IOC Report
New Vendor Setup Form (1).pdf

loading gif

Files

File Path
Type
Category
Malicious
New Vendor Setup Form (1).pdf
PDF document, version 1.6 (zip deflate encoded)
initial sample
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\9bdd16a5-4475-4469-b51f-d73b141b3b18.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db
SQLite 3.x database, last written using SQLite version 3040000, writer version 2, read version 2, file counter 1, database pages 1, cookie 0, schema 0, unknown 0 encoding, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db-shm
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\CreativeCloud\CoreSync\EntitySync-2024-10-07.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\CreativeCloud\CoreSync\EntitySync-2024-10-08.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\RFL\LocalMapping\RFLDB230
SQLite 3.x database, last written using SQLite version 3040000, file counter 1, database pages 8, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\RFL\LocalMapping\RFLDB230-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-241007222153Z-557.bmp
PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 3, database pages 14, cookie 0x5, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Reader\Synchronizer\metadata\Synchronizer
SQLite 3.x database, last written using SQLite version 3040000, file counter 1, database pages 23, cookie 0x11, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Reader\Synchronizer\metadata\Synchronizer-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.dat
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 30, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 30
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Temp\MSI96291.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A910kwo7h_17dcpi8_4wc.tmp
PDF document, version 1.6, 0 pages
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A91pmr227_17dcpig_4wc.tmp
Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-07 18-21-51-088.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\1ece06d6-8e37-4386-92d8-5ac163533c6c.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\b1c8ff15-d39e-4ddc-ae96-1e7b0f8a80c5.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 42290
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\b35ee3df-6683-4531-b949-634a6812bb1c.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\bcbe10cb-50b2-4424-a75a-d649e7ffb5cc.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\JSCache\GlobSettings
ASCII text
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\915DEAC5D1E15E49646B8A94E04E470958C9BB89.crl
data
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\DF22CF8B8C3B46C10D3D5C407561EABEB57F8181.crl
data
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\addressbook.acrodata
ISO-8859 text, with very long lines (3486), with CRLF, CR line terminators
dropped
There are 50 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\New Vendor Setup Form (1).pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=1472
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=6352
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=1088
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=5236
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=2680
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=2992
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\RDCNotificationClient\FullTrustNotifier.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\RDCNotificationClient\FullTrustNotifier.exe" GetChannelUri
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2148 --field-trial-handle=1524,i,8648760949684156529,1724978059203320753,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://android.notify.windows.com/iOSk
unknown
http://x1.i.lencr.org/
unknown
https://comments.adobe.
unknown
https://android.notify.windows.com/iOSd
unknown
https://android.notify.windows.com/iOS
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://wns.windows.com/g
unknown

Domains

Name
IP
Malicious
x1.i.lencr.org
unknown

IPs

IP
Domain
Country
Malicious
23.217.172.185
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\Privileged
syncFolderSetupDone
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Synchronizer\DC\Acrobat.com
tUniqueIdForEureka
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Synchronizer\DC\WebSocketNotifInfra
bisWSExpEnabled
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1B6EE517000
heap
page read and write
5B13FF000
stack
page read and write
1084BD5F000
heap
page read and write
5FD000
stack
page read and write
10849C68000
heap
page read and write
32019FD000
stack
page read and write
1084BD78000
heap
