IOC Report
I&A_mileageForm.pdf

loading gif

Files

File Path
Type
Category
Malicious
I&A_mileageForm.pdf
PDF document, version 1.6 (zip deflate encoded)
initial sample
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\9e3c9560-4ba7-477e-8f52-1faf900f2741.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db
SQLite 3.x database, last written using SQLite version 3040000, writer version 2, read version 2, file counter 1, database pages 1, cookie 0, schema 0, unknown 0 encoding, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db-shm
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\CreativeCloud\CoreSync\EntitySync-2024-04-20.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\CreativeCloud\CoreSync\EntitySync-2024-04-21.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\CreativeCloud\CoreSync\EntitySync-2024-04-22.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\RFL\LocalMapping\RFLDB230
SQLite 3.x database, last written using SQLite version 3040000, file counter 1, database pages 8, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\RFL\LocalMapping\RFLDB230-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-240420143044Z-639.bmp
PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 15, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 15
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Reader\Synchronizer\metadata\Synchronizer
SQLite 3.x database, last written using SQLite version 3040000, file counter 1, database pages 23, cookie 0x11, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Reader\Synchronizer\metadata\Synchronizer-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.1440
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.dat
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 30, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 30
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Temp\MSIee400.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A913kty8z_1winama_140.tmp
PDF document, version 1.6, 0 pages
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A918mvra3_1winam9_140.tmp
TrueType Font data, digitally signed, 25 tables, 1st "DSIG", 58 names, Unicode, \251 2017 The Monotype Corporation. All Rights Reserved.
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A91ntni4a_1winamo_140.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A9h8w0s7_1winam8_140.tmp
PDF document, version 1.6, 0 pages
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-04-20 16-30-42-889.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\346c0aee-8634-40a9-9f3d-beb58f1294ef.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 921996
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\479c758e-0eaf-41c1-bae4-3e2fadc726fe.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\8061cff2-101f-42d5-88d8-7d5187f20fcb.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\d512b327-69fd-4610-8fb6-0eb6cdc20fc1.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\JSCache\GlobSettings
ASCII text
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\TMDocs.sav
data
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\TMGrpPrm.sav
data
dropped
There are 52 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\I&A_mileageForm.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=6352
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=7316
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=7416
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=7524
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=7628
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=7728
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2104 --field-trial-handle=1540,i,13543496977365774410,5141392604321544278,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Program Files\Adobe\Acrobat DC\Acrobat\RDCNotificationClient\FullTrustNotifier.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\RDCNotificationClient\FullTrustNotifier.exe" GetChannelUri
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://wns.windows.com/47
unknown
http://www.aiim.org/pdfua/ns/id/
unknown
https://android.notify.windows.com/iOS
unknown
https://android.notify.windows.com/iOSr
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown

IPs

IP
Domain
Country
Malicious
52.5.13.197
unknown
United States
23.54.200.159
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\Privileged
syncFolderSetupDone
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Synchronizer\DC\WebSocketNotifInfra
bisWSExpEnabled
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Synchronizer\DC\Acrobat.com
tUniqueIdForEureka
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22C7574C000
heap
page read and write
2C5292A1000
heap
page read and write
23B81645000
heap
page read and write
18B81528000
heap
page read and write
22C75706000
heap
