IOC Report
00. business card_Luca STRANIERO.pdf

loading gif

Files

File Path
Type
Category
Malicious
00. business card_Luca STRANIERO.pdf
PDF document, version 1.6
initial sample
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\10f8968e-3d20-4c2b-95e0-00ed24e7ef60.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db
SQLite 3.x database, last written using SQLite version 3040000, writer version 2, read version 2, file counter 1, database pages 1, cookie 0, schema 0, unknown 0 encoding, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db-shm
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\CreativeCloud\CoreSync\EntitySync-2024-04-24.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\RFL\LocalMapping\RFLDB230
SQLite 3.x database, last written using SQLite version 3040000, file counter 1, database pages 8, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\RFL\LocalMapping\RFLDB230-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-240424133929Z-645.bmp
PC bitmap, Windows 3.x format, 164 x -106 x 32, cbSize 69590, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 15, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 15
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Reader\Synchronizer\metadata\Synchronizer
SQLite 3.x database, last written using SQLite version 3040000, file counter 1, database pages 23, cookie 0x11, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Reader\Synchronizer\metadata\Synchronizer-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.7728
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.dat
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 30, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 30
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Temp\MSI16d34.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-04-24 15-39-27-473.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\6da33d09-8603-4fc2-b762-3712b3b00257.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\b68055ba-c295-47f8-8028-93cf53ec037f.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\be6a46fb-c61c-4598-8e8f-50c663b3681a.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\dedad9e8-40ea-4d5a-88c2-135cd69fa7ab.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\JSCache\GlobSettings
ASCII text
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\TMDocs.sav
data
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\TMGrpPrm.sav
data
dropped
There are 46 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\00. business card_Luca STRANIERO.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=7788
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=7960
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=8068
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=8176
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=7372
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=7352
C:\Program Files\Adobe\Acrobat DC\Acrobat\RDCNotificationClient\FullTrustNotifier.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\RDCNotificationClient\FullTrustNotifier.exe" GetChannelUri
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2084 --field-trial-handle=1732,i,15913500959655005552,13017635812736798014,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://chrome.cloudflare-dns.com/dns-query
162.159.61.3
https://wns.windows.com/
unknown
https://android.notify.windows.com/iOS5
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppb2
unknown
https://android.notify.windows.com/iOS
unknown
https://comments.adob
unknown

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
162.159.61.3

IPs

IP
Domain
Country
Malicious
162.159.61.3
chrome.cloudflare-dns.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\Privileged
syncFolderSetupDone
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Synchronizer\DC\WebSocketNotifInfra
bisWSExpEnabled
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Synchronizer\DC\Acrobat.com
tUniqueIdForEureka
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
E24B0FF000
stack
page read and write
1F125DF3000
heap
page read and write
22A37D04000
heap
page read and write
22A37EE7000
heap
page read and write
2E0E000
stack
page read and write
19AF47E8000
heap
page read and write
2B29A295000
heap
page read and write
22A37CA7000
heap
page read and write
20E64B66000
heap
page read and write
22A37D1F000
heap
page read and write
22A37EBE000
heap
page read and write
19AF4899000
