IOC Report
MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad.zip

loading gif

Files

File Path
Type
Category
Malicious
MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
malicious
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.data
DOS executable (block device driver @\273\)
dropped
malicious
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\b70d20ce558c0162a271d1ecf0e80035ee00f9ad
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\test\b70d20ce558c0162a271d1ecf0e80035ee00f9ad
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.data
DOS executable (block device driver @\273\)
dropped
malicious
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rdata
data
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.reloc
data
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\0\RCDATA\SCRIPT
data
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\GROUP_ICON\162
data
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\GROUP_ICON\164
data
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\GROUP_ICON\169
data
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\GROUP_ICON\99
data
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\ICON\1.ico
MS Windows icon resource - 1 icon, 16x16, 16 colors
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\ICON\10.ico
MS Windows icon resource - 1 icon, -128x-128
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\ICON\2.ico
MS Windows icon resource - 1 icon, 16x16, 16 colors
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\ICON\3.ico
MS Windows icon resource - 1 icon, 16x16, 16 colors
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\ICON\4.ico
MS Windows icon resource - 1 icon, 16x16
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\ICON\5.ico
MS Windows icon resource - 1 icon, 32x32
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\ICON\6.ico
MS Windows icon resource - 1 icon, 48x48
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\ICON\7.ico
MS Windows icon resource - 1 icon, 64x64
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\ICON\8.ico
MS Windows icon resource - 1 icon, 72x72
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\ICON\9.ico
MS Windows icon resource - 1 icon, 96x96
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\MANIFEST\1
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\MENU\166
data
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\string.txt
data
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\version.txt
data
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc_1
ASCII text, with very long lines (446), with no line terminators
dropped
C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.text
data
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rdata
data
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.reloc
data
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\0\RCDATA\SCRIPT
data
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\GROUP_ICON\162
data
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\GROUP_ICON\164
data
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\GROUP_ICON\169
data
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\GROUP_ICON\99
data
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\ICON\1.ico
MS Windows icon resource - 1 icon, 16x16, 16 colors
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\ICON\10.ico
MS Windows icon resource - 1 icon, -128x-128
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\ICON\2.ico
MS Windows icon resource - 1 icon, 16x16, 16 colors
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\ICON\3.ico
MS Windows icon resource - 1 icon, 16x16, 16 colors
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\ICON\4.ico
MS Windows icon resource - 1 icon, 16x16
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\ICON\5.ico
MS Windows icon resource - 1 icon, 32x32
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\ICON\6.ico
MS Windows icon resource - 1 icon, 48x48
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\ICON\7.ico
MS Windows icon resource - 1 icon, 64x64
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\ICON\8.ico
MS Windows icon resource - 1 icon, 72x72
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\ICON\9.ico
MS Windows icon resource - 1 icon, 96x96
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\MANIFEST\1
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\MENU\166
data
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\string.txt
data
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc\2057\version.txt
data
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.rsrc_1
ASCII text, with very long lines (446), with no line terminators
dropped
C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.text
data
dropped
There are 41 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
malicious
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Program Files\7-Zip\7zG.exe
"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\" -spe -an -ai#7zMap23948:168:7zEvent30997
C:\Program Files\7-Zip\7zG.exe
"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\" -an -ai#7zMap29602:242:7zEvent12266
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\string.txt
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\2057\version.txt
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\.rsrc\0\RCDATA\SCRIPT
C:\Program Files\7-Zip\7zG.exe
"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Desktop\MDE_File_Sample_b70d20ce558c0162a271d1ecf0e80035ee00f9ad\" -ad -an -ai#7zMap4539:168:7zEvent11394
C:\Program Files\7-Zip\7zG.exe
"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Desktop\test\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\" -ad -an -ai#7zMap22436:138:7zEvent16567
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\test\test2\b70d20ce558c0162a271d1ecf0e80035ee00f9ad~\.data
There are 1 hidden processes, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\data_auto_file\shell\open\command
NULL
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWindowsOnlyEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fPasteOriginalEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fReverse
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWrapAround
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fMatchCase
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
iWindowPosX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
iWindowPosY
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
iWindowPosDX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
iWindowPosDY
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\abgrcnq.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\7-Zip\Extraction
PathHistory
HKEY_CURRENT_USER\SOFTWARE\7-Zip\Extraction
PathHistory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.data\UserChoice
ProgId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.data\UserChoice
Hash
HKEY_CURRENT_USER_Classes\.data
NULL
HKEY_CURRENT_USER_Classes\???????
NULL
HKEY_CURRENT_USER_Classes\data_auto_file\shell\edit\command
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\ApplicationAssociationToasts
data_auto_file_.data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.data\OpenWithProgids
data_auto_file
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.data\OpenWithList
b
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.data\OpenWithList