page read and write
2C5292A1000
heap
page read and write
2662495D000
heap
page read and write
1D0A60E9000
heap
page read and write
1D0A6098000
heap
page read and write
25821978000
heap
page read and write
1C70BF9F000
heap
page read and write
1BDE91F4000
heap
page read and write
258219F8000
heap
page read and write
23B81615000
heap
page read and write
1BDE9206000
heap
page read and write
1AF4C965000
heap
page read and write
1BDE91F1000
heap
page read and write
A26CAFE000
stack
page read and write
1C70BF4A000
heap
page read and write
2C5292BA000
heap
page read and write
1D0A60E9000
heap
page read and write
2C529295000
heap
page read and write
1D0A6103000
heap
page read and write
1BDE9255000
heap
page read and write
2C52926C000
heap
page read and write
D0566FE000
stack
page read and write
85D77D9000
stack
page read and write
22C7575A000
heap
page read and write
2C527208000
heap
page read and write
254CE340000
heap
page read and write
2662490E000
heap
page read and write
23B8161F000
heap
page read and write
68E98FE000
stack
page read and write
2C529110000
heap
page read and write
2C5292AB000
heap
page read and write
18B813B0000
heap
page read and write
1C70BF37000
heap
page read and write
2C5292BA000
heap
page read and write
25821A36000
heap
page read and write
26624840000
heap
page read and write
23B815F5000
heap
page read and write
2C5292BC000
heap
page read and write
22C75825000
heap
page read and write
29458995000
heap
page read and write
2C5292A1000
heap
page read and write
D10000
heap
page read and write
23B81588000
heap
page read and write
2C5292BA000
heap
page read and write
1BDE9266000
heap
page read and write
254CE261000
heap
page read and write
18B81529000
heap
page read and write
254CE1EB000
heap
page read and write
859BDFE000
stack
page read and write
22C75733000
heap
page read and write
2C5292BC000
heap
page read and write
2D5E000
stack
page read and write
29458792000
heap
page read and write
254CE235000
heap
page read and write
22C75704000
heap
page read and write
1AF4C744000
heap
page read and write
2C5292BA000
heap
page read and write
1D0A6028000
heap
page read and write
23B815FB000
heap
page read and write
9AC000
stack
page read and write
2C5292A7000
heap
page read and write
C0B0DFB000
stack
page read and write
2C5292BA000
heap
page read and write
2C5292BA000
heap
page read and write
2C527405000
heap
page read and write
D0567FE000
stack
page read and write
A26CCFE000
stack
page read and write
22C7577C000
heap
page read and write
2C5292BA000
heap
page read and write
1C70BF48000
heap
page read and write
85D7DFE000
stack
page read and write
1BDE9266000
heap
page read and write
C0B0CFF000
stack
page read and write
23B81610000
heap
page read and write
2C5292A1000
heap
page read and write
258219C1000
heap
page read and write
18B81552000
heap
page read and write
1501FFE000
stack
page read and write
2C5F000
stack
page read and write
2C529084000
heap
page read and write
1D0A60A1000
heap
page read and write
D0562FF000
stack
page read and write
B223F09000
stack
page read and write
2C529288000
heap
page read and write
254CE237000
heap
page read and write
2945A600000
heap
page read and write
B2248FD000
stack
page read and write
2582199B000
heap
page read and write
26624B20000
heap
page read and write
B960FFE000
stack
page read and write
2662496B000
heap
page read and write
2C529288000
heap
page read and write
23B8161D000
heap
page read and write
1AF4C6FD000
heap
page read and write
2C529288000
heap
page read and write
22C75722000
heap
page read and write
2C52908D000
heap
page read and write
2C527264000
heap
page read and write
2C5292A1000
heap
page read and write
E61000
heap
page read and write
254CE1F6000
heap
page read and write
2FED000
stack
page read and write
1D0A6094000
heap
page read and write
18B814F2000
heap
page read and write
23B81651000
heap
page read and write
1AF4C6EE000
heap
page read and write
2C5292BD000
heap
page read and write
18B81505000
heap
page read and write
1D0A6088000
heap
page read and write
254CE246000
heap
page read and write
254CE1EE000
heap
page read and write
2C5292BA000
heap
page read and write
18B8151E000
heap
page read and write
2C529092000
heap
page read and write
2E9E000
stack
page read and write
D056CFD000
stack
page read and write
85D7EFE000
stack
page read and write
2C5292A7000
heap
page read and write
D20000
heap
page read and write
1D0A5FB0000
heap
page read and write
68E9DFD000
stack
page read and write
1D0A60F2000
heap
page read and write
859B9FE000
stack
page read and write
2FD2FFE000
stack
page read and write
266248A0000
heap
page read and write
26624954000
heap
page read and write
254CE199000
heap
page read and write
2C529288000
heap
page read and write
1D0A609C000
heap
page read and write
D0569FE000
stack
page read and write
2C528FD0000
heap
page read and write
1AF4C714000
heap
page read and write