page read and write
1084BD78000
heap
page read and write
1C83AB90000
heap
page read and write
2971B8A6000
heap
page read and write
1EC25446000
heap
page read and write
1084BD78000
heap
page read and write
1084B9B8000
heap
page read and write
2070AC3B000
heap
page read and write
1C83ADBE000
heap
page read and write
2971B844000
heap
page read and write
32014FE000
stack
page read and write
8FC5FFD000
stack
page read and write
1EC25467000
heap
page read and write
28227636000
heap
page read and write
1B6EE4C1000
heap
page read and write
4D8A2FF000
stack
page read and write
197AC71E000
heap
page read and write
1C83ACF0000
heap
page read and write
8FC5BFF000
stack
page read and write
18041C20000
heap
page read and write
6511EFE000
stack
page read and write
6C89BFE000
stack
page read and write
15CA6850000
heap
page read and write
1EC25483000
heap
page read and write
1B6EE4B8000
heap
page read and write
1084BD4F000
heap
page read and write
89194F8000
stack
page read and write
1FD8A7B3000
heap
page read and write
15CA68ED000
heap
page read and write
7154DFD000
stack
page read and write
2971B740000
heap
page read and write
1084BA21000
heap
page read and write
7154EFE000
stack
page read and write
1B6EE4DE000
heap
page read and write
1084BA41000
heap
page read and write
1EC25496000
heap
page read and write
1084B9E0000
heap
page read and write
5B0AFE000
stack
page read and write
2070AC53000
heap
page read and write
1FD8A766000
heap
page read and write
1EC25496000
heap
page read and write
1084BD68000
heap
page read and write
1084B9AC000
heap
page read and write
1084BD78000
heap
page read and write
1C83ADBE000
heap
page read and write
2070AC66000
heap
page read and write
1084B9FE000
heap
page read and write
212CC7B7000
heap
page read and write
D5F000
stack
page read and write
28C7EFE000
stack
page read and write
2070AB70000
heap
page read and write
1EC2547C000
heap
page read and write
18041C31000
heap
page read and write
5B14ED000
stack
page read and write
212CC7D1000
heap
page read and write
1B6EE4A2000
heap
page read and write
1EC2546E000
heap
page read and write
1EC253D8000
heap
page read and write
8FD000
stack
page read and write
2070AC4F000
heap
page read and write
18041C3A000
heap
page read and write
15CA68C7000
heap
page read and write
282276D8000
heap
page read and write
2070AC54000
heap
page read and write
1084B99F000
heap
page read and write
2070AC57000
heap
page read and write
212CC80A000
heap
page read and write
15CA68B8000
heap
page read and write
5B14FB000
stack
page read and write
1084BA48000
heap
page read and write
274E000
stack
page read and write
212CC740000
heap
page read and write
15CA6B50000
heap
page read and write
1EC25695000
heap
page read and write
2070AC61000
heap
page read and write
6511FFD000
stack
page read and write
1FD8A787000
heap
page read and write
1084BD5F000
heap
page read and write
15CA6903000
heap
page read and write
212CC7E1000
heap
page read and write
1C83AD65000
heap
page read and write
1084BD55000
heap
page read and write
1084BD78000
heap
page read and write
1084BD5F000
heap
page read and write
18041C12000
heap
page read and write
18041C05000
heap
page read and write
18041C50000
heap
page read and write
2070AC9D000
heap
page read and write
1084B9D7000
heap
page read and write
28229450000
heap
page read and write
18041C7F000
heap
page read and write
B8BFEFF000
stack
page read and write
212CC7F8000
heap
page read and write
1B6EE410000
heap
page read and write
1084BD19000
heap
page read and write
1EC25483000
heap
page read and write
1084BD5F000
heap
page read and write
B8BFBFF000
stack
page read and write
15CA68BC000
heap
page read and write
1EC270A0000
heap
page read and write
18041C09000
heap
page read and write
1084BD5F000
heap
page read and write
197AC6E3000
heap
page read and write
212CC7F8000
heap
page read and write
2070AC87000
heap
page read and write
8918FFF000
stack
page read and write
212CC7CE000
heap
page read and write
7154BFE000
stack
page read and write
2971B850000
heap
page read and write
1084BD4F000
heap
page read and write
4EC14FE000
stack
page read and write
7154AFF000
stack
page read and write
1084B9D2000
heap
page read and write
1FD8A781000
heap
page read and write
5B0FFE000
stack
page read and write
1084BD78000
heap
page read and write
1084B9E9000
heap
page read and write
960000
heap
page read and write
197AC6CC000
heap
page read and write
10849C08000
heap
page read and write
2070AC46000
heap
page read and write
1084BD5F000
heap
page read and write
10849CB6000
heap
page read and write
18041D95000
heap
page read and write
28227520000
heap
page read and write
1FD8A774000
heap
page read and write
1084BA28000
heap