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.data\OpenWithProgids
data_auto_file
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\abgrcnq.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1C2E260B000
heap
page read and write
1C2E261E000
heap
page read and write
1C2E2628000
heap
page read and write
1C2E4688000
heap
page read and write
19930899000
heap
page read and write
1C2E25F6000
heap
page read and write
199308FA000
heap
page read and write
21B96263000
heap
page read and write
1C2E9660000
heap
page read and write
1C2E456D000
heap
page read and write
12E9DFE000
stack
page read and write
1C2E452B000
heap
page read and write
1C202A75000
heap
page read and write
176C92A1000
heap
page read and write
1C2E6CE3000
heap
page read and write
8A484FE000
stack
page read and write
1993302D000
heap
page read and write
199308D7000
heap
page read and write
199308DB000
heap
page read and write
20B5F7D7000
heap
page read and write
1B65F9D5000
heap
page read and write
21B97C37000
heap
page read and write
199301BC000
heap
page read and write
1C2E463C000
heap
page read and write
1C2E6CFE000
heap
page read and write
176C929E000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E458F000
heap
page read and write
1C2011C3000
heap
page read and write
1C2E457D000
heap
page read and write
255E8BFD000
heap
page read and write
19930895000
heap
page read and write
255E72F1000
heap
page read and write
20B5F7C0000
heap
page read and write
199308D2000
heap
page read and write
199308C6000
heap
page read and write
1C2E453F000
heap
page read and write
1B65F9BF000
heap
page read and write
96931FE000
stack
page read and write
19932FB4000
heap
page read and write
1993083B000
heap
page read and write
1C2E266E000
heap
page read and write
1C2E4544000
heap
page read and write
26D195CD000
heap
page read and write
1C2E456D000
heap
page read and write
176C9297000
heap
page read and write
1C2E46A3000
heap
page read and write
20B5F7D0000
heap
page read and write
21B97BB0000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
199308CE000
heap
page read and write
176CD50D000
heap
page read and write
1C2E452B000
heap
page read and write
21B9628E000
heap
page read and write
21B9623A000
heap
page read and write
255E72F0000
heap
page read and write
19933019000
heap
page read and write
1C2E454D000
heap
page read and write
1C2E453B000
heap
page read and write
1C2E4662000
heap
page read and write
1B65F9D0000
heap
page read and write
1B65F9D5000
heap
page read and write
1B65F9C4000
heap
page read and write
20E67250000
heap
page read and write
199308E9000
heap
page read and write
F0370FE000
stack
page read and write
1B661265000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E4527000
heap
page read and write
1C2E4100000
trusted library allocation
page read and write
1C2E4589000
heap
page read and write
1B65F975000
heap
page read and write
26D195DA000
heap
page read and write
21B9659C000
heap
page read and write
19935130000
heap
page read and write
1B65F9D5000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E4568000
heap
page read and write
1C2E6CF5000
heap
page read and write
1992E94D000
heap
page read and write
1C2E4544000
heap
page read and write
255E8C80000
heap
page read and write
1B66126C000
heap
page read and write
1C2E452F000
heap
page read and write
1993083B000
heap
page read and write
1C2E469A000
heap
page read and write
19932FF8000
heap
page read and write
1B65F9D3000
heap
page read and write
1B65F9D1000
heap
page read and write
768B8FB000
stack
page read and write
26D1CDE0000
trusted library allocation
page read and write
19930912000
heap
page read and write
19933002000
heap
page read and write
1B65F9D5000
heap
page read and write
199308ED000
heap
page read and write
1C2E4539000
heap
page read and write
20B5F7CD000
heap
page read and write
176C9290000
heap
page read and write
199308F8000
heap
page read and write
26D195D2000
heap
page read and write
1C2E458A000
heap
page read and write
176C92D8000
heap
page read and write
1B65F9C4000
heap
page read and write
176CAB80000
heap
page read and write
1B661320000
heap
page read and write
20E6577D000
heap
page read and write
1B65F9B9000
heap
page read and write
1C2E4562000
heap
page read and write
1C565500000
heap
page read and write
176CCBB0000
trusted library allocation
page read and write
1993090E000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E4667000
heap
page read and write
1C2E261D000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E264A000
heap
page read and write
199308B1000
heap
page read and write
199308BA000
heap
page read and write
20B5F7D7000
heap
page read and write
1B65F9D5000
heap
page read and write
20E6574A000
heap
page read and write
1C2E4566000
heap
page read and write
19933015000
heap
page read and write
1B65F9C4000
heap
page read and write
768B6FE000
stack
page read and write
1C2E453F000
heap
page read and write
1C2E8CF4000
trusted library allocation
page read and write
199308DB000
heap
page read and write
26D195D7000
heap
page read and write
20E67190000
heap
page read and write
1992E944000
heap
page read and write
1C5655E0000
heap
page read and write
1C2E4572000
heap
page read and write
1C2052C0000
heap
page read and write
20E6572A000
heap
page read and write
1C2E4595000
heap
page read and write
199307EA000
heap
page read and write
20B5F7C4000
heap
page read and write
199308B1000
heap
page read and write
19935CF0000
heap
page read and write
21B96296000
heap
page read and write
199308F8000
heap
page read and write
21B9627C000
heap
page read and write
9E9B878000
stack
page read and write
26D19590000
heap
page read and write
19932FEF000
heap
page read and write
20E65769000
heap
page read and write
1C2E456C000
heap
page read and write
12E99B8000
stack
page read and write
1992E8F8000
heap
page read and write
1C202E60000
trusted library allocation
page read and write
19932FBA000
heap
page read and write
199308AB000
heap
page read and write
1C2E4562000
heap
page read and write
255E8BFD000
heap
page read and write
1C2E4631000
heap
page read and write
1C2E2657000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E462A000
heap
page read and write
1B65F9D3000
heap
page read and write
21B97C30000
heap
page read and write
21B9627C000
heap
page read and write
1C2E4685000
heap
page read and write
1C2011FE000
heap
page read and write
199307BB000
heap
page read and write
1C2E6D10000
heap
page read and write
1993084E000
heap
page read and write
199308D3000
heap
page read and write
176C92BD000
heap
page read and write
1B65F9C4000
heap
page read and write
20B5F7E3000
heap
page read and write
199307EC000
heap
page read and write
26D196A0000
heap
page read and write
255E71E0000
heap
page read and write
1C2E455E000
heap
page read and write
19932FF4000
heap
page read and write
1C2E4551000
heap
page read and write
1C2E4572000
heap
page read and write
B41367E000
stack
page read and write
1B65F9D3000
heap
page read and write
21B96278000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E4699000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E4575000
heap
page read and write
1C2E4613000
heap
page read and write
199308DA000
heap
page read and write
1C2E458E000
heap
page read and write
1C2E4575000
heap
page read and write
84B7747000
stack
page read and write
19930780000
heap
page read and write
1C2E463E000
heap
page read and write
1992E953000
heap
page read and write
199307F2000
heap
page read and write