22C75758000
heap
page read and write
1C70BF75000
heap
page read and write
22C7574C000
heap
page read and write
1C70BF62000
heap
page read and write
258219E7000
heap
page read and write
1C70C100000
heap
page read and write
2C5292BA000
heap
page read and write
1AF4C703000
heap
page read and write
1AF4C70F000
heap
page read and write
25821A03000
heap
page read and write
254CE1E1000
heap
page read and write
1C70BF5C000
heap
page read and write
29BC000
stack
page read and write
22C75741000
heap
page read and write
2662492B000
heap
page read and write
25821A3A000
heap
page read and write
2C5292A7000
heap
page read and write
25821A36000
heap
page read and write
1D0A6116000
heap
page read and write
26624917000
heap
page read and write
22C7574C000
heap
page read and write
1D0A60B4000
heap
page read and write
15021FD000
stack
page read and write
2C5292A1000
heap
page read and write
2C5292A8000
heap
page read and write
1501BFD000
stack
page read and write
1AF4C72E000
heap
page read and write
1AF4C6F8000
heap
page read and write
26624B55000
heap
page read and write
23B81608000
heap
page read and write
2C5292A7000
heap
page read and write
258219D4000
heap
page read and write
1C70BF68000
heap
page read and write
1C70BF3C000
heap
page read and write
22C75717000
heap
page read and write
2C529268000
heap
page read and write
2C5292A1000
heap
page read and write
1D0A60AA000
heap
page read and write
1C70BF59000
heap
page read and write
2C5292A1000
heap
page read and write
1BDE9266000
heap
page read and write
258219EF000
heap
page read and write
2C5292BA000
heap
page read and write
1BDE9238000
heap
page read and write
2C529048000
heap
page read and write
2C529279000
heap
page read and write
1C70BED8000
heap
page read and write
23B8161B000
heap
page read and write
1C70BF24000
heap
page read and write
1D0A6094000
heap
page read and write
C0B10FD000
stack
page read and write
1AF4C688000
heap
page read and write
1BDE9204000
heap
page read and write
18B8156B000
heap
page read and write
25821A3E000
heap
page read and write
1BDE9222000
heap
page read and write
22C75704000
heap
page read and write
25821A3B000
heap
page read and write
68E97FE000
stack
page read and write
859BBFF000
stack
page read and write
2C5292A1000
heap
page read and write
1C70BCF0000
heap
page read and write
B2247FE000
stack
page read and write
2C529090000
heap
page read and write
1AF4C71A000
heap
page read and write
22C75650000
heap
page read and write
1AF4C6E6000
heap
page read and write
258219F2000
heap
page read and write
18B81509000
heap
page read and write
254CE1E1000
heap
page read and write
1AF4C708000
heap
page read and write
23B81645000
heap
page read and write
18B81536000
heap
page read and write
23B81601000
heap
page read and write
2C5292A1000
heap
page read and write
2C529019000
heap
page read and write
2C529090000
heap
page read and write
2C52904C000
heap
page read and write
859B8F9000
stack
page read and write
22C75820000
heap
page read and write
D055DFE000
stack
page read and write
22C75710000
heap
page read and write
2C5292A1000
heap
page read and write
23B8161B000
heap
page read and write
2C5292BD000
heap
page read and write
22C7574B000
heap
page read and write
2C5292BC000
heap
page read and write
2C5290CE000
heap
page read and write
1C70BFA1000
heap
page read and write
2C5292A5000
heap
page read and write
25821A11000
heap
page read and write
25821A09000
heap
page read and write
1C70BF67000
heap
page read and write
D055FFD000
stack
page read and write
2FD34FD000
stack
page read and write
2C5290BD000
heap
page read and write
254CE1E2000
heap
page read and write
254CE178000
heap
page read and write
2C5292A1000
heap
page read and write
22C756FA000
heap
page read and write
1AF4C6F8000
heap
page read and write
23B81645000
heap
page read and write
752B9FF000
stack
page read and write
2C5272F9000
heap
page read and write
2C529288000
heap
page read and write
2C5292A1000
heap
page read and write
1501EFE000
stack
page read and write
2C52906F000
heap
page read and write
1BDE91DC000
heap
page read and write
1BDE9238000
heap
page read and write
2662496B000
heap
page read and write
2C5292A7000
heap
page read and write
23B815E6000
heap
page read and write
18B81552000
heap
page read and write
2C5292BC000
heap
page read and write
1C70BF59000
heap
page read and write
2662491C000
heap
page read and write
25821A3E000
heap
page read and write
2C5292A1000
heap
page read and write
1C70BF4F000
heap
page read and write
25821890000
heap
page read and write
2C5292A1000
heap
page read and write
29458739000
heap
page read and write
1AF4C6F9000
heap
page read and write
254CE1F1000
heap
page read and write
254CE1E9000
heap
page read and write
1BDE9177000
heap
page read and write
1C70BF61000
heap
page read and write
254CE1F0000
heap
page read and write
1501DFF000
stack
page read and write
