and write
1FA64E76000
heap
page read and write
1FA64E6A000
heap
page read and write
E343FFE000
stack
page read and write
1BE74BAA000
heap
page read and write
1E647410000
heap
page read and write
15A7BD9A000
heap
page read and write
1FA64E74000
heap
page read and write
1B429503000
heap
page read and write
2DACA6FE000
heap
page read and write
1BE74DF5000
heap
page read and write
1A36F497000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64B47000
heap
page read and write
1BE74C0A000
heap
page read and write
1FA64E76000
heap
page read and write
2DACA73A000
heap
page read and write
1FA64AF6000
heap
page read and write
2B606EC3000
heap
page read and write
1FA62E65000
heap
page read and write
22C0000
heap
page read and write
797DCFE000
stack
page read and write
274C0FF0000
heap
page read and write
1FA64B42000
heap
page read and write
1E6473FC000
heap
page read and write
1FA64E74000
heap
page read and write
1E647484000
heap
page read and write
E343EFE000
stack
page read and write
1FA64B11000
heap
page read and write
DA2EFF000
stack
page read and write
1A36F340000
heap
page read and write
1B4294EF000
heap
page read and write
1FA64B31000
heap
page read and write
1FA64E21000
heap
page read and write
1A1F22A3000
heap
page read and write
1FA64E33000
heap
page read and write
21F98FBA000
heap
page read and write
2DACA716000
heap
page read and write
1FA64E21000
heap
page read and write
1FA64E30000
heap
page read and write
1FA64E26000
heap
page read and write
C6146FF000
stack
page read and write
15A7BDE4000
heap
page read and write
797D8FE000
stack
page read and write
910E8FF000
stack
page read and write
2B606ED5000
heap
page read and write
1A1F2180000
heap
page read and write
15A7BD93000
heap
page read and write
910E3E9000
stack
page read and write
1A36F4E1000
heap
page read and write
744000
heap
page read and write
34520FE000
stack
page read and write
23CB000
stack
page read and write
1FA64E1D000
heap
page read and write
1A36F4E7000
heap
page read and write
2B606E69000
heap
page read and write
1A1F2277000
heap
page read and write
1FA62E08000
heap
page read and write
1FA64E30000
heap
page read and write
EB5F0FF000
stack
page read and write
1FA64E74000
heap
page read and write
2B606E6F000
heap
page read and write
2DACA70E000
heap
page read and write
1FA64E66000
heap
page read and write
2DACA734000
heap
page read and write
1FA64E69000
heap
page read and write
1BE74BAB000
heap
page read and write
1A36F537000
heap
page read and write
15A7BD97000
heap
page read and write
1FA64E74000
heap
page read and write
98F3EF9000
stack
page read and write
2DACA790000
heap
page read and write
2B606ED5000
heap
page read and write
2B606EBE000
heap
page read and write
570000
heap
page read and write
1FA64BE6000
heap
page read and write
21F98FF2000
heap
page read and write
1FA64E74000
heap
page read and write
2DACA6F2000
heap
page read and write
21F99001000
heap
page read and write
2B606EDB000
heap
page read and write
54E000
stack
page read and write
1FA64E21000
heap
page read and write
1B4294ED000
heap
page read and write
21F98FEA000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64AFC000
heap
page read and write
1A1F3FE0000
heap
page read and write
2B606EC3000
heap
page read and write
2B606EDD000
heap
page read and write
1FA62DE0000
heap
page read and write
24CF000
stack
page read and write
146ED49F000
heap
page read and write
1FA64E76000
heap
page read and write
2B606E93000
heap
page read and write
1FA64E33000
heap
page read and write
1FA64B78000
heap
page read and write
C6147FE000
stack
page read and write
EB5F7FD000
stack
page read and write
1FA64E76000
heap
page read and write
1A36F4F1000
heap
page read and write
146ED300000
heap
page read and write
1FA64E64000
heap
page read and write
21F98FC4000
heap
page read and write
21F98FFF000
heap
page read and write
1FA64E30000
heap
page read and write
5EA0DFE000
stack
page read and write
2B606E7D000
heap
page read and write
1E6473E1000
heap
page read and write
15A7BDD3000
heap
page read and write
1A36F537000
heap
page read and write
1A36F503000
heap
page read and write
1FA64E1D000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64B31000
heap
page read and write
1FA64B78000
heap
page read and write
1A1F2281000
heap
page read and write
1FA64E30000
heap
page read and write
1FA64E21000
heap
page read and write
146ED650000
heap
page read and write
1FA64E22000
heap
page read and write
1FA64E64000
heap
page read and write
1FA64B1A000
heap
page read and write
1BE74C4B000
heap
page read and write
1E647433000
heap
page read and write
1A1F2275000
heap
page read and write
274C0F8C000
heap
page read and write
21F98F9B000
heap
page read and write
1FA64E4C000
heap
page read and write
98F42FE000
stack
page read and write
1FA64E33000
heap
page read and write
1E647350000
heap
page read and write
1FA64E21000
heap
page read and write
1FA64E30000
heap
page read and write
1FA64B6E000
heap
page read and write
1A36F4BD000
heap
page read and write
2B606ED8000
heap
page read and write
1FA64E74000
heap
page read and write
1BE74BED000
heap
page read and write
1FA64E1D000
heap
page read and write
1B42952B000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64E54000
heap
page read and write
9FE000
stack
page read and write
1FA64B71000
heap
page read and write
1FA64E74000
heap
page read and write
910E7FE000
stack
page read and write
2DACA734000
heap
page read and write
2DACA701000
heap
page read and write
15A7BD9D000
heap
page read and write
5EA0BFE000
stack
page read and write
15A7BD00000
heap
page read and write
1A36F50E000
heap
page read and write
2DACA746000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64E21000