1992E928000
heap
page read and write
1C2E267E000
heap
page read and write
199308D4000
heap
page read and write
176CD501000
heap
page read and write
20B5F7D7000
heap
page read and write
199308F1000
heap
page read and write
20E6572F000
heap
page read and write
19935720000
heap
page readonly
1B65F9D5000
heap
page read and write
199308C3000
heap
page read and write
1C2E455A000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E465A000
heap
page read and write
1B65F9CE000
heap
page read and write
1B65F9D1000
heap
page read and write
1C2011EF000
heap
page read and write
1C2E6CFE000
heap
page read and write
1C2E4694000
heap
page read and write
1C2E46B0000
heap
page read and write
1C2E4556000
heap
page read and write
255E72E5000
heap
page read and write
199335B0000
heap
page read and write
26D195F5000
heap
page read and write
255E72F2000
heap
page read and write
20E699A0000
heap
page read and write
255E72F8000
heap
page read and write
1C2E46AE000
heap
page read and write
1993080A000
heap
page read and write
1C202A7C000
heap
page read and write
26D195D0000
heap
page read and write
1C2011E2000
heap
page read and write
1C2E4561000
heap
page read and write
26D197B5000
heap
page read and write
1C2E4563000
heap
page read and write
1C2E2530000
heap
page read and write
1B65F9A4000
heap
page read and write
199308DF000
heap
page read and write
199308B5000
heap
page read and write
19930804000
heap
page read and write
1B65F9D5000
heap
page read and write
768B67E000
stack
page read and write
1C2E4673000
heap
page read and write
199308B1000
heap
page read and write
1B661300000
trusted library allocation
page read and write
19932FF3000
heap
page read and write
1B65F9DA000
heap
page read and write
21B96230000
heap
page read and write
1C2E2610000
heap
page read and write
26D195DA000
heap
page read and write
1B65F9BF000
heap
page read and write
1C2E46D0000
heap
page read and write
19930826000
heap
page read and write
1993092E000
heap
page read and write
1992E914000
heap
page read and write
19930370000
heap
page read and write
199308C3000
heap
page read and write
1C2E2679000
heap
page read and write
1C2E2652000
heap
page read and write
1C2E4548000
heap
page read and write
199308CE000
heap
page read and write
1B65F9C4000
heap
page read and write
21B96271000
heap
page read and write
1B65F9CD000
heap
page read and write
1B65F9D1000
heap
page read and write
1C2011E4000
heap
page read and write
1B65F9D1000
heap
page read and write
255E7555000
heap
page read and write
1C2E6CFC000
heap
page read and write
176C92B5000
heap
page read and write
1B65F9C4000
heap
page read and write
199308B1000
heap
page read and write
1C2E4579000
heap
page read and write
1C202F70000
heap
page read and write
1C204AC0000
trusted library allocation
page read and write
1C2E455E000
heap
page read and write
199308BA000
heap
page read and write
1C2E4631000
heap
page read and write
20B5F7E7000
heap
page read and write
21B96190000
heap
page read and write
1C2E6D2B000
heap
page read and write
19930870000
heap
page read and write
1C2E453F000
heap
page read and write
84B7C7E000
stack
page read and write
8A487FF000
stack
page read and write
176CD3B0000
heap
page read and write
1C2011FA000
heap
page read and write
176C9293000
heap
page read and write
1C2E267D000
heap
page read and write
1C201205000
heap
page read and write
1B65F971000
heap
page read and write
21B97F4C000
heap
page read and write
329D9FE000
stack
page read and write
1C2E2636000
heap
page read and write
1B65F9D5000
heap
page read and write
1993091E000
heap
page read and write
1C2E456E000
heap
page read and write
20B5F790000
heap
page read and write
20E65774000
heap
page read and write
20E65752000
heap
page read and write
1C2E4574000
heap
page read and write
1C2E4549000
heap
page read and write
1C2E455E000
heap
page read and write
199308CE000
heap
page read and write
1C2E9560000
heap
page readonly
21B97C38000
heap
page read and write
1C2E458D000
heap
page read and write
19930892000
heap
page read and write
255E91C0000
heap
page read and write
199307F7000
heap
page read and write
21B97E7E000
heap
page read and write
1C2E4567000
heap
page read and write
1C2011F4000
heap
page read and write
1C2E465E000
heap
page read and write
1C2E455E000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9D1000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E4685000
heap
page read and write
20B5F990000
trusted library allocation
page read and write
1993300F000
heap
page read and write
21B96590000
heap
page read and write
1993091E000
heap
page read and write
1C2E4551000
heap
page read and write
1C2E4562000
heap
page read and write
1B65F9D5000
heap
page read and write
1B65F9C1000
heap
page read and write
1C2E261C000
heap
page read and write
1C2E46F2000
heap
page read and write
26D197B0000
heap
page read and write
199308BA000
heap
page read and write
21B9627B000
heap
page read and write
199308FA000
heap
page read and write
199308E3000
heap
page read and write
20B5F760000
heap
page read and write
199307F2000
heap
page read and write
1B65F9C4000
heap
page read and write
199308BA000
heap
page read and write
1993092A000
heap
page read and write
19932FED000
heap
page read and write
1C2E46E4000
heap
page read and write
1C2E4590000
heap
page read and write
1B65F9DA000
heap
page read and write
199308CA000
heap
page read and write
12E9E7E000
stack
page read and write
1992E94C000
heap
page read and write
20E6575C000
heap
page read and write
199308E0000
heap
page read and write
19932FF3000
heap
page read and write
1C2E6D21000
heap
page read and write
1C2E457E000
heap
page read and write
1993303E000
heap
page read and write
1B65F9C4000
heap
page read and write
84B77CE000
stack
page read and write
1B65F9C4000
heap
page read and write
1C2E3F9D000
heap
page read and write
11CE3FF000
stack
page read and write
1993302A000
heap
page read and write
1B65F850000
heap
page read and write
19933024000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E453F000
heap
page read and write
1C2E6CF8000
heap
page read and write
20E65725000
heap
page read and write
26D195DB000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E453B000
heap
page read and write
19930831000
heap
page read and write
1C2E4571000
heap
page read and write
255E72F7000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E4551000
heap
page read and write
19933015000
heap
page read and write
176C92AC000
heap
page read and write
20B5F6A0000
heap
page read and write
199308B7000
heap
page read and write
1C2E456C000
heap
page read and write
12E9EFD000
stack
page read and write
1B65F9C4000
heap
page read and write
11CE2FE000
stack
page read and write
21B97C3D000
heap
page read and write
B413119000
stack
page read and write
255E7319000
heap
page read and write
329D8FD000
stack
page read and write
176CD500000
heap
page read and write
199308DD000
heap
page read and write
1B65F9C4000
heap
page read and write
19932FEE000
heap
page read and write
199308CE000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9D1000
heap
page read and write
1B6632D0000
trusted library allocation
page read and write
1B65F9C4000
heap
page read and write
19930899000
heap
page read and write
1C2E455E000
heap
page read and write
176C929C000
heap
page read and write
1B65F9D5000
heap
page read and write
1B65F9C4000
heap
page read and write
F036CFD000
stack
page read and write
1B65F9C4000
heap
page read and write
1B65F9D5000
heap
page read and write