1AF4C738000
heap
page read and write
2C5272F5000
heap
page read and write
2C5292A1000
heap
page read and write
752B7FE000
stack
page read and write
1AF4C630000
heap
page read and write
29458650000
heap
page read and write
1BDE91F8000
heap
page read and write
22C7570E000
heap
page read and write
1BDE91F9000
heap
page read and write
2A50000
heap
page read and write
1BDE91DE000
heap
page read and write
254CE25A000
heap
page read and write
2C529001000
heap
page read and write
1C70BF86000
heap
page read and write
18B8150B000
heap
page read and write
23B81672000
heap
page read and write
2C5292BC000
heap
page read and write
1C70BF59000
heap
page read and write
2C5292BA000
heap
page read and write
2C5292BA000
heap
page read and write
2C5292A1000
heap
page read and write
254CE205000
heap
page read and write
258236A0000
heap
page read and write
254CE150000
heap
page read and write
B2246FE000
stack
page read and write
2C529048000
heap
page read and write
2C5292A7000
heap
page read and write
1AF4C746000
heap
page read and write
254CE1F4000
heap
page read and write
2C5292A1000
heap
page read and write
254CE1E5000
heap
page read and write
1D0A609D000
heap
page read and write
23B81672000
heap
page read and write
2C5292A1000
heap
page read and write
254CE425000
heap
page read and write
1501AF9000
stack
page read and write
2C529092000
heap
page read and write
D6E000
stack
page read and write
18B83290000
heap
page read and write
2C5292A1000
heap
page read and write
1BDE9120000
heap
page read and write
2C5292A1000
heap
page read and write
752BCFD000
stack
page read and write
68E9EFE000
stack
page read and write
22C756E3000
heap
page read and write
2C52904C000
heap
page read and write
2662492F000
heap
page read and write
2C528FD5000
heap
page read and write
2C52906F000
heap
page read and write
2C5292A1000
heap
page read and write
2C529019000
heap
page read and write
2C529031000
heap
page read and write
316E000
stack
page read and write
B9610FD000
stack
page read and write
D0568FF000
stack
page read and write
1C70BDD0000
heap
page read and write
2C5292BA000
heap
page read and write
266248A8000
heap
page read and write
22C75728000
heap
page read and write
2C5292BA000
heap
page read and write
2C5292A1000
heap
page read and write
1AF4C752000
heap
page read and write
23B8160B000
heap
page read and write
2C5292A1000
heap
page read and write
2C5292A1000
heap
page read and write
26624B50000
heap
page read and write
2C529288000
heap
page read and write
1AF4C709000
heap
page read and write
22C75690000
heap
page read and write
2C52908F000
heap
page read and write
15020FE000
stack
page read and write
2C5292A1000
heap
page read and write
23B81602000
heap
page read and write
2C5292BA000
heap
page read and write
1C70BF40000
heap
page read and write
2C5292BC000
heap
page read and write
2C5292BC000
heap
page read and write
752B6FE000
stack
page read and write
26624925000
heap
page read and write
752BEFE000
stack
page read and write
1D0A60B7000
heap
page read and write
23B815D2000
heap
page read and write
B2243FE000
stack
page read and write
DE0000
heap
page read and write
1BDE924D000
heap
page read and write
22C7577C000
heap
page read and write
2C5292BC000
heap
page read and write
2C529077000
heap
page read and write
2C529075000
heap
page read and write
1BDE9266000
heap
page read and write
2C5292A1000
heap
page read and write
B63A6F9000
stack
page read and write
2C529288000
heap
page read and write
2C52926D000
heap
page read and write
1AF4C72E000
heap
page read and write
22C75758000
heap
page read and write
1BDE9238000
heap
page read and write
2C5292BC000
heap
page read and write
258219E3000
heap
page read and write
1C70BED0000
heap
page read and write
D0563FC000
stack
page read and write
254CE1EB000
heap
page read and write
254CE1EA000
heap
page read and write
B2249FF000
stack
page read and write
254CE235000
heap
page read and write
A26CBFE000
stack
page read and write
1BDE91EE000
heap
page read and write
254CE1D9000
heap
page read and write
2C528FF7000
heap
page read and write
294587C8000
heap
page read and write
26624931000
heap
page read and write
1D0A60CE000
heap
page read and write
22C756FE000
heap
page read and write
2C52926D000
heap
page read and write
254CE208000
heap
page read and write
23B81875000
heap
page read and write
2C529021000
heap
page read and write
68E96F9000
stack
page read and write
B63A8FE000
stack
page read and write
254CE1E0000
heap
page read and write
2945A610000
heap
page read and write
C0B0AFE000
stack
page read and write
254CE1FE000
heap
page read and write
D0560FE000
stack
page read and write
2C529260000
heap
page read and write
258219DD000
heap
page read and write
2C529279000
heap
page read and write
2C529054000
heap
page read and write
23B81645000
heap
page read and write
1C70C105000
heap
page read and write
1AF4C6F0000
heap
page read and write