heap
page read and write
22A37C9E000
heap
page read and write
19AF4862000
heap
page read and write
1F125E3B000
heap
page read and write
3580CFE000
stack
page read and write
22A37CBC000
heap
page read and write
1DADE226000
heap
page read and write
1DEFA6E5000
heap
page read and write
2AA6B673000
heap
page read and write
19AF486A000
heap
page read and write
1F125DED000
heap
page read and write
22A37C9B000
heap
page read and write
22A37EBE000
heap
page read and write
2B29A26E000
heap
page read and write
22A37ED3000
heap
page read and write
22A35EF8000
heap
page read and write
3580FF6000
stack
page read and write
22A37EB3000
heap
page read and write
1F125E4C000
heap
page read and write
1DE91849000
heap
page read and write
20E64B1E000
heap
page read and write
22A37E80000
heap
page read and write
22A37C92000
heap
page read and write
1F125E02000
heap
page read and write
22A37EE7000
heap
page read and write
2AA6B6E5000
heap
page read and write
22A37EE7000
heap
page read and write
210F3FF1000
heap
page read and write
1F125DAB000
heap
page read and write
22A37E84000
heap
page read and write
20E64B10000
heap
page read and write
19AF4855000
heap
page read and write
1F125E1E000
heap
page read and write
20796AF8000
heap
page read and write
1DADE22D000
heap
page read and write
1F125DFC000
heap
page read and write
20E64A80000
heap
page read and write
22A37C80000
heap
page read and write
19AF485E000
heap
page read and write
19AF48B7000
heap
page read and write
19AF485C000
heap
page read and write
2B29A293000
heap
page read and write
63E19FE000
stack
page read and write
DCBA8FE000
stack
page read and write
22A35F55000
heap
page read and write
22A37CBC000
heap
page read and write
3580EFD000
stack
page read and write
22A37EA2000
heap
page read and write
22A37D12000
heap
page read and write
22A37EE7000
heap
page read and write
22A37CA7000
heap
page read and write
20796AD2000
heap
page read and write
1DADE24C000
heap
page read and write
19AF4861000
heap
page read and write
2B29A245000
heap
page read and write
D32B5FE000
stack
page read and write
1F125DE4000
heap
page read and write
22A37D12000
heap
page read and write
20E64B4F000
heap
page read and write
210F3FD6000
heap
page read and write
1F125DF7000
heap
page read and write
A70EFFD000
stack
page read and write
2AA6B608000
heap
page read and write
E24AAFE000
stack
page read and write
1DE91A40000
heap
page read and write
1DC72FD000
stack
page read and write
20796AE8000
heap
page read and write
F88E3FE000
stack
page read and write
DAC52FE000
stack
page read and write
210F3FED000
heap
page read and write
1DE916E0000
heap
page read and write
19AF4770000
heap
page read and write
20796A58000
heap
page read and write
AFD000
stack
page read and write
22A37EA2000
heap
page read and write
20E64B6B000
heap
page read and write
2B29A284000
heap
page read and write
2C110D35000
heap
page read and write
22A37EA2000
heap
page read and write
210F4014000
heap
page read and write
19AF48A6000
heap
page read and write
22A37EA2000
heap
page read and write
22A37EA2000
heap
page read and write
210F403E000
heap
page read and write
22A37CE1000
heap
page read and write
19AF485C000
heap
page read and write
1DE9182B000
heap
page read and write
22A37D12000
heap
page read and write
2B29A295000
heap
page read and write
22A37C84000
heap
page read and write
22A37C98000
heap
page read and write
2B29A295000
heap
page read and write
2AA6B67B000
heap
page read and write
22A37E92000
heap
page read and write
22A37ED3000
heap
page read and write
41EB7FF000
stack
page read and write
ACB33FF000
stack
page read and write
22A37C51000
heap
page read and write
D32B2FE000
stack
page read and write
2B29A295000
heap
page read and write
2AA6B688000
heap
page read and write
22A36155000
heap
page read and write
22A37C84000
heap
page read and write
19AF485C000
heap
page read and write
1F125E08000
heap
page read and write
100E000
stack
page read and write
D32B3FF000
stack
page read and write
1F125D88000
heap
page read and write
2AA6B67C000
heap
page read and write
20796AC1000
heap
page read and write
22A37EA6000
heap
page read and write
63E25FE000
stack
page read and write
22A37C72000
heap
page read and write
22A37EA2000
heap
page read and write
22A37C92000
heap
page read and write
2B29A160000
heap
page read and write
22A37C72000
heap
page read and write
2AA6B6C7000
heap
page read and write
22A37CA0000
heap
page read and write
2AA6B6C7000
heap
page read and write