page read and write
10849C68000
heap
page read and write
96A000
heap
page read and write
1084BD5F000
heap
page read and write
2971B831000
heap
page read and write
2070ACA9000
heap
page read and write
2070AC45000
heap
page read and write
197AC6B6000
heap
page read and write
28227950000
heap
page read and write
2971B82E000
heap
page read and write
2070AC4D000
heap
page read and write
2070AC57000
heap
page read and write
1084BD43000
heap
page read and write
197AC6D9000
heap
page read and write
5B09FE000
stack
page read and write
1084BA29000
heap
page read and write
1EC25443000
heap
page read and write
197AC650000
heap
page read and write
15CA67D0000
heap
page read and write
28227530000
heap
page read and write
1084BD5F000
heap
page read and write
1B6EE4BD000
heap
page read and write
2971B8A6000
heap
page read and write
10849BA0000
heap
page read and write
1084BA21000
heap
page read and write
282275EC000
heap
page read and write
71548FE000
stack
page read and write
1084BD5F000
heap
page read and write
212CC950000
heap
page read and write
B8BFCFE000
stack
page read and write
15CA6904000
heap
page read and write
1084BA90000
unkown
page read and write
1084BA41000
heap
page read and write
1B6EE4E0000
heap
page read and write
1084BD4F000
heap
page read and write
15CA68F0000
heap
page read and write
1C83AD8F000
heap
page read and write
282275E6000
heap
page read and write
4EC18FE000
stack
page read and write
1B6EE4AC000
heap
page read and write
1EC25453000
heap
page read and write
197AC6CB000
heap
page read and write
18041C67000
heap
page read and write
5B0CFE000
stack
page read and write
65120FF000
stack
page read and write
2971B864000
heap
page read and write
1084B9B8000
heap
page read and write
1084B9D2000
heap
page read and write
7154CFE000
stack
page read and write
1EC25210000
heap
page read and write
2971BA60000
heap
page read and write
10849CFB000
heap
page read and write
212CC80A000
heap
page read and write
1FD8A794000
heap
page read and write
197AC510000
heap
page read and write
1084BD78000
heap
page read and write
4D89DFD000
stack
page read and write
1B6EE539000
heap
page read and write
2971B710000
heap
page read and write
8FC59FE000
stack
page read and write
1FD8A8E5000
heap
page read and write
1084BD68000
heap
page read and write
10849CFB000
heap
page read and write
27EC000
stack
page read and write
2800000
heap
page read and write
8FC5CFE000
stack
page read and write
1C83AD65000
heap
page read and write
278E000
stack
page read and write
212CC822000
heap
page read and write
1FD8A792000
heap
page read and write
197AC716000
heap
page read and write
C5E000
stack
page read and write
EDC000
stack
page read and write
1B6EE508000
heap
page read and write
1084BD5F000
heap
page read and write
1084B9E0000
heap
page read and write
1084B9E9000
heap
page read and write
18041C28000
heap
page read and write
6C895FE000
stack
page read and write
15CA691B000
heap
page read and write
18041C3C000
heap
page read and write
521CCFD000
stack
page read and write
8918EFE000
stack
page read and write
15CA691B000
heap
page read and write
1084B9D2000
heap
page read and write
2070AC57000
heap
page read and write
212CC7BE000
heap
page read and write
521C8FE000
stack
page read and write
212CC80A000
heap
page read and write
18041C13000
heap
page read and write
1084B9B8000
heap
page read and write
1B6EE7A5000
heap
page read and write
1084BD1A000
heap
page read and write
1C83AD6B000
heap
page read and write
15CA68CE000
heap
page read and write
197AC6D6000
heap
page read and write
6C894FE000
stack
page read and write
1EC25496000
heap
page read and write
1084B9FE000
heap
page read and write
18041C13000
heap
page read and write
5B11FE000
stack
page read and write
282275E0000
heap
page read and write
212CC7B7000
heap
page read and write
1084BD78000
heap
page read and write
2070AC4F000
heap
page read and write
1C83AD68000
heap
page read and write
2971B893000
heap
page read and write
2070AC73000
heap
page read and write
18041C23000
heap
page read and write
18041C3E000
heap
page read and write
8FC60FE000
stack
page read and write
18041C31000
heap
page read and write
1B6EE4E4000
heap
page read and write
1084BA08000
heap
page read and write
1084B9E9000
heap
page read and write
212CC945000
heap
page read and write
197AC6C2000
heap
page read and write
28227550000
heap
page read and write
212CC7D1000
heap
page read and write
1FD8A76D000
heap
page read and write
2971B882000
heap
page read and write
15CA68D0000
heap
page read and write
197AC6E4000
heap
page read and write
1C83AD5B000
heap
page read and write
1FD8A79C000
heap
page read and write
A80000
heap
page read and write
1084BD10000
heap
page read and write