1B65F9B9000
heap
page read and write
255E8C02000
heap
page read and write
1B65F9C4000
heap
page read and write
199308F8000
heap
page read and write
255E7100000
heap
page read and write
1C2E4625000
heap
page read and write
1B65F9D5000
heap
page read and write
1C201208000
heap
page read and write
19932FED000
heap
page read and write
1C2E4589000
heap
page read and write
1C2E455E000
heap
page read and write
20B5F890000
heap
page read and write
1C2E4544000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
1C201060000
heap
page read and write
1C2E4581000
heap
page read and write
84B7BFF000
stack
page read and write
19930893000
heap
page read and write
768B7FD000
stack
page read and write
1B65F9C4000
heap
page read and write
199301B0000
heap
page read and write
1C2E46D7000
heap
page read and write
1C2011C2000
heap
page read and write
255E72F9000
heap
page read and write
1C2E6D3A000
heap
page read and write
1C2E2628000
heap
page read and write
21B96598000
heap
page read and write
1C2E4610000
heap
page read and write
199308DB000
heap
page read and write
1C2E458E000
heap
page read and write
1C2011F7000
heap
page read and write
1C2E3F95000
heap
page read and write
1C2E4655000
heap
page read and write
1B65F9CE000
heap
page read and write
1C2E4534000
heap
page read and write
19935CF8000
heap
page read and write
176C92C9000
heap
page read and write
26D197C0000
heap
page read and write
1C2E2634000
heap
page read and write
199307C0000
heap
page read and write
20B5F89D000
heap
page read and write
1C2E453A000
heap
page read and write
1B65F9D5000
heap
page read and write
1B65F9D3000
heap
page read and write
21B97C3D000
heap
page read and write
255E72B0000
heap
page read and write
1C2E2647000
heap
page read and write
9E9BAFF000
stack
page read and write
26D195F5000
heap
page read and write
1C202A20000
heap
page read and write
1B65F9D5000
heap
page read and write
255E8B7E000
heap
page read and write
21B97C3D000
heap
page read and write
1C2E4570000
heap
page read and write
20B5F7D4000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9D5000
heap
page read and write
19933015000
heap
page read and write
20E6572D000
heap
page read and write
1C2E455E000
heap
page read and write
199308CF000
heap
page read and write
1C2E4638000
heap
page read and write
1B65F9CE000
heap
page read and write
21B96277000
heap
page read and write
1C2E6D36000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9D5000
heap
page read and write
1B65F9DB000
heap
page read and write
1993080E000
heap
page read and write
19930821000
heap
page read and write
F036EFE000
stack
page read and write
84B7B7E000
stack
page read and write
199308D0000
heap
page read and write
1C2E4561000
heap
page read and write
21B97F3F000
heap
page read and write
1C2E4581000
heap
page read and write
1B65F9C1000
heap
page read and write
176C92CE000
heap
page read and write
1C2E2656000
heap
page read and write
199351F2000
trusted library allocation
page read and write
1C2E4575000
heap
page read and write
1C567040000
heap
page read and write
1B65F9D5000
heap
page read and write
20E65749000
heap
page read and write
199308E6000
heap
page read and write
1B65F9DB000
heap
page read and write
1C2E4631000
heap
page read and write
9692BD9000
stack
page read and write
20E65721000
heap
page read and write
1992E90F000
heap
page read and write
1C2E4575000
heap
page read and write
19930781000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E2621000
heap
page read and write
1C2E4548000
heap
page read and write
255E72F7000
heap
page read and write
1B65F9D3000
heap
page read and write
1C2E4556000
heap
page read and write
199308D4000
heap
page read and write
19932FC6000
heap
page read and write
1B65F9D1000
heap
page read and write
1992E910000
heap
page read and write
1993089F000
heap
page read and write
1992E939000
heap
page read and write
1992E936000
heap
page read and write
26D195D1000
heap
page read and write
1C2E4538000
heap
page read and write
1C2E4539000
heap
page read and write
1C2E4544000
heap
page read and write
1C2E4691000
heap
page read and write
199308C3000
heap
page read and write
1C2E4560000
heap
page read and write
1992E95C000
heap
page read and write
1C2E2621000
heap
page read and write
199307B1000
heap
page read and write
1C2E2616000
heap
page read and write
20B5F7D8000
heap
page read and write
19930896000
heap
page read and write
199308BF000
heap
page read and write
329DAFE000
stack
page read and write
20B5F6C0000
heap
page read and write
1993300F000
heap
page read and write
768B77F000
stack
page read and write
1C2011B7000
heap
page read and write
1B65F9D5000
heap
page read and write
26D195C1000
heap
page read and write
1B65F977000
heap
page read and write
199308C3000
heap
page read and write
20B5F7C0000
heap
page read and write
26D195D1000
heap
page read and write
1992E8D6000
heap
page read and write
19930912000
heap
page read and write
1C2E2631000
heap
page read and write
199308A5000
heap
page read and write
1C2E4691000
heap
page read and write
19932FCF000
heap
page read and write
19932FF9000
heap
page read and write
1C2E4579000
heap
page read and write
176CD600000
heap
page read and write
1C2E4568000
heap
page read and write
1C2E4575000
heap
page read and write
176CD601000
heap
page read and write
1C2E6D24000
heap
page read and write
20B5F7D4000
heap
page read and write
1B65F9CE000
heap
page read and write
9E9B9FE000
stack
page read and write
1C2E455A000
heap
page read and write
1B65F9D5000
heap
page read and write
1993303F000
heap
page read and write
21B97C2D000
heap
page read and write
1C2E455E000
heap
page read and write
20E65738000
heap
page read and write
199308A2000
heap
page read and write
1C2E2640000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F940000
heap
page read and write
1C2E4582000
heap
page read and write
1C2E457D000
heap
page read and write
1C2E2611000
heap
page read and write
1992E810000
heap
page read and write
255E8BA4000
heap
page read and write
26D195C5000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E46AE000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2011B3000
heap
page read and write
1C2E2616000
heap
page read and write
255E7280000
heap
page read and write
199308D4000
heap
page read and write
1993301E000
heap
page read and write
176CD58C000
heap
page read and write
199308E5000
heap
page read and write
21B96276000
heap
page read and write
1C2E4529000
heap
page read and write
19930810000
heap
page read and write
20B5F7D1000
heap
page read and write
1C2E4568000
heap
page read and write
255E8BFD000
heap
page read and write
19930792000
heap
page read and write
199307C1000
heap
page read and write
1993093A000
heap
page read and write
21B96595000
heap
page read and write
1B65F9D3000
heap
page read and write
1C2E4571000
heap
page read and write
199308BA000
heap
page read and write
199308BA000
heap
page read and write
1992E914000
heap
page read and write
19930936000
heap
page read and write
1C2E46B8000
heap
page read and write
1C2E4571000
heap
page read and write
199308F1000
heap
page read and write
1C2E2666000
heap
page read and write
26D195EC000
heap
page read and write
19930916000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
199308C9000
heap
page read and write
1C2E2616000
heap
page read and write
1C2E4521000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E6D13000
heap
page read and write
199308BA000
heap
page read and write
1B65F9D3000
heap
page read and write
21B97BCF000