20E64B5B000
heap
page read and write
20796B00000
heap
page read and write
19AF486E000
heap
page read and write
22A37C78000
heap
page read and write
22A37ECB000
heap
page read and write
1F126125000
heap
page read and write
210F3FF4000
heap
page read and write
DCBA9FF000
stack
page read and write
1DEFA4CC000
heap
page read and write
20E64C70000
heap
page read and write
22A37CA0000
heap
page read and write
20796ADC000
heap
page read and write
2AA6B6F6000
heap
page read and write
19AF486E000
heap
page read and write
22A37CC8000
heap
page read and write
2B29A225000
heap
page read and write
20E64B55000
heap
page read and write
2B29A293000
heap
page read and write
2AA6B6F6000
heap
page read and write
2C110D36000
heap
page read and write
2B29A217000
heap
page read and write
22A37EBE000
heap
page read and write
22A37D12000
heap
page read and write
22A37EA2000
heap
page read and write
22A37EE7000
heap
page read and write
210F4310000
heap
page read and write
2AA6B682000
heap
page read and write
20796AB3000
heap
page read and write
1DADE21D000
heap
page read and write
DAC56FE000
stack
page read and write
2AA6B6F6000
heap
page read and write
20796AF8000
heap
page read and write
C00000
heap
page read and write
41EB4FE000
stack
page read and write
22A37D0E000
heap
page read and write
1DE91851000
heap
page read and write
22A37CA7000
heap
page read and write
2C110D5F000
heap
page read and write
22A37D12000
heap
page read and write
2AA6B66D000
heap
page read and write
22A35DB0000
heap
page read and write
2C110DB3000
heap
page read and write
210F403E000
heap
page read and write
1DE91843000
heap
page read and write
20E64AA0000
heap
page read and write
2B29A21F000
heap
page read and write
210F4015000
heap
page read and write
22A37ECB000
heap
page read and write
19AF4858000
heap
page read and write
19AF487C000
heap
page read and write
F88DFFE000
stack
page read and write
22A37CC8000
heap
page read and write
22A37CA7000
heap
page read and write
22A37D0E000
heap
page read and write
22A37EBE000
heap
page read and write
1DC70FE000
stack
page read and write
B60000
heap
page read and write
1DADE120000
heap
page read and write
22A37D18000
heap
page read and write
DAC54FE000
stack
page read and write
19AF47E0000
heap
page read and write
210F3FEE000
heap
page read and write
22A37C98000
heap
page read and write
63E1EFE000
stack
page read and write
2C110B60000
heap
page read and write
2AA6B7C5000
heap
page read and write
292C000
stack
page read and write
1F125E55000
heap
page read and write
1F125E2B000
heap
page read and write
2B29A222000
heap
page read and write
22A37C81000
heap
page read and write
2C110D8F000
heap
page read and write
22A37EA3000
heap
page read and write
2AA6B665000
heap
page read and write
1DE9185B000
heap
page read and write
2B29A241000
heap
page read and write
22A37D00000
heap
page read and write
19AF48A6000
heap
page read and write
2B29A20E000
heap
page read and write
22A37EE7000
heap
page read and write
22A37CC8000
heap
page read and write
1DE91814000
heap
page read and write
A70ECFF000
stack
page read and write
20796ABD000
heap
page read and write
22A37C73000
heap
page read and write
22A37EB3000
heap
page read and write
1DE91A60000
heap
page read and write
22A37D12000
heap
page read and write
20E64B66000
heap
page read and write
22A35EB0000
heap
page read and write
210F3FFB000
heap
page read and write
1DADE160000
heap
page read and write
22A37C92000
heap
page read and write
210F4033000
heap
page read and write
20796AB9000
heap
page read and write
20796AEB000
heap
page read and write
22A37EBE000
heap
page read and write
2C110CC0000
heap
page read and write
20E64D65000
heap
page read and write
1F125E10000
heap
page read and write
1DADE22F000
heap
page read and write
1DADE1B0000
heap
page read and write
20796B26000
heap
page read and write
1F127B30000
heap
page read and write
DAC53FE000
stack
page read and write
1F125E28000
heap
page read and write
22A37D01000
heap
page read and write
DCBACFE000
stack
page read and write
22A37C78000
heap
page read and write
2C110D7D000
heap
page read and write
1DE9184D000
heap
page read and write
19AF48A8000
heap
page read and write
A70EBFF000
stack
page read and write
22A37ECB000
heap
page read and write
20796AEB000
heap
page read and write
22A37ED3000
heap
page read and write
5F6E8FE000
stack
page read and write
1DE9182B000
heap
page read and write
2C110D35000
heap
page read and write
22A37ECB000
heap
page read and write