212CC7AB000
heap
page read and write
28C81FD000
stack
page read and write
2A0F000
stack
page read and write
1C83AD6E000
heap
page read and write
1084BD5F000
heap
page read and write
1C83AD71000
heap
page read and write
2971B805000
heap
page read and write
1C83ADBE000
heap
page read and write
5A0000
heap
page read and write
1084BD4F000
heap
page read and write
212CC7EF000
heap
page read and write
1084B9E7000
heap
page read and write
1084BD5F000
heap
page read and write
10849CF8000
heap
page read and write
1FD8A77B000
heap
page read and write
521C7FE000
stack
page read and write
1084B9C2000
heap
page read and write
1084BA28000
heap
page read and write
1084BD5F000
heap
page read and write
1084BD1A000
heap
page read and write
1084B9FE000
heap
page read and write
2971B85F000
heap
page read and write
1084B9E6000
heap
page read and write
1084B9AB000
heap
page read and write
212CC833000
heap
page read and write
1EC25483000
heap
page read and write
197AC6BA000
heap
page read and write
1084B9B8000
heap
page read and write
1084B9DE000
heap
page read and write
1084BD78000
heap
page read and write
1084B9DB000
heap
page read and write
1B6EE400000
heap
page read and write
1084BD68000
heap
page read and write
5B08FF000
stack
page read and write
1B6EE4C3000
heap
page read and write
10849C53000
heap
page read and write
2070AC98000
heap
page read and write
4EC11FE000
stack
page read and write
1FD8C580000
heap
page read and write
2971B840000
heap
page read and write
1084B9E7000
heap
page read and write
212CC7D1000
heap
page read and write
1C83AD89000
heap
page read and write
2971B822000
heap
page read and write
5B0DFE000
stack
page read and write
D9E000
stack
page read and write
2971B84D000
heap
page read and write
1084B9E0000
heap
page read and write
10849BC0000
heap
page read and write
1EC25444000
heap
page read and write
18041C07000
heap
page read and write
2971B850000
heap
page read and write
1C83AD67000
heap
page read and write
212CC7F8000
heap
page read and write
1084BD78000
heap
page read and write
2971B83E000
heap
page read and write
1084B9A8000
heap
page read and write
1FD8A7CA000
heap
page read and write
18041C15000
heap
page read and write
89191FE000
stack
page read and write
2971B81D000
heap
page read and write
1EC2549C000
heap
page read and write
1084B9FE000
heap
page read and write
15CA67B0000
heap
page read and write
15CA68CC000
heap
page read and write
18041C26000
heap
page read and write
1084B9D7000
heap
page read and write
8FC5EFE000
stack
page read and write
1EC2547F000
heap
page read and write
71549FE000
stack
page read and write
2070AC9D000
heap
page read and write
1C83ADBE000
heap
page read and write
1FD8A777000
heap
page read and write
28C80FF000
stack
page read and write
1B6EE4D2000
heap
page read and write
212CC7BE000
heap
page read and write
1FD8A7CA000
heap
page read and write
1C83AD84000
heap
page read and write
18041C17000
heap
page read and write
1084B9AB000
heap
page read and write
2971B895000
heap
page read and write
15CA6B55000
heap
page read and write
1C83AD59000
heap
page read and write
18041C42000
heap
page read and write
1084B9FE000
heap
page read and write
18041C22000
heap
page read and write
15CA8760000
heap
page read and write
18041D90000
heap
page read and write
1EC25453000
heap
page read and write
1C83AD7F000
heap
page read and write
18041C91000
heap
page read and write
1084B9D7000
heap
page read and write
197AC6BE000
heap
page read and write
1FD8A792000
heap
page read and write
1084BD5F000
heap
page read and write
197AC6E0000
heap
page read and write
290B000
stack
page read and write
15CA68E6000
heap
page read and write
1084BD68000
heap
page read and write
32015FF000
stack
page read and write
2971B823000
heap
page read and write
89193FD000
stack
page read and write
212CC7AF000
heap
page read and write
10849C51000
heap
page read and write
28229320000
heap
page read and write
2971B850000
heap
page read and write
2971B82A000
heap
page read and write
2070AC98000
heap
page read and write
1084BD68000
heap
page read and write
2971B8A7000
heap
page read and write
197AC6E6000
heap
page read and write
6C898FE000
stack
page read and write
197AC6CB000
heap
page read and write
1084BA28000
heap
page read and write
6511DFE000
stack
page read and write
18041B40000
heap
page read and write
2971B844000
heap
page read and write
1084BA28000
heap
page read and write
1B6EE4B5000
heap
page read and write
2971B829000
heap
page read and write
197AC5F0000
heap
page read and write
3201AFE000
stack
page read and write
212CC7CB000
heap
page read and write
1FD8A79A000
heap
page read and write
2070ABD8000
heap
page read and write
197AC6ED000
heap
page read and write