heap
page read and write
199308C6000
heap
page read and write
255E730D000
heap
page read and write
1B65F9D1000
heap
page read and write
1992E850000
heap
page read and write
1C2E455F000
heap
page read and write
1C2E2634000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E457D000
heap
page read and write
1C2E3E20000
heap
page read and write
199308ED000
heap
page read and write
1C2E4547000
heap
page read and write
19933001000
heap
page read and write
1B65F9C4000
heap
page read and write
19932FEA000
heap
page read and write
1C2E4561000
heap
page read and write
19930813000
heap
page read and write
1B65F9D5000
heap
page read and write
1B65F9D5000
heap
page read and write
20E691A0000
trusted library allocation
page read and write
1C2E4568000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E4560000
heap
page read and write
199308FA000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E4570000
heap
page read and write
20B5F7D2000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E6CD0000
heap
page read and write
19932FFE000
heap
page read and write
199308CF000
heap
page read and write
199308DE000
heap
page read and write
20B5F7D9000
heap
page read and write
1C2E4674000
heap
page read and write
1C20120B000
heap
page read and write
1C2E4662000
heap
page read and write
199308B6000
heap
page read and write
8A483FD000
stack
page read and write
1993087D000
heap
page read and write
1992E91C000
heap
page read and write
1C2E6CEF000
heap
page read and write
20E65761000
heap
page read and write
1B65F9DA000
heap
page read and write
1C2E4556000
heap
page read and write
1B65F9C4000
heap
page read and write
255E72B7000
heap
page read and write
1993082C000
heap
page read and write
199308BF000
heap
page read and write
1C2E2627000
heap
page read and write
199308A6000
heap
page read and write
176CAC20000
heap
page read and write
1C202AE0000
heap
page read and write
19930906000
heap
page read and write
26D195E9000
heap
page read and write
1C2E457D000
heap
page read and write
20B5F733000
heap
page read and write
1B65F9D1000
heap
page read and write
1C2E456C000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E454C000
heap
page read and write
199333F0000
trusted library allocation
page read and write
255E8BFD000
heap
page read and write
1C202A70000
heap
page read and write
1B65F9C4000
heap
page read and write
255E7550000
heap
page read and write
1C2011B8000
heap
page read and write
21B97BDD000
heap
page read and write
26D195DB000
heap
page read and write
1B65F9CE000
heap
page read and write
20E6572E000
heap
page read and write
19932FD7000
heap
page read and write
1C2E456C000
heap
page read and write
1C2E4678000
heap
page read and write
21B97F74000
heap
page read and write
1992E965000
heap
page read and write
1C2E4564000
heap
page read and write
19930880000
heap
page read and write
1992E91C000
heap
page read and write
1C2E6D1E000
heap
page read and write
199308CA000
heap
page read and write
26D195D2000
heap
page read and write
1C2E6F20000
heap
page read and write
1C2011D7000
heap
page read and write
1C2E4544000
heap
page read and write
176CD520000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E6D0F000
heap
page read and write
1C2E4568000
heap
page read and write
176CD50A000
heap
page read and write
1993090E000
heap
page read and write
199308E3000
heap
page read and write
1C2E456D000
heap
page read and write
19930890000
heap
page read and write
B41357D000
stack
page read and write
7CC487E000
stack
page read and write
199308ED000
heap
page read and write
20E656D0000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E2639000
heap
page read and write
26D19780000
heap
page read and write
199307AF000
heap
page read and write
1C2E4581000
heap
page read and write
1B65F9CE000
heap
page read and write
199308B5000
heap
page read and write
8A485FE000
stack
page read and write
1C2E6D38000
heap
page read and write
1C2E4708000
heap
page read and write
199308D4000
heap
page read and write
255E8C02000
heap
page read and write
1C2E4575000
heap
page read and write
19930922000
heap
page read and write
1B65F9C4000
heap
page read and write
21B96296000
heap
page read and write
1992E93D000
heap
page read and write
199308B6000
heap
page read and write
1C2E455E000
heap
page read and write
199308E0000
heap
page read and write
26D195D7000
heap
page read and write
1C2E4562000
heap
page read and write
7CC48FF000
stack
page read and write
1C2E4578000
heap
page read and write
1B65F9D5000
heap
page read and write
1B65F9D1000
heap
page read and write
199308CA000
heap
page read and write
1C2E4579000
heap
page read and write
1C2E455E000
heap
page read and write
1B65F9D5000
heap
page read and write
1B65F9CE000
heap
page read and write
1C2E4589000
heap
page read and write
20B5F9F0000
trusted library allocation
page read and write
1B65F9C4000
heap
page read and write
199308A2000
heap
page read and write
19933012000
heap
page read and write
199307C3000
heap
page read and write
19932FF9000
heap
page read and write
199308BF000
heap
page read and write
1C2E469C000
heap
page read and write
199307B1000
heap
page read and write
1992E95D000
heap
page read and write
19930922000
heap
page read and write
1B65F9D5000
heap
page read and write
199308D4000
heap
page read and write
1C2E4589000
heap
page read and write
1C565600000
heap
page read and write
1C2E453F000
heap
page read and write
199308AB000
heap
page read and write
19930902000
heap
page read and write
1C2E4581000
heap
page read and write
1C2E4551000
heap
page read and write
255E8BF1000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E263E000
heap
page read and write
1C2E4568000
heap
page read and write
1C2E4662000
heap
page read and write
1B65F9BA000
heap
page read and write
1B65F9CE000
heap
page read and write
20B5F5C0000
heap
page read and write
1C2E46A0000
heap
page read and write
20E6574F000
heap
page read and write
1993082C000
heap
page read and write
21B97C2D000
heap
page read and write
1C2011BD000
heap
page read and write
199308FE000
heap
page read and write
1B65F9DA000
heap
page read and write
1993090A000
heap
page read and write
176CAC50000
heap
page read and write
1C2E4581000
heap
page read and write
1C2E455E000
heap
page read and write
1C2E4688000
heap
page read and write
1992E920000
heap
page read and write
1993086E000
heap
page read and write
19930878000
heap
page read and write
9E9B97E000
stack
page read and write
1C2E262A000
heap
page read and write
26D1B040000
heap
page read and write
1C2E4530000
heap
page read and write
255E8C03000
heap
page read and write
1C2E4532000
heap
page read and write
1C2E465B000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E4571000
heap
page read and write
329DCFF000
stack
page read and write
176CD68C000
heap
page read and write
1C2E455E000
heap
page read and write
1C2E4585000
heap
page read and write
1C2E46B5000
heap
page read and write
1C2E4556000
heap
page read and write
255E8B70000
heap
page read and write
21B97BB7000
heap
page read and write
199308BF000
heap
page read and write
1C2E4584000
heap
page read and write
768B87B000
stack
page read and write
1C2E4556000
heap
page read and write
19930805000
heap
page read and write
19930902000
heap
page read and write
1C2E4636000
heap
page read and write
1C2E4575000
heap
page read and write
1B65F9C4000
heap
page read and write
19930891000
heap
page read and write
1C2E6D1A000
heap
page read and write
19933041000
heap
page read and write
1C2E6CEC000
heap