29458640000
heap
page read and write
2C5292BA000
heap
page read and write
258219E2000
heap
page read and write
2C5292BA000
heap
page read and write
1D0A609D000
heap
page read and write
254CE24B000
heap
page read and write
254CE1DA000
heap
page read and write
22C75758000
heap
page read and write
2C5292A1000
heap
page read and write
23B815E4000
heap
page read and write
258217B0000
heap
page read and write
2C5292C7000
heap
page read and write
2C5292A1000
heap
page read and write
1BDE91E6000
heap
page read and write
1BDE91E7000
heap
page read and write
18B81560000
heap
page read and write
D056BFC000
stack
page read and write
23B815FF000
heap
page read and write
23B81540000
heap
page read and write
18B81547000
heap
page read and write
2C529028000
heap
page read and write
2C529092000
heap
page read and write
29FE000
stack
page read and write
2C528FF7000
heap
page read and write
1D0A63C5000
heap
page read and write
1C70BF9E000
heap
page read and write
18B814A8000
heap
page read and write
23B81580000
heap
page read and write
1BDE91DD000
heap
page read and write
2C52926D000
heap
page read and write
A26CEFE000
stack
page read and write
1C70BF86000
heap
page read and write
1BDE9213000
heap
page read and write
2C5292A1000
heap
page read and write
B2245FF000
stack
page read and write
1BDE9460000
heap
page read and write
B960AFE000
stack
page read and write
2C529288000
heap
page read and write
1AF4C752000
heap
page read and write
2C527200000
heap
page read and write
2C5292A1000
heap
page read and write
1AF4C745000
heap
page read and write
23B815EA000
heap
page read and write
2C5292BA000
heap
page read and write
2A55000
heap
page read and write
2C527400000
heap
page read and write
2C5292A1000
heap
page read and write
1C70BF83000
heap
page read and write
2C5292C7000
heap
page read and write
D0565FF000
stack
page read and write
1BDE9221000
heap
page read and write
752BBFE000
stack
page read and write
2C5292A1000
heap
page read and write
2C5292A1000
heap
page read and write
2C5292BC000
heap
page read and write
25821A39000
heap
page read and write
254CE20B000
heap
page read and write
752BAFE000
stack
page read and write
18B81560000
heap
page read and write
2C529031000
heap
page read and write
18B814C9000
heap
page read and write
26624924000
heap
page read and write
E1A000
heap
page read and write
1C70BF4F000
heap
page read and write
2C529045000
heap
page read and write
23B81610000
heap
page read and write
2C52906E000
heap
page read and write
2C529039000
heap
page read and write
1C70BF84000
heap
page read and write
2C5292A1000
heap
page read and write
1BDE924D000
heap
page read and write
2C5292BC000
heap
page read and write
2FD32FE000
stack
page read and write
18B81515000
heap
page read and write
2C5292BC000
heap
page read and write
18B815A0000
heap
page read and write
2662493B000
heap
page read and write
258219F9000
heap
page read and write
1C70BF46000
heap
page read and write
2C5292A1000
heap
page read and write
18B81517000
heap
page read and write
2C5273D0000
heap
page read and write
29458990000
heap
page read and write
258219EC000
heap
page read and write
258219DB000
heap
page read and write
1C70BF59000
heap
page read and write
18B8154B000
heap
page read and write
2C5292A1000
heap
page read and write
18B8153B000
heap
page read and write
2C5271E0000
heap
page read and write
859BEFE000
stack
page read and write
18B8153D000
heap
page read and write
D056BED000
stack
page read and write
2C5292BC000
heap
page read and write
254CE1F4000
heap
page read and write
1C70BF3F000
heap
page read and write
2C52906E000
heap
page read and write
1C70BF9A000
heap
page read and write
26624850000
heap
page read and write
D056DFF000
stack
page read and write
2C5292BC000
heap
page read and write
2C5292A1000
heap
page read and write
1C70BF86000
heap
page read and write
1BDE9100000
heap
page read and write
254CE25A000
heap
page read and write
2C5292A1000
heap
page read and write
2EEC000
stack
page read and write
1AF4C714000
heap
page read and write
A26D0FE000
stack
page read and write
254CE360000
heap
page read and write
22C75698000
heap
page read and write
258218B0000
heap
page read and write
25821A20000
heap
page read and write
85D7AFE000
stack
page read and write
A26D1FD000
stack
page read and write
2C5292A1000
heap
page read and write
25821970000
heap
page read and write
1AF4C712000
heap
page read and write
294586D6000
heap
page read and write
25821A3E000
heap
page read and write
254CE420000
heap
page read and write
15022FE000
stack
page read and write
2C52908F000
heap
page read and write
1C70BF48000
heap
page read and write
1AF4C680000
heap
page read and write
25821A00000
heap
page read and write
1D0A6020000
heap
page read and write
25821A3E000
heap
page read and write
1D0A6115000
heap
page read and write
B63ACFE000
stack
page read and write
B63AEFE000
stack