197AE320000
heap
page read and write
1084B9FE000
heap
page read and write
1FD8A7CA000
heap
page read and write
212CC7A7000
heap
page read and write
15CA68EA000
heap
page read and write
89194F6000
stack
page read and write
2070AA70000
heap
page read and write
1FD8A7A5000
heap
page read and write
1C83AF15000
heap
page read and write
5B0EFF000
stack
page read and write
1C83ADA6000
heap
page read and write
15CA68DB000
heap
page read and write
1C83AD5D000
heap
page read and write
18041A60000
heap
page read and write
1084BD46000
heap
page read and write
1084B9D2000
heap
page read and write
1EC25444000
heap
page read and write
1FD8A7CA000
heap
page read and write
18041C35000
heap
page read and write
1B6EE610000
heap
page read and write
2805000
heap
page read and write
197AC716000
heap
page read and write
2070AC4C000
heap
page read and write
2070AC65000
heap
page read and write
10849CF1000
heap
page read and write
212CC7C8000
heap
page read and write
1084B9C2000
heap
page read and write
F1E000
stack
page read and write
18041C0C000
heap
page read and write
10849C29000
heap
page read and write
1084BA41000
heap
page read and write
212CC7D8000
heap
page read and write
212CC7DF000
heap
page read and write
1084BD5F000
heap
page read and write
15CA691B000
heap
page read and write
B8C00FE000
stack
page read and write
2070AC59000
heap
page read and write
1B6EE4AC000
heap
page read and write
18041BA0000
heap
page read and write
212CC7BD000
heap
page read and write
197AC71D000
heap
page read and write
212CC7CD000
heap
page read and write
93E000
stack
page read and write
1FD8A776000
heap
page read and write
1084BD5F000
heap
page read and write
28C7FFE000
stack
page read and write
1FD8A797000
heap
page read and write
2971BA65000
heap
page read and write
1C83ADA7000
heap
page read and write
197AC6D2000
heap
page read and write
5B0000
heap
page read and write
32013FE000
stack
page read and write
212CC7C1000
heap
page read and write
15CA68C6000
heap
page read and write
6511BFF000
stack
page read and write
1EC25422000
heap
page read and write
197AC6D3000
heap
page read and write
1B6EE4D4000
heap
page read and write
1C83AF10000
heap
page read and write
1B6EE4CA000
heap
page read and write
2971B82B000
heap
page read and write
1B6EE4BD000
heap
page read and write
1C83AD5E000
heap
page read and write
2971B851000
heap
page read and write
212CC833000
heap
page read and write
282276BD000
heap
page read and write
28227955000
heap
page read and write
212CC80F000
heap
page read and write
1084BA41000
heap
page read and write
197AC6D6000
heap
page read and write
1B6EE4C3000
heap
page read and write
1084BD7C000
heap
page read and write
2971B720000
heap
page read and write
1084BD5F000
heap
page read and write
212CC7E5000
heap
page read and write
1084B9FE000
heap
page read and write
1EC2546C000
heap
page read and write
1084B9FC000
heap
page read and write
15CA68BD000
heap
page read and write
4D8A0FF000
stack
page read and write
1084B9DB000
heap
page read and write
28C7CFE000
stack
page read and write
1084B9E7000
heap
page read and write
2070AE55000
heap
page read and write
10849B90000
heap
page read and write
1C83ADBE000
heap
page read and write
10849CF1000
heap
page read and write
1084BD4F000
heap
page read and write
1C83AD6E000
heap
page read and write
2971B821000
heap
page read and write
1B6EE440000
heap
page read and write
1084BD68000
heap
page read and write
B8BF8F9000
stack
page read and write
1084B9B8000
heap
page read and write
1C83AD6F000
heap
page read and write
1084B9D7000
heap
page read and write
B8BFAFE000
stack
page read and write
15CA691B000
heap
page read and write
1FD8A78E000
heap
page read and write
1084B9FE000
heap
page read and write
197AC930000
heap
page read and write
1EC25496000
heap
page read and write
197AC6D6000
heap
page read and write
197AC6C2000
heap
page read and write
28C7DFF000
stack
page read and write
1084BD4F000
heap
page read and write
2070AC50000
heap
page read and write
2971B7B0000
heap
page read and write
2971B847000
heap
page read and write
4D89FFE000
stack
page read and write
1B6EE4B3000
heap
page read and write
1C83AD7C000
heap
page read and write
1084BD78000
heap
page read and write
1084B9D2000
heap
page read and write
1084B9D7000
heap
page read and write
18041C3C000
heap
page read and write
1084BA08000
heap
page read and write
8FC5AFE000
stack
page read and write
1084BA66000
heap
page read and write
71547FE000
stack
page read and write
96E000
heap
page read and write
521C9FF000
stack
page read and write
1084B9E7000
heap
page read and write
15CA68BB000
heap
page read and write
1084B9C2000
heap
page read and write
1EC25310000
heap
page read and write
1084B9D2000