page read and write
19930916000
heap
page read and write
20E65778000
heap
page read and write
9E9B8FE000
stack
page read and write
255E72F1000
heap
page read and write
1992E92F000
heap
page read and write
1992E914000
heap
page read and write
1992E956000
heap
page read and write
1B65F9C4000
heap
page read and write
B41347E000
stack
page read and write
21B97C3D000
heap
page read and write
1C2E6D3B000
heap
page read and write
21B9625F000
heap
page read and write
255E8B78000
heap
page read and write
26D195ED000
heap
page read and write
20B5F7D0000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E4678000
heap
page read and write
1C2E455A000
heap
page read and write
1C2E4556000
heap
page read and write
199308B6000
heap
page read and write
21B96272000
heap
page read and write
1B65F9C4000
heap
page read and write
19930926000
heap
page read and write
1C2E46B4000
heap
page read and write
1C2E6D0C000
heap
page read and write
1B65F9B9000
heap
page read and write
26D195D5000
heap
page read and write
1B65F9B1000
heap
page read and write
1C2011D2000
heap
page read and write
20E6572D000
heap
page read and write
1C2E4510000
heap
page read and write
1B65F9C4000
heap
page read and write
21B97C2A000
heap
page read and write
1C2E267B000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E454D000
heap
page read and write
1992E940000
heap
page read and write
1B65F9B3000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E25BC000
heap
page read and write
1B65F9D5000
heap
page read and write
19933000000
heap
page read and write
26D195DA000
heap
page read and write
1C2E4556000
heap
page read and write
20E67155000
heap
page read and write
1B663AD0000
heap
page read and write
19930936000
heap
page read and write
1C2E2645000
heap
page read and write
1B65F9AA000
heap
page read and write
1B65F9C4000
heap
page read and write
20B5F7FA000
heap
page read and write
1C2E6CF5000
heap
page read and write
1C2E263C000
heap
page read and write
1B65F9C4000
heap
page read and write
19933000000
heap
page read and write
1C2E455E000
heap
page read and write
1C2E4551000
heap
page read and write
199329D0000
trusted library allocation
page read and write
1992E95A000
heap
page read and write
1C2E2650000
heap
page read and write
199307F7000
heap
page read and write
1C2E46BB000
heap
page read and write
1C2E4567000
heap
page read and write
1C2E4536000
heap
page read and write
1B65F9C4000
heap
page read and write
1993087E000
heap
page read and write
21B9628E000
heap
page read and write
1C2E452D000
heap
page read and write
1993086E000
heap
page read and write
19930932000
heap
page read and write
1B65F9C4000
heap
page read and write
199308A5000
heap
page read and write
12E9C7E000
stack
page read and write
1C2E2640000
heap
page read and write
1C2E4553000
heap
page read and write
F036DFD000
stack
page read and write
1C2E4575000
heap
page read and write
1B65F9BB000
heap
page read and write
1C2E4580000
heap
page read and write
20B5FA05000
heap
page read and write
1B65F9CE000
heap
page read and write
199308C4000
heap
page read and write
1C2011E0000
heap
page read and write
199308B5000
heap
page read and write
8A486FE000
stack
page read and write
12E9F7C000
stack
page read and write
1C2E3F9E000
heap
page read and write
1B65F9D1000
heap
page read and write
20B5F730000
heap
page read and write
20B62E40000
trusted library allocation
page read and write
11CDFBE000
stack
page read and write
1B65FA40000
heap
page read and write
199308BF000
heap
page read and write
176C9293000
heap
page read and write
21B97C30000
heap
page read and write
1B65F9D5000
heap
page read and write
1993092E000
heap
page read and write
1C2E4655000
heap
page read and write
1993079E000
heap
page read and write
20B5F7D3000
heap
page read and write
26D195DD000
heap
page read and write
768B3DE000
stack
page read and write
199308BA000
heap
page read and write
199308BA000
heap
page read and write
1C2E6D00000
heap
page read and write
20B5F7DC000
heap
page read and write
1C2E4556000
heap
page read and write
1B65F97E000
heap
page read and write
1C2E4575000
heap
page read and write
1C2E4569000
heap
page read and write
1993090A000
heap
page read and write
1C201140000
heap
page read and write
1C2E46AE000
heap
page read and write
26D1B044000
heap
page read and write
1C5656C8000
heap
page read and write
19932FBC000
heap
page read and write
1C2E466F000
heap
page read and write
1C2E2627000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E469C000
heap
page read and write
199308DF000
heap
page read and write
20E6576E000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E4585000
heap
page read and write
19933017000
heap
page read and write
84B7AFE000
stack
page read and write
9692FFE000
stack
page read and write
1C2E466C000
heap
page read and write
1C2E4538000
heap
page read and write
84B7A7E000
stack
page read and write
1B65F9D3000
heap
page read and write
1B65F975000
heap
page read and write
1C2E457E000
heap
page read and write
1B65F9BF000
heap
page read and write
11CDF39000
stack
page read and write
1C2E46E4000
heap
page read and write
26D19598000
heap
page read and write
26D195C8000
heap
page read and write
1C2E4525000
heap
page read and write
1C2E4576000
heap
page read and write
1C2011B3000
heap
page read and write
199307A7000
heap
page read and write
1C2E4590000
heap
page read and write
199308C3000
heap
page read and write
1C2E6CFB000
heap
page read and write
21B97C37000
heap
page read and write
255E8B96000
heap
page read and write
1B65F9C4000
heap
page read and write
1992E8D1000
heap
page read and write
1C2E6D34000
heap
page read and write
19932FD0000
heap
page read and write
19930932000
heap
page read and write
1C2E456C000
heap
page read and write
199301BE000
heap
page read and write
20B618C0000
trusted library allocation
page read and write
1992E932000
heap
page read and write
1993302D000
heap
page read and write
20B5F7D4000
heap
page read and write
1C2E466C000
heap
page read and write
21B9625F000
heap
page read and write
11CE47E000
stack
page read and write
199308A1000
heap
page read and write
1C2E4698000
heap
page read and write
255E91C3000
heap
page read and write
21B97D73000
heap
page read and write
199301B5000
heap
page read and write
1B65F9D5000
heap
page read and write
1992E870000
heap
page read and write
1C2E263A000
heap
page read and write
20E656C0000
heap
page read and write
1C2E4561000
heap
page read and write
1B65F9CE000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E456C000
heap
page read and write
1C2E453F000
heap
page read and write
1C201180000
heap
page read and write
19930790000
heap
page read and write
199308F1000
heap
page read and write
B41319E000
stack
page read and write
1C2E6D17000
heap
page read and write
21B96273000
heap
page read and write
1B65F9C4000
heap
page read and write
21B97C3D000
heap
page read and write
21B97C37000
heap
page read and write
1B65F9CE000
heap
page read and write
1C202AE3000
heap
page read and write
176CD512000
heap
page read and write
199308BF000
heap
page read and write
1C5656C0000
heap
page read and write
176C9269000
heap
page read and write
21B99B20000
trusted library allocation
page read and write
176C9260000
heap
page read and write
26D195D0000
heap
page read and write
1C2E2672000
heap
page read and write
199308D4000
heap
page read and write
1B65F9D1000
heap
page read and write
1C2E4579000
heap
page read and write
1C2E4667000
heap
page read and write
1C2E453B000
heap
page read and write