page read and write
2C5292A1000
heap
page read and write
254CE1D9000
heap
page read and write
1AF4C6B9000
heap
page read and write
B960BFE000
stack
page read and write
254CE1F0000
heap
page read and write
22C75630000
heap
page read and write
2C52908F000
heap
page read and write
2C5292A1000
heap
page read and write
2C5292A1000
heap
page read and write
B63ADFD000
stack
page read and write
2C5292A1000
heap
page read and write
1C70BF54000
heap
page read and write
23B81560000
heap
page read and write
1D0A60BC000
heap
page read and write
2C5292BA000
heap
page read and write
1AF4C723000
heap
page read and write
2C52908F000
heap
page read and write
22C756FD000
heap
page read and write
2C5292A1000
heap
page read and write
2C5292BA000
heap
page read and write
85D7BFE000
stack
page read and write
1BDE9203000
heap
page read and write
23B8163A000
heap
page read and write
1BDE9208000
heap
page read and write
1BDE924F000
heap
page read and write
23B81602000
heap
page read and write
254CE1F4000
heap
page read and write
2C529288000
heap
page read and write
2C529092000
heap
page read and write
B960CFE000
stack
page read and write
254CE1D5000
heap
page read and write
2C529007000
heap
page read and write
1D0A6093000
heap
page read and write
1AF4C6FF000
heap
page read and write
254CE1D3000
heap
page read and write
2C5292BC000
heap
page read and write
29458670000
heap
page read and write
18B8151F000
heap
page read and write
22C756F6000
heap
page read and write
22C75746000
heap
page read and write
2C52926C000
heap
page read and write
254CE20D000
heap
page read and write
2662495F000
heap
page read and write
254CE1ED000
heap
page read and write
1BDE920F000
heap
page read and write
2662496B000
heap
page read and write
1BDE91DD000
heap
page read and write
2C529092000
heap
page read and write
2C529043000
heap
page read and write
2C529054000
heap
page read and write
312E000
stack
page read and write
2FD2B19000
stack
page read and write
2C529092000
heap
page read and write
294587AC000
heap
page read and write
22C75550000
heap
page read and write
294587A3000
heap
page read and write
B960EFE000
stack
page read and write
254CE200000
heap
page read and write
2C5292BC000
heap
page read and write
1C70BF9A000
heap
page read and write
1AF4C960000
heap
page read and write
2C5292A1000
heap
page read and write
18B81560000
heap
page read and write
2C529075000
heap
page read and write
2C5292BC000
heap
page read and write
1D0A60E9000
heap
page read and write
22C75746000
heap
page read and write
254CE210000
heap
page read and write
DDE000
stack
page read and write
2B5C000
stack
page read and write
C0B0EFE000
stack
page read and write
1BDE9465000
heap
page read and write
1D0A63C0000
heap
page read and write
1C70BF65000
heap
page read and write
752B3A9000
stack
page read and write
1BDE9238000
heap
page read and write
2C529288000
heap
page read and write
302D000
stack
page read and write
18B81552000
heap
page read and write
2C5292A1000
heap
page read and write
2C529027000
heap
page read and write
2662496B000
heap
page read and write
26624907000
heap
page read and write
18B814A0000
heap
page read and write
26624916000
heap
page read and write
B2242FE000
stack
page read and write
1AF4C721000
heap
page read and write
2C5292A1000
heap
page read and write
254CE25D000
heap
page read and write
2C5292AB000
heap
page read and write
326F000
stack
page read and write
26624955000
heap
page read and write
1C70BF4F000
heap
page read and write
1AF4C700000
heap
page read and write
85D81FE000
stack
page read and write
859BFFD000
stack
page read and write
2662490F000
heap
page read and write
1BDE9170000
heap
page read and write
1C70BF3F000
heap
page read and write
22C75714000
heap
page read and write
2C52926C000
heap
page read and write
C0B0FFE000
stack
page read and write
1BDE91F8000
heap
page read and write
11DE000
stack
page read and write
2C52902F000
heap
page read and write
B2244FF000
stack
page read and write
E10000
heap
page read and write
2FD31FE000
stack
page read and write
2C5292A1000
heap
page read and write
1D0A60C1000
heap
page read and write
D90000
heap
page read and write
2C5292BC000
heap
page read and write
254CE1D8000
heap
page read and write
1BDE9210000
heap
page read and write
258219E5000
heap
page read and write
1C70BF52000
heap
page read and write
22C75730000
heap
page read and write
1D0A60F2000
heap
page read and write
2C5292A1000
heap
page read and write
26624931000
heap
page read and write
2C5292BA000
heap
page read and write
A26C7E9000
stack
page read and write
23B81645000
heap
page read and write
2C5292BA000
heap
page read and write
25821A36000
heap
page read and write
22C75758000
heap
page read and write
18B8156D000
heap
page read and write
1C70BF49000
heap
page read and write
2C52904C000
heap
page read and write
2C527250000
heap
page read and write
25821A06000
heap