heap
page read and write
2971B855000
heap
page read and write
2070AE50000
heap
page read and write
18041C67000
heap
page read and write
521CDFE000
stack
page read and write
2971B837000
heap
page read and write
4D89CF9000
stack
page read and write
1EC2544E000
heap
page read and write
1084BD5F000
heap
page read and write
4EC15FE000
stack
page read and write
8FC5DFF000
stack
page read and write
6511CFE000
stack
page read and write
6511AFE000
stack
page read and write
212CC7C3000
heap
page read and write
1084BD5F000
heap
page read and write
28C7AF9000
stack
page read and write
B8BFDFE000
stack
page read and write
2070AC3D000
heap
page read and write
1084B9C2000
heap
page read and write
2971B8A6000
heap
page read and write
1084B9D2000
heap
page read and write
1EC25453000
heap
page read and write
197AC610000
heap
page read and write
2D4E000
stack
page read and write
89192FF000
stack
page read and write
2971B821000
heap
page read and write
1C83AD60000
heap
page read and write
15CA68D5000
heap
page read and write
1084B9E9000
heap
page read and write
1084BD5F000
heap
page read and write
1084B9E0000
heap
page read and write
197AC6EB000
heap
page read and write
8FC58FE000
stack
page read and write
28C7BFE000
stack
page read and write
1084B9FE000
heap
page read and write
15CA68B4000
heap
page read and write
1B6EE448000
heap
page read and write
18041C70000
heap
page read and write
1FD8A6C0000
heap
page read and write
197AC6B4000
heap
page read and write
1B6EE494000
heap
page read and write
212CC920000
heap
page read and write
1EC2544C000
heap
page read and write
1084BD78000
heap
page read and write
10849BD0000
heap
page read and write
1084BD5F000
heap
page read and write
1B6EE4D9000
heap
page read and write
1084B9C2000
heap
page read and write
5B00EC000
stack
page read and write
212CC80A000
heap
page read and write
521C379000
stack
page read and write
2971B829000
heap
page read and write
1EC2544E000
heap
page read and write
2070AC4F000
heap
page read and write
1B6EE4AB000
heap
page read and write
4D8A1FE000
stack
page read and write
212CC7CB000
heap
page read and write
71546F9000
stack
page read and write
2971B83D000
heap
page read and write
1084BD5F000
heap
page read and write
212CC7DA000
heap
page read and write
1084B9FE000
heap
page read and write
15CA68E4000
heap
page read and write
1FD8A750000
heap
page read and write
2971B82F000
heap
page read and write
1084BD78000
heap
page read and write
15CA68E2000
heap
page read and write
1084B9C2000
heap
page read and write
2971B87A000
heap
page read and write
1084BD78000
heap
page read and write
2070AC9D000
heap
page read and write
1084BA21000
heap
page read and write
212CC7B3000
heap
page read and write
1084BD78000
heap
page read and write
197AC716000
heap
page read and write
1084BA28000
heap
page read and write
521CAFE000
stack
page read and write
1084BD78000
heap
page read and write
1084B9AB000
heap
page read and write
1084B9A5000
heap
page read and write
1084BD87000
heap
page read and write
1B6EE539000
heap
page read and write
282276CD000
heap
page read and write
1EC25438000
heap
page read and write
2971B834000
heap
page read and write
2070AC3E000
heap
page read and write
2971B7B8000
heap
page read and write
1B6EE4D6000
heap
page read and write
1084BD37000
heap
page read and write
10849C00000
heap
page read and write
1084B991000
heap
page read and write
1C83AD74000
heap
page read and write
1EC2543E000
heap
page read and write
1084B980000
heap
page read and write
1B6EE525000
heap
page read and write
2D0D000
stack
page read and write
1FD8A76E000
heap
page read and write
212CC768000
heap
page read and write
1FD8A700000
heap
page read and write
1FD8A77C000
heap
page read and write
15CA691B000
heap
page read and write
1084BA3E000
heap
page read and write
1084B9D7000
heap
page read and write
1FD8A771000
heap
page read and write
1FD8A6D0000
heap
page read and write
1EC25435000
heap
page read and write
1FD8A787000
heap
page read and write
521C6FE000
stack
page read and write
4EC10F9000
stack
page read and write
2E4F000
stack
page read and write
521CBFF000
stack
page read and write
197AC716000
heap
page read and write
10849CB6000
heap
page read and write
89187D9000
stack
page read and write
1084BD5F000
heap
page read and write
1084BD78000
heap
page read and write
2971B819000
heap
page read and write
1B6EE4D2000
heap
page read and write
212CC7D1000
heap
page read and write
197AC6D8000
heap
page read and write
1FD8A76B000
heap
page read and write
212CC7B8000
heap
page read and write
1084BD4F000
heap
page read and write
2971B87A000
heap
page read and write
1B6EE7A0000
heap
page read and write
1084BA66000
heap
page read and write
1C83AC90000