19930829000
heap
page read and write
1B65F9D5000
heap
page read and write
1B65F9D5000
heap
page read and write
199308C3000
heap
page read and write
21B97D70000
heap
page read and write
199308AD000
heap
page read and write
20B5F7ED000
heap
page read and write
1B65F9D5000
heap
page read and write
21B99B2B000
heap
page read and write
20E656F0000
heap
page read and write
1C2E6CEC000
heap
page read and write
19932FD2000
heap
page read and write
199308AB000
heap
page read and write
1C2E4560000
heap
page read and write
1C2E6D2C000
heap
page read and write
1B65F9D3000
heap
page read and write
19932FA7000
heap
page read and write
21B97D00000
trusted library allocation
page read and write
26D1B059000
heap
page read and write
1C2E452D000
heap
page read and write
1993089E000
heap
page read and write
1C2E2647000
heap
page read and write
176C92B8000
heap
page read and write
1C2E6D0D000
heap
page read and write
1992E953000
heap
page read and write
9E9BA7E000
stack
page read and write
199308AB000
heap
page read and write
1992E94B000
heap
page read and write
199308E3000
heap
page read and write
21B9627F000
heap
page read and write
199308BF000
heap
page read and write
1992E94B000
heap
page read and write
1C2E6D05000
heap
page read and write
26D1B050000
heap
page read and write
1C2011E9000
heap
page read and write
1993089B000
heap
page read and write
1992E923000
heap
page read and write
20E67150000
heap
page read and write
176CAC55000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9B3000
heap
page read and write
1B65F9D3000
heap
page read and write
1B661380000
heap
page read and write
1B65F9D5000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E4640000
heap
page read and write
255E72F0000
heap
page read and write
21B96273000
heap
page read and write
21B97C35000
heap
page read and write
1C2E4556000
heap
page read and write
1992E916000
heap
page read and write
19930926000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E456C000
heap
page read and write
199307D1000
heap
page read and write
199307BE000
heap
page read and write
1C2E8D12000
trusted library allocation
page read and write
1C2E266A000
heap
page read and write
1C2E4563000
heap
page read and write
1992E95C000
heap
page read and write
1C2E6CDB000
heap
page read and write
1C2E457D000
heap
page read and write
199308B1000
heap
page read and write
1B65F9D1000
heap
page read and write
11CE37D000
stack
page read and write
1C2E4556000
heap
page read and write
1B65F9D5000
heap
page read and write
199308F8000
heap
page read and write
26D195D0000
heap
page read and write
19932FAA000
heap
page read and write
20B62E40000
trusted library allocation
page read and write
1C2E4532000
heap
page read and write
1C2E2674000
heap
page read and write
7CC497E000
stack
page read and write
199307FD000
heap
page read and write
1B65F9D1000
heap
page read and write
255E72ED000
heap
page read and write
1C2E2671000
heap
page read and write
176CAB10000
heap
page read and write
1B65F9C4000
heap
page read and write
21B96273000
heap
page read and write
1C2E267E000
heap
page read and write
21B97C37000
heap
page read and write
1C2E464F000
heap
page read and write
21B96288000
heap
page read and write
1C2E4561000
heap
page read and write
199308C3000
heap
page read and write
1C2E4696000
heap
page read and write
255E72E1000
heap
page read and write
199307F7000
heap
page read and write
176CAB83000
heap
page read and write
96932FF000
stack
page read and write
1C2E4611000
heap
page read and write
1C2E464F000
heap
page read and write
199308C3000
heap
page read and write
1B65F9C4000
heap
page read and write
F03697A000
stack
page read and write
1993300F000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E4571000
heap
page read and write
255E72FE000
heap
page read and write
1C2E9100000
heap
page read and write
1C2E4532000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E2636000
heap
page read and write
1C2E463A000
heap
page read and write
21B9628D000
heap
page read and write
26D1AFD0000
heap
page read and write
1C2E4585000
heap
page read and write
20E67253000
heap
page read and write
1C2E4585000
heap
page read and write
1992E8E2000
heap
page read and write
1C2E4536000
heap
page read and write
1C2E263E000
heap
page read and write
1992E94D000
heap
page read and write
199308FE000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E6CE8000
heap
page read and write
1C2E4581000
heap
page read and write
1C2E4532000
heap
page read and write
199308CA000
heap
page read and write
1C2E457D000
heap
page read and write
1C2E458E000
heap
page read and write
19930875000
heap
page read and write
20E65758000
heap
page read and write
199308C6000
heap
page read and write
1C2E4536000
heap
page read and write
1B661210000
heap
page read and write
1C2E46F6000
heap
page read and write
255E8BFB000
heap
page read and write
176C9297000
heap
page read and write
1B65F9CE000
heap
page read and write
20B5F7D8000
heap
page read and write
1B65F9C4000
heap
page read and write
199308F6000
heap
page read and write
20B5F7D1000
heap
page read and write
1B65F9D3000
heap
page read and write
1C2E4568000
heap
page read and write
1C2E4520000
heap
page read and write
21B9626E000
heap
page read and write
20B5F7E3000
heap
page read and write
7DF4EA831000
trusted library allocation
page execute read
1C2E4686000
heap
page read and write
1993090E000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E4585000
heap
page read and write
1B65F9C4000
heap
page read and write
19932FEB000
heap
page read and write
1C2E455A000
heap
page read and write
1B65F9CE000
heap
page read and write
1C2E262D000
heap
page read and write
1C2E4589000
heap
page read and write
21B96297000
heap
page read and write
1C2E4551000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E6D2A000
heap
page read and write
19932FAA000
heap
page read and write
21B97CC0000
heap
page read and write
199307B7000
heap
page read and write
1C2011BC000
heap
page read and write
1C2E4570000
heap
page read and write
199308B5000
heap
page read and write
1C2E455E000
heap
page read and write
21B96275000
heap
page read and write
176CD58E000
heap
page read and write
176C9230000
heap
page read and write
176C92CB000
heap
page read and write
1C2E262E000
heap
page read and write
199308ED000
heap
page read and write
12E9D7E000
stack
page read and write
1C2E4576000
heap
page read and write
1B65F9C4000
heap
page read and write
199308CE000
heap
page read and write
19933009000
heap
page read and write
1C2E453F000
heap
page read and write
21B97C3D000
heap
page read and write
1C2E452D000
heap
page read and write
20E6577F000
heap
page read and write
1B65F9CE000
heap
page read and write
1C2E4576000
heap
page read and write
1B65F981000
heap
page read and write
1C2E6D22000
heap
page read and write
199308D2000
heap
page read and write
19930912000
heap
page read and write
1C2E457A000
heap
page read and write
1C2E466F000
heap
page read and write
1C2E459A000
heap
page read and write
1C201188000
heap
page read and write
1C2E4585000
heap
page read and write
199307CE000
heap
page read and write
329D55A000
stack
page read and write
1C2E4579000
heap
page read and write
1B65F9CE000
heap
page read and write
255E7200000
heap
page read and write
1C2E6D38000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9C4000
heap
page read and write
255E72F8000
heap
page read and write
8A482FA000
stack
page read and write
1B65F9D5000
heap
page read and write
1B65F9D6000
heap