page read and write
18B81560000
heap
page read and write
254CE21F000
heap
page read and write
2662493B000
heap
page read and write
85D7FFE000
stack
page read and write
23B81660000
heap
page read and write
1AF4C660000
heap
page read and write
25821A0C000
heap
page read and write
1AF4C640000
heap
page read and write
1AF4C752000
heap
page read and write
2C5292A1000
heap
page read and write
2C529288000
heap
page read and write
2FD30FE000
stack
page read and write
B63ABFE000
stack
page read and write
18B81522000
heap
page read and write
2C5292BC000
heap
page read and write
254CE235000
heap
page read and write
2FD2EFE000
stack
page read and write
2C5292BC000
heap
page read and write
1BDE920B000
heap
page read and write
2945A614000
heap
page read and write
23B81619000
heap
page read and write
1D0A60C4000
heap
page read and write
1AF4C72F000
heap
page read and write
1AF4C71C000
heap
page read and write
18B8153E000
heap
page read and write
1C70BF56000
heap
page read and write
2C5292BC000
heap
page read and write
1D0A6096000
heap
page read and write
B9611FF000
stack
page read and write
2C529019000
heap
page read and write
1D0A6115000
heap
page read and write
1AF4E640000
heap
page read and write
25821A0C000
heap
page read and write
2FD35FE000
stack
page read and write
23B81602000
heap
page read and write
22C75746000
heap
page read and write
22C75708000
heap
page read and write
1BDE9266000
heap
page read and write
18B81533000
heap
page read and write
2C52904C000
heap
page read and write
18B8150D000
heap
page read and write
1AF4C732000
heap
page read and write
1C70BEFA000
heap
page read and write
E4C000
heap
page read and write
C0B06F9000
stack
page read and write
1D0A6084000
heap
page read and write
18B81520000
heap
page read and write
26624937000
heap
page read and write
18B816B0000
heap
page read and write
2A3E000
stack
page read and write
2C5292BA000
heap
page read and write
1D0A60B9000
heap
page read and write
26624942000
heap
page read and write
2C529285000
heap
page read and write
D055EFE000
stack
page read and write
2662490A000
heap
page read and write
2C5292BC000
heap
page read and write
254CE235000
heap
page read and write
294587BC000
heap
page read and write
22C75703000
heap
page read and write
1AF4C752000
heap
page read and write
2C529045000
heap
page read and write
254CE210000
heap
page read and write
23B815EF000
heap
page read and write
26624925000
heap
page read and write
22C75758000
heap
page read and write
23B81870000
heap
page read and write
1AF4C726000
heap
page read and write
254CE170000
heap
page read and write
2C5292A1000
heap
page read and write
1C70BF3B000
heap
page read and write
2662493E000
heap
page read and write
C0B11F6000
stack
page read and write
B63A7FE000
stack
page read and write
29458734000
heap
page read and write
D056AFF000
stack
page read and write
68E9CFE000
stack
page read and write
25821A1B000
heap
page read and write
1BDE91FF000
heap
page read and write
68E9BFE000
stack
page read and write
2C5292BA000
heap
page read and write
2C528FDC000
heap
page read and write
18B81530000
heap
page read and write
1D0A60B6000
heap
page read and write
A26CDFE000
stack
page read and write
1C70BF4F000
heap
page read and write
1AF4C718000
heap
page read and write
859BCFE000
stack
page read and write
22C7574C000
heap
page read and write
18B81524000
heap
page read and write
752B8FF000
stack
page read and write
18B81534000
heap
page read and write
22C7572A000
heap
page read and write
2C529288000
heap
page read and write
2C5290AE000
heap
page read and write
23B81672000
heap
page read and write
2C52906E000
heap
page read and write
1BDE923E000
heap
page read and write
2C5292A1000
heap
page read and write
2C5292BC000
heap
page read and write
2C5292BA000
heap
page read and write
1C70BF6D000
heap
page read and write
2C529092000
heap
page read and write
D0564FE000
stack
page read and write
23B815EB000
heap
page read and write
D0561FE000
stack
page read and write
1D0A608E000
heap
page read and write
85D80FD000
stack
page read and write
22C75717000
heap
page read and write
2C528FE1000
heap
page read and write
2C529021000
heap
page read and write
1D0A5F90000
heap
page read and write
258219D4000
heap
page read and write
254CE203000
heap
page read and write
2C529054000
heap
page read and write
26624918000
heap
page read and write
2C529025000
heap
page read and write
1BDE9020000
heap
page read and write
2C528FEF000
heap
page read and write
1D0A60D3000
heap
page read and write
2582199A000
heap
page read and write
22C756F8000
heap
page read and write
2C529277000
heap
page read and write
23B815F4000
heap
page read and write
258219E3000
heap
page read and write
2C52900A000
heap
page read and write
2C5292BA000
heap
page read and write
258218F0000
heap
page read and write
18B816B5000
heap
page read and write
23B815F4000
heap
page read and write