heap
page read and write
2070AC35000
heap
page read and write
1084B9FC000
heap
page read and write
5B0BFC000
stack
page read and write
1B6EE539000
heap
page read and write
1084BD5F000
heap
page read and write
89190FB000
stack
page read and write
1FD8A77F000
heap
page read and write
1C83AD8C000
heap
page read and write
1084BD78000
heap
page read and write
15CA6858000
heap
page read and write
197AC935000
heap
page read and write
2B0F000
stack
page read and write
1084B9FE000
heap
page read and write
1084B9E0000
heap
page read and write
2070AC6F000
heap
page read and write
1084BD5F000
heap
page read and write
1C83AE60000
heap
page read and write
1C83ACF8000
heap
page read and write
5B12FF000
stack
page read and write
1B6EE4EE000
heap
page read and write
6C89189000
stack
page read and write
197AC69D000
heap
page read and write
1084B9C2000
heap
page read and write
1FD8A77C000
heap
page read and write
1EC25450000
heap
page read and write
15CA68DD000
heap
page read and write
18041C67000
heap
page read and write
1FD8A7A1000
heap
page read and write
1EC2545A000
heap
page read and write
1084B9D7000
heap
page read and write
2971B8A6000
heap
page read and write
1084BD78000
heap
page read and write
1084B9B2000
heap
page read and write
4EC16FE000
stack
page read and write
1FD8A79C000
heap
page read and write
18041C37000
heap
page read and write
5B15ED000
stack
page read and write
212CC7D6000
heap
page read and write
1EC25448000
heap
page read and write
18041C91000
heap
page read and write
1EC25464000
heap
page read and write
18041C67000
heap
page read and write
1084B9D2000
heap
page read and write
1084B9B8000
heap
page read and write
B8BFFFD000
stack
page read and write
1084BA66000
heap
page read and write
1084B985000
heap
page read and write
1084BD78000
heap
page read and write
53C000
stack
page read and write
1FD8A76A000
heap
page read and write
2070AC87000
heap
page read and write
2822764B000
heap
page read and write
2E8D000
stack
page read and write
1C83AC70000
heap
page read and write
1FD8A78A000
heap
page read and write
2070AC1F000
heap
page read and write
5B04FF000
stack
page read and write
1FD8A768000
heap
page read and write
18041C51000
heap
page read and write
197AC6F1000
heap
page read and write
1FD8A784000
heap
page read and write
1084BD68000
heap
page read and write
1EC25451000
heap
page read and write
1084B9D7000
heap
page read and write
2F8E000
stack
page read and write
2070AC68000
heap
page read and write
1084BD1D000
heap
page read and write
2070ACA9000
heap
page read and write
1084BA23000
heap
page read and write
1B6EE4C3000
heap
page read and write
18041C42000
heap
page read and write
1084BD78000
heap
page read and write
1EC2549B000
heap
page read and write
212CC748000
heap
page read and write
18041C1F000
heap
page read and write
1084BBC0000
heap
page read and write
4D89EFE000
stack
page read and write
2070AC9A000
heap
page read and write
1084BD78000
heap
page read and write
1084BA41000
heap
page read and write
2070AC88000
heap
page read and write
1C83AD55000
heap
page read and write
1FD8A7CE000
heap
page read and write
32018FE000
stack
page read and write
1EC252F0000
heap
page read and write
1084BA26000
heap
page read and write
15CA68CA000
heap
page read and write
5B07FD000
stack
page read and write
1EC25472000
heap
page read and write
15CA68BC000
heap
page read and write
4D8A4FE000
stack
page read and write
1EC2544D000
heap
page read and write
1B6EE508000
heap
page read and write
1084B9AB000
heap
page read and write
18041C1C000
heap
page read and write
1084B9E0000
heap
page read and write
1EC253D0000
heap
page read and write
2C0E000
stack
page read and write
B8BF9FE000
stack
page read and write
2971B820000
heap
page read and write
1084BD47000
heap
page read and write
1084B9B8000
heap
page read and write
1084BD5F000
heap
page read and write
1B6EE527000
heap
page read and write
18041C1C000
heap
page read and write
2070ACAA000
heap
page read and write
2070AC87000
heap
page read and write
4D8A3FD000
stack
page read and write
1084BD68000
heap
page read and write
212CC81E000
heap
page read and write
1084BD68000
heap
page read and write
2070ABD0000
heap
page read and write
1084BD78000
heap
page read and write
6C899FF000
stack
page read and write
1084BD5F000
heap
page read and write
5B00FB000
stack
page read and write
5B05FE000
stack
page read and write
212CC840000
heap
page read and write
197AC6CA000
heap
page read and write
15CA68C5000
heap
page read and write
1FD8A708000
heap
page read and write
1084BD78000
heap
page read and write
212CC833000
heap
page read and write
1084BD5F000
heap
page read and write
1084BA48000
heap
page read and write
4EC12FF000
stack