2C110D30000
heap
page read and write
2C110D7D000
heap
page read and write
2B29A22C000
heap
page read and write
22A37C81000
heap
page read and write
D32B7FD000
stack
page read and write
2C110D8F000
heap
page read and write
29FE000
stack
page read and write
22A37EE7000
heap
page read and write
41EB5FF000
stack
page read and write
2C110F35000
heap
page read and write
2B29A269000
heap
page read and write
19AF4875000
heap
page read and write
2C110DA1000
heap
page read and write
5F6E2FE000
stack
page read and write
5F6E7FD000
stack
page read and write
2C110D93000
heap
page read and write
20E64ADE000
heap
page read and write
2B29A223000
heap
page read and write
1DADE110000
heap
page read and write
22A37ED3000
heap
page read and write
22A37CC8000
heap
page read and write
22A37EB3000
heap
page read and write
ACB36FD000
stack
page read and write
19AF4620000
heap
page read and write
2C110D8F000
heap
page read and write
2C110DB3000
heap
page read and write
2C110D3A000
heap
page read and write
1DEFA4A0000
heap
page read and write
22A37CA0000
heap
page read and write
20E64B66000
heap
page read and write
1DEFC3D3000
heap
page read and write
22A35E90000
heap
page read and write
19AF4863000
heap
page read and write
22A37D1F000
heap
page read and write
DCBA569000
stack
page read and write
210F4010000
heap
page read and write
ACB35FF000
stack
page read and write
210F3FDF000
heap
page read and write
22A37E91000
heap
page read and write
1DC71FE000
stack
page read and write
2B29A236000
heap
page read and write
63E22FF000
stack
page read and write
2B29A211000
heap
page read and write
22A37C92000
heap
page read and write
22A37D1F000
heap
page read and write
63E27ED000
stack
page read and write
E24ADFE000
stack
page read and write
20796A50000
heap
page read and write
20796AD7000
heap
page read and write
1DC6FFF000
stack
page read and write
1F125DF5000
heap
page read and write
2F7D000
stack
page read and write
1F125DFB000
heap
page read and write
7FC000
stack
page read and write
1DADE22D000
heap
page read and write
2B29A238000
heap
page read and write
22A37CC8000
heap
page read and write
22A37D0D000
heap
page read and write
22A37C84000
heap
page read and write
A70E8F9000
stack
page read and write
2B29A080000
heap
page read and write
210F3F70000
heap
page read and write
41EAF99000
stack
page read and write
1DADE271000
heap
page read and write
5F6E4FE000
stack
page read and write
2B29A293000
heap
page read and write
20E64B34000
heap
page read and write
22A37ED3000
heap
page read and write
A70EEFE000
stack
page read and write
22A37ED3000
heap
page read and write
35808FE000
stack
page read and write
20E64B25000
heap
page read and write
D32B8FE000
stack
page read and write
1F125CF0000
heap
page read and write
210F4042000
heap
page read and write
22A37EBE000
heap
page read and write
1DE91876000
heap
page read and write
1F125E1C000
heap
page read and write
2B29A225000
heap
page read and write
22A37C81000
heap
page read and write
20796AC4000
heap
page read and write
22A37EA2000
heap
page read and write
22A37ECB000
heap
page read and write
22A37ED3000
heap
page read and write
22A37EE7000
heap
page read and write
1F125E55000
heap
page read and write
22A37EA2000
heap
page read and write
D32B4FE000
stack
page read and write
1DE9184C000
heap
page read and write
20796ABA000
heap
page read and write
19AF4775000
heap
page read and write
2AA6B677000
heap
page read and write
20E64B6B000
heap
page read and write
E24AEFF000
stack
page read and write
2B29A269000
heap
page read and write
1DADE27F000
heap
page read and write
1DADE271000
heap
page read and write
22A37EE7000
heap
page read and write
22A37CFF000
heap
page read and write
2B29A24F000
heap
page read and write
2A05000
heap
page read and write
1DEFA58E000
heap
page read and write
22A35FE4000
heap
page read and write
1DE91830000
heap
page read and write
1F125DE4000
heap
page read and write
1DE91710000
heap
page read and write
22A37EE7000
heap
page read and write
22A37EBE000
heap
page read and write
2AA6B6C7000
heap
page read and write
DAC55FD000
stack
page read and write
41EB3FE000
stack
page read and write
22A37EE7000
heap
page read and write
22A37EE7000
heap
page read and write
F0D000
stack
page read and write
19AF48A6000
heap
page read and write
E24AFFD000
stack
page read and write
22A37D00000
heap
page read and write
F88DCFE000
stack
page read and write
22A37EE7000
heap
page read and write
22A37ED3000
heap
page read and write
22A37EA2000