2C5292A1000
heap
page read and write
254CE21E000
heap
page read and write
1AF4C701000
heap
page read and write
26624922000
heap
page read and write
2C529045000
heap
page read and write
22C756FD000
heap
page read and write
294586DC000
heap
page read and write
CFD000
stack
page read and write
2C529075000
heap
page read and write
26624870000
heap
page read and write
258219EB000
heap
page read and write
1BDE91E5000
heap
page read and write
1AF4C746000
heap
page read and write
B960DFF000
stack
page read and write
294586D0000
heap
page read and write
22C75742000
heap
page read and write
23B81672000
heap
page read and write
18B81513000
heap
page read and write
2C5292BC000
heap
page read and write
2C5292BC000
heap
page read and write
2C5292A1000
heap
page read and write
1C70BF9A000
heap
page read and write
1BDE91F0000
heap
page read and write
1AF4C752000
heap
page read and write
258219EC000
heap
page read and write
2C527410000
heap
page read and write
2FD33FF000
stack
page read and write
2C5292A1000
heap
page read and write
1AF4C706000
heap
page read and write
2662496B000
heap
page read and write
2C5292A1000
heap
page read and write
2C5292BC000
heap
page read and write
2C5292A1000
heap
page read and write
1D0A609D000
heap
page read and write
18B8151A000
heap
page read and write
2C5292BC000
heap
page read and write
22C75719000
heap
page read and write
B63A9FE000
stack
page read and write
254CE25D000
heap
page read and write
1D0A6115000
heap
page read and write
254CE25D000
heap
page read and write
2C5292BC000
heap
page read and write
1C70BF5B000
heap
page read and write
25821A0E000
heap
page read and write
26624934000
heap
page read and write
A26CFFE000
stack
page read and write
1501CFE000
stack
page read and write
2C52926C000
heap
page read and write
1C70BDF0000
heap
page read and write
1C70BF59000
heap
page read and write
1D0A60F2000
heap
page read and write
2C5292BC000
heap
page read and write
E1E000
heap
page read and write
22C7570E000
heap
page read and write
D0558EC000
stack
page read and write
85D7CFF000
stack
page read and write
1AF4C737000
heap
page read and write
859C0FF000
stack
page read and write
23B81639000
heap
page read and write
1C70BF4E000
heap
page read and write
2C5292A1000
heap
page read and write
68E9AFE000
stack
page read and write
B63AAFF000
stack
page read and write
2C5292BC000
heap
page read and write
22C75769000
heap
page read and write
2C529279000
heap
page read and write
2C529077000
heap
page read and write
859BAFE000
stack
page read and write
26624914000
heap
page read and write
1D0A608A000
heap
page read and write
18B81522000
heap
page read and write
1AF4C6F6000
heap
page read and write
2C529091000
heap
page read and write
2C529075000
heap
page read and write
2C5290E0000
unkown
page read and write
2C5292A7000
heap
page read and write
2C5292BA000
heap
page read and write
2C529043000
heap
page read and write
1BDE919A000
heap
page read and write
2C5292BC000
heap
page read and write
2C5272A9000
heap
page read and write
1AF4C72E000
heap
page read and write
1BDE91F8000
heap
page read and write
1C70BF64000
heap
page read and write
22C7577C000
heap
page read and write
2C529075000
heap
page read and write
1C70C030000
heap
page read and write
1D0A60F4000
heap
page read and write
1C70BF6A000
heap
page read and write
1BDE9213000
heap
page read and write
25821A3B000
heap
page read and write
1BDE9203000
heap
page read and write
25821A01000
heap
page read and write
2C52926C000
heap
page read and write
23B8161B000
heap
page read and write
1BDE9250000
heap
page read and write
258219C1000
heap
page read and write
258219D7000
heap
page read and write
2C52908E000
heap
page read and write
2C5292BA000
heap
page read and write
1BDE91DA000
heap
page read and write
1D0A60A4000
heap
page read and write
26624916000
heap
page read and write
258219EC000
heap
page read and write
258218F5000
heap
page read and write
23B81530000
heap
page read and write
254CE1F0000
heap
page read and write
18B815C0000
heap
page read and write
1AF4C6EB000
heap
page read and write
1D0A5F80000
heap
page read and write
2C5292BC000
heap
page read and write
1BDE91EA000
heap
page read and write
2C529288000
heap
page read and write
D056CED000
stack
page read and write
25821A04000
heap
page read and write
1AF4C6FA000
heap
page read and write
2662491E000
heap
page read and write
2C529092000
heap
page read and write
2C529027000
heap
page read and write
2C52904C000
heap
page read and write
68E99FE000
stack
page read and write
B960779000
stack
page read and write
10DE000
stack
page read and write
1C70BF72000
heap
page read and write
2D9E000
stack
page read and write
1C70BF9A000
heap
page read and write
D0558FC000
stack
page read and write
254CE25A000
heap
page read and write
1BDE91D6000
heap
page read and write
There are 908 hidden memdumps, click here to show them.