heap
page read and write
E3437C9000
stack
page read and write
1FA64E30000
heap
page read and write
1FA64E26000
heap
page read and write
1FA64E30000
heap
page read and write
1FA64B91000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64E40000
heap
page read and write
2B606ED8000
heap
page read and write
21F98FF3000
heap
page read and write
1FA64E66000
heap
page read and write
EB5E0FC000
stack
page read and write
274C0FD0000
heap
page read and write
1FA64E4C000
heap
page read and write
1E647404000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64BEA000
heap
page read and write
1BE74BF0000
heap
page read and write
1B4294F4000
heap
page read and write
1FA64E4C000
heap
page read and write
1A36F537000
heap
page read and write
1A1F2160000
heap
page read and write
21F98FFF000
heap
page read and write
1A36F4FD000
heap
page read and write
3ACCF9000
stack
page read and write
797D5F9000
stack
page read and write
2DACA748000
heap
page read and write
21F98FAD000
heap
page read and write
1B429470000
heap
page read and write
1FA64E24000
heap
page read and write
1FA64E4C000
heap
page read and write
2B606E92000
heap
page read and write
1FA62EF1000
heap
page read and write
1FA64B1A000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64B0F000
heap
page read and write
1FA64B5A000
heap
page read and write
1FA64E33000
heap
page read and write
1FA64B47000
heap
page read and write
3451EFD000
stack
page read and write
2DACA6E1000
heap
page read and write
146ED48E000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64E22000
heap
page read and write
2B606E66000
heap
page read and write
21F98FEF000
heap
page read and write
2DACA746000
heap
page read and write
21F98FFF000
heap
page read and write
1FA64E33000
heap
page read and write
1FA62E4F000
heap
page read and write
15A7BDE2000
heap
page read and write
1FA64B47000
heap
page read and write
2B606EBE000
heap
page read and write
21F98FAF000
heap
page read and write
1A36F537000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64E6A000
heap
page read and write
1FA64E33000
heap
page read and write
100CFD000
stack
page read and write
1FA64E1D000
heap
page read and write
1FA64E6A000
heap
page read and write
1BE74BD0000
heap
page read and write
2B606E75000
heap
page read and write
1A1F22D8000
heap
page read and write
1FA64E64000
heap
page read and write
1E647390000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64E1D000
heap
page read and write
5EA11FD000
stack
page read and write
1E647375000
heap
page read and write
1FA64B31000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64E21000
heap
page read and write
1FA64BE6000
heap
page read and write
1FA64B5A000
heap
page read and write
1A36F48A000
heap
page read and write
15A7BD98000
heap
page read and write
1FA64B70000
heap
page read and write
1FA64E30000
heap
page read and write
E3440FD000
stack
page read and write
274C0FB2000
heap
page read and write
1FA64B19000
heap
page read and write
1FA64B1A000
heap
page read and write
2B606E75000
heap
page read and write
2B606EDB000
heap
page read and write
1FA64B42000
heap
page read and write
2DACA680000
heap
page read and write
1A36F478000
heap
page read and write
1FA64E6A000
heap
page read and write
1FA64E33000
heap
page read and write
1BE74BF6000
heap
page read and write
1BE74C22000
heap
page read and write
1FA64B6E000
heap
page read and write
2B606EBE000
heap
page read and write
1FA62E00000
heap
page read and write
1A1F2279000
heap
page read and write
274C0F28000
heap
page read and write
5EA0FFE000
stack
page read and write
1BE74B87000
heap
page read and write
15A7BC30000
heap
page read and write
1FA64B70000
heap
page read and write
2DACA701000
heap
page read and write
1A1F228E000
heap
page read and write
1007FE000
stack
page read and write
21F98FB5000
heap
page read and write
1FA64E33000
heap
page read and write
98F46FE000
stack
page read and write
2DACA730000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64B5A000
heap
page read and write
15A7BDA1000
heap
page read and write
1A1F22D8000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64E74000
heap
page read and write
1FA64E4C000
heap
page read and write
274C0F49000
heap
page read and write
2B606E84000
heap
page read and write
1E647428000
heap
page read and write
1FA64E74000
heap
page read and write
21F98F96000
heap
page read and write
1FA64E26000
heap
page read and write
C6148FF000
stack
page read and write
1FA64E76000
heap
page read and write
2DACA708000
heap
page read and write
DA28F9000
stack
page read and write
1FA64B5A000
heap
page read and write
1BE74DF0000
heap
page read and write
1FA64E64000
heap
page read and write
146ED655000
heap
page read and write
E343CFE000
stack
page read and write
1FA64E30000
heap
page read and write
1E647320000
heap
page read and write
21F99030000
heap
page read and write
1E64740D000
heap
page read and write
2DACA73A000
heap
page read and write
1B429544000
heap
page read and write
274C0FF4000
heap
page read and write
1A36F4D2000
heap
page read and write
1FA64E6A000
heap
page read and write
1FA64B42000
heap
page read and write
1FA64E4C000
heap
page read and write
2DACA767000
heap
page read and write
1FA64E64000
heap
page read and write
1FA64E1D000
heap
page read and write
1FA64E76000
heap
page read and write
100AFE000
stack
page read and write
1FA64B1B000
heap
page read and write
2DACA746000
heap
page read and write
1FA64E30000
heap
page read and write
3AD0FE000
stack
page read and write
1FA62F30000
heap
page read and write
1FA64E4C000
heap
page read and write
1FA64BE6000
heap
page read and write
1FA64E33000
heap
page read and write
There are 1094 hidden memdumps, click here to show them.