page read and write
2070AC98000
heap
page read and write
1084BD78000
heap
page read and write
1084BD43000
heap
page read and write
1084B9E0000
heap
page read and write
1B6EE508000
heap
page read and write
212CC7B1000
heap
page read and write
8FC55A9000
stack
page read and write
6C897FE000
stack
page read and write
28C82FE000
stack
page read and write
E9F000
stack
page read and write
2070AC6D000
heap
page read and write
1B6EE4BC000
heap
page read and write
65119FE000
stack
page read and write
1084BD37000
heap
page read and write
1B6EE4AE000
heap
page read and write
1084B9FE000
heap
page read and write
18041C34000
heap
page read and write
18041B60000
heap
page read and write
212CC940000
heap
page read and write
1084BD37000
heap
page read and write
1FD8A776000
heap
page read and write
197AC6CF000
heap
page read and write
1FD8A7B4000
heap
page read and write
10849C53000
heap
page read and write
A60000
heap
page read and write
5B06FE000
stack
page read and write
28229454000
heap
page read and write
1B6EE508000
heap
page read and write
1EC25462000
heap
page read and write
1EC25465000
heap
page read and write
1B6EE4BD000
heap
page read and write
1084BD5F000
heap
page read and write
1084B9B8000
heap
page read and write
10849CF9000
heap
page read and write
1084BA49000
heap
page read and write
15CA68CE000
heap
page read and write
65118F9000
stack
page read and write
212CC7CB000
heap
page read and write
1FD8A7CF000
heap
page read and write
18041C91000
heap
page read and write
5B15FD000
stack
page read and write
18041C22000
heap
page read and write
2070AC4D000
heap
page read and write
18041C2B000
heap
page read and write
32012F9000
stack
page read and write
197AC6D0000
heap
page read and write
1084B9E0000
heap
page read and write
1FD8A8E0000
heap
page read and write
4EC13FF000
stack
page read and write
1B6EE4A9000
heap
page read and write
18041C22000
heap
page read and write
1084B9D2000
heap
page read and write
2971B832000
heap
page read and write
1084BD68000
heap
page read and write
10849CFB000
heap
page read and write
1084B9C2000
heap
page read and write
4EC17FD000
stack
page read and write
15CA67A0000
heap
page read and write
2971B87A000
heap
page read and write
1084BD78000
heap
page read and write
197AC6BC000
heap
page read and write
15CA68BE000
heap
page read and write
1084BD5F000
heap
page read and write
2070AC98000
heap
page read and write
15CA68CE000
heap
page read and write
212CC7D0000
heap
page read and write
1FD8A787000
heap
page read and write
18041C2D000
heap
page read and write
1B6EE4C9000
heap
page read and write
1B6EE4A7000
heap
page read and write
197AC658000
heap
page read and write
1084B9A6000
heap
page read and write
2971B844000
heap
page read and write
1EC2543C000
heap
page read and write
1084B9D7000
heap
page read and write
1C83ADC3000
heap
page read and write
212CC7A3000
heap
page read and write
1EC25690000
heap
page read and write
2971B848000
heap
page read and write
1B6EE4F1000
heap
page read and write
1084B9AB000
heap
page read and write
6C896FF000
stack
page read and write
1084B98C000
heap
page read and write
2971B84A000
heap
page read and write
6C89AFD000
stack
page read and write
1084B9E7000
heap
page read and write
1C83AD6D000
heap
page read and write
1B6EE46A000
heap
page read and write
1084BD4F000
heap
page read and write
1084BD78000
heap
page read and write
18041BC9000
heap
page read and write
32016FE000
stack
page read and write
18041C3F000
heap
page read and write
5B16FE000
stack
page read and write
197AC6E0000
heap
page read and write
1FD8A776000
heap
page read and write
32017FE000
stack
page read and write
2070AB50000
heap
page read and write
18041C91000
heap
page read and write
1B6EE4C0000
heap
page read and write
1084BA08000
heap
page read and write
1084BD4F000
heap
page read and write
197AC6CE000
heap
page read and write
1084BD78000
heap
page read and write
1084B9AB000
heap
page read and write
1084BD4F000
heap
page read and write
1084B9FE000
heap
page read and write
1084BD78000
heap
page read and write
1084B9FE000
heap
page read and write
1084B9B8000
heap
page read and write
2070AC9D000
heap
page read and write
1C83AD86000
heap
page read and write
15CA68C5000
heap
page read and write
10849BC5000
heap
page read and write
1C83ADC4000
heap
page read and write
2971B891000
heap
page read and write
1084BD5F000
heap
page read and write
1FD8A8F0000
heap
page read and write
2971B7FA000
heap
page read and write
212CC7D1000
heap
page read and write
1084BD78000
heap
page read and write
1C83AD92000
heap
page read and write
212CC7F3000
heap
page read and write
1C83AD5A000
heap
page read and write
There are 878 hidden memdumps, click here to show them.