page read and write
1C2E4647000
heap
page read and write
1C2E2642000
heap
page read and write
199308C4000
heap
page read and write
1C2E4585000
heap
page read and write
1C2E6D29000
heap
page read and write
768BAFB000
stack
page read and write
1C2E2654000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E6CF7000
heap
page read and write
1B65F9C4000
heap
page read and write
20B5F7F8000
heap
page read and write
21B9627B000
heap
page read and write
1C2E4120000
heap
page read and write
1B65F9C1000
heap
page read and write
1B65F9D5000
heap
page read and write
20E67080000
heap
page read and write
1C2E3F90000
heap
page read and write
199307B3000
heap
page read and write
1C2E455A000
heap
page read and write
20E65745000
heap
page read and write
1B65F9D1000
heap
page read and write
1C2E4550000
heap
page read and write
1C2011BB000
heap
page read and write
19932FA4000
heap
page read and write
1C2E263E000
heap
page read and write
1992E95E000
heap
page read and write
1B65F9D5000
heap
page read and write
1C2E46D0000
heap
page read and write
96930FD000
stack
page read and write
1C2E455A000
heap
page read and write
255E8BFE000
heap
page read and write
21B97C3E000
heap
page read and write
255E72E1000
heap
page read and write
199307EA000
heap
page read and write
19932FD5000
heap
page read and write
199308E2000
heap
page read and write
1B65F9BB000
heap
page read and write
19930834000
heap
page read and write
1B65F9B9000
heap
page read and write
1C2E4678000
heap
page read and write
1C2E457A000
heap
page read and write
1C565645000
heap
page read and write
176CD506000
heap
page read and write
1C565640000
heap
page read and write
1C2E4582000
heap
page read and write
1B65F9D1000
heap
page read and write
199308C9000
heap
page read and write
1C2E454A000
heap
page read and write
176C92A6000
heap
page read and write
1B65F9D5000
heap
page read and write
19930916000
heap
page read and write
199308D2000
heap
page read and write
1992E8A5000
heap
page read and write
199308E0000
heap
page read and write
255E72FD000
heap
page read and write
B4135FF000
stack
page read and write
1B65F9C4000
heap
page read and write
20E65767000
heap
page read and write
199308F6000
heap
page read and write
1B65F9BB000
heap
page read and write
26D195DA000
heap
page read and write
1B65F9D3000
heap
page read and write
19935D32000
heap
page read and write
1C2E4123000
heap
page read and write
199308B1000
heap
page read and write
1993091A000
heap
page read and write
1B65F9CE000
heap
page read and write
255E8BEF000
heap
page read and write
1B65F9C4000
heap
page read and write
20E67170000
trusted library allocation
page read and write
1C2E455E000
heap
page read and write
199308DB000
heap
page read and write
176CD51B000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2011D8000
heap
page read and write
1C2E458E000
heap
page read and write
1C2E4552000
heap
page read and write
20E65734000
heap
page read and write
1B65F9C4000
heap
page read and write
176CAC5C000
heap
page read and write
255E72F4000
heap
page read and write
1993079B000
heap
page read and write
20E6715C000
heap
page read and write
F0371FE000
stack
page read and write
199308BF000
heap
page read and write
1C2E4550000
heap
page read and write
1B65F9D5000
heap
page read and write
1B65F9BB000
heap
page read and write
176CAC00000
trusted library allocation
page read and write
B4134FE000
stack
page read and write
1992E96E000
heap
page read and write
1B65F9D5000
heap
page read and write
19930906000
heap
page read and write
20E6572D000
heap
page read and write
1C2E457D000
heap
page read and write
1B65F9C4000
heap
page read and write
7CC45EC000
stack
page read and write
19932FCB000
heap
page read and write
1C2E4569000
heap
page read and write
199308BF000
heap
page read and write
1C2E4707000
heap
page read and write
19932FCC000
heap
page read and write
768BBFF000
stack
page read and write
255EA920000
trusted library allocation
page read and write
1C2E4647000
heap
page read and write
1992E927000
heap
page read and write
1C2E6CF0000
heap
page read and write
20E65735000
heap
page read and write
1B65F9C4000
heap
page read and write
1B65F9CE000
heap
page read and write
1C2E2450000
heap
page read and write
21B97C26000
heap
page read and write
21B961B0000
heap
page read and write
21B97C28000
heap
page read and write
9692EFD000
stack
page read and write
1B65F9CE000
heap
page read and write
9E9BB7E000
stack
page read and write
21B96180000
heap
page read and write
1C2E4647000
heap
page read and write
1C2E465C000
heap
page read and write
1C2011D7000
heap
page read and write
1C2E4688000
heap
page read and write
1C2E4589000
heap
page read and write
199308C3000
heap
page read and write
19935D08000
heap
page read and write
768B355000
stack
page read and write
1B661260000
heap
page read and write
1B65F9D5000
heap
page read and write
19932FA0000
heap
page read and write
11CE27E000
stack
page read and write
1C2E4595000
heap
page read and write
1992E94E000
heap
page read and write
1B65F971000
heap
page read and write
1C2E9550000
trusted library allocation
page read and write
1C2E4656000
heap
page read and write
19932FE7000
heap
page read and write
26D195A4000
heap
page read and write
1B65F9D1000
heap
page read and write
199307B1000
heap
page read and write
1C2E4586000
heap
page read and write
1C2E46EB000
heap
page read and write
1C2E6D39000
heap
page read and write
1B65F9C4000
heap
page read and write
1993092A000
heap
page read and write
1C2E4585000
heap
page read and write
12E9CFE000
stack
page read and write
199307EC000
heap
page read and write
1B65F9C4000
heap
page read and write
176C9150000
heap
page read and write
1B65F9C4000
heap
page read and write
199308D1000
heap
page read and write
12EA17B000
stack
page read and write
199308CE000
heap
page read and write
1B65F9C4000
heap
page read and write
255E8C84000
heap
page read and write
1C2E6D36000
heap
page read and write
1C2E6D1E000
heap
page read and write
1B65F9D5000
heap
page read and write
1B65F9C4000
heap
page read and write
255E72DC000
heap
page read and write
1C2E4568000
heap
page read and write
329DBFE000
stack
page read and write
1B661383000
heap
page read and write
20B5F797000
heap
page read and write
19930834000
heap
page read and write
1B65F9C4000
heap
page read and write
1C2E456C000
heap
page read and write
1993300F000
heap
page read and write
1C2E466C000
heap
page read and write
1C2E4568000
heap
page read and write
1992E730000
heap
page read and write
1993093A000
heap
page read and write
199308D0000
heap
page read and write
199308C9000
heap
page read and write
1C2E2580000
heap
page read and write
1C2E461D000
heap
page read and write
1C2E6D17000
heap
page read and write
19930916000
heap
page read and write
199308AA000
heap
page read and write
26D195F3000
heap
page read and write
20B5FA00000
heap
page read and write
1C2E4571000
heap
page read and write
1C2E4545000
heap
page read and write
20E65728000
heap
page read and write
1C2E456E000
heap
page read and write
19933021000
heap
page read and write
1C2011BB000
heap
page read and write
19933030000
heap
page read and write
26D195F3000
heap
page read and write
21B96290000
heap
page read and write
1C2E456D000
heap
page read and write
1992E953000
heap
page read and write
19932FFB000
heap
page read and write
199308F6000
heap
page read and write
1992E91C000
heap
page read and write
199308DB000
heap
page read and write
There are 1401 hidden memdumps, click here to show them.