heap
page read and write
1DE91823000
heap
page read and write
2AA6B68E000
heap
page read and write
22A37C5F000
heap
page read and write
22A37ED3000
heap
page read and write
1F125E13000
heap
page read and write
2B29A22B000
heap
page read and write
1DEFC3D0000
heap
page read and write
20796AB5000
heap
page read and write
20E64AA8000
heap
page read and write
210F4015000
heap
page read and write
19AF487D000
heap
page read and write
22A37C45000
heap
page read and write
1DADE223000
heap
page read and write
20E64B18000
heap
page read and write
63E26FB000
stack
page read and write
22A37C68000
heap
page read and write
22A37EA2000
heap
page read and write
22A37D12000
heap
page read and write
1DADE267000
heap
page read and write
20796B15000
heap
page read and write
19AF483F000
heap
page read and write
22A37EBE000
heap
page read and write
1DE91826000
heap
page read and write
22A37EA2000
heap
page read and write
210F3FDD000
heap
page read and write
22A37C98000
heap
page read and write
2AA6B66C000
heap
page read and write
210F3FEE000
heap
page read and write
1DE91817000
heap
page read and write
22A37ED3000
heap
page read and write
20E64B34000
heap
page read and write
2C110DB4000
heap
page read and write
1DE916F0000
heap
page read and write
19AF4853000
heap
page read and write
1F125E46000
heap
page read and write
20E64AF1000
heap
page read and write
BBE000
stack
page read and write
F88DEFE000
stack
page read and write
1DADE243000
heap
page read and write
63E17FE000
stack
page read and write
20E64B35000
heap
page read and write
210F4042000
heap
page read and write
2AA6B675000
heap
page read and write
20E64B1F000
heap
page read and write
1DADE23E000
heap
page read and write
22A37CA0000
heap
page read and write
1DADE229000
heap
page read and write
20E64B17000
heap
page read and write
1DADE259000
heap
page read and write
22A37EBE000
heap
page read and write
2C110D27000
heap
page read and write
20796AD0000
heap
page read and write
2AA6B66C000
heap
page read and write
1DE91821000
heap
page read and write
22A37ED3000
heap
page read and write
E24ACFF000
stack
page read and write
2B29A21A000
heap
page read and write
B70000
heap
page read and write
A70EAFE000
stack
page read and write
1DEFC2D0000
heap
page read and write
22A37C92000
heap
page read and write
20E64B3E000
heap
page read and write
19AF48A6000
heap
page read and write
ACB2DC9000
stack
page read and write
210F3FE9000
heap
page read and write
2AA6B6B0000
heap
page read and write
22A37EC3000
heap
page read and write
20796AA1000
heap
page read and write
22A37EBE000
heap
page read and write
1F125E1A000
heap
page read and write
22A37ED3000
heap
page read and write
22A37ED3000
heap
page read and write
C0A000
heap
page read and write
1F125DFC000
heap
page read and write
210F4015000
heap
page read and write
ACB34FE000
stack
page read and write
1F125E4F000
heap
page read and write
22A37C81000
heap
page read and write
22A37C78000
heap
page read and write
2B29A295000
heap
page read and write
ACB30FE000
stack
page read and write
22A37CED000
heap
page read and write
22A37C72000
heap
page read and write
20E64B22000
heap
page read and write
1DADE22B000
heap
page read and write
2AA6B6A0000
heap
page read and write
22A37EBE000
heap
page read and write
20E64B66000
heap
page read and write
22A37D0D000
heap
page read and write
20E64A70000
heap
page read and write
22A37D0E000
heap
page read and write
41EB6FE000
stack
page read and write
2AA6B672000
heap
page read and write
20E64B0A000
heap
page read and write
22A37CC8000
heap
page read and write
210F3F10000
heap
page read and write
210F4030000
heap
page read and write
22A37D12000
heap
page read and write
2C110D7D000
heap
page read and write
22A37ED3000
heap
page read and write
1DADE27D000
heap
page read and write
DAC4EF9000
stack
page read and write
2B29A252000
heap
page read and write
210F3FE5000
heap
page read and write
210F4315000
heap
page read and write
22A37C73000
heap
page read and write
1F125E46000
heap
page read and write
2B29A234000
heap
page read and write
22A37CC8000
heap
page read and write
22A37EBE000
heap
page read and write
BE0000
heap
page read and write
2C110F30000
heap
page read and write
22A37CA7000
heap
page read and write
1F125DCF000
heap
page read and write
1F125E21000
heap
page read and write
E24A8F9000
stack
page read and write
2C110D2A000
heap
page read and write
2AA6B600000
heap
page read and write
210F4002000
heap
page read and write
2C110D2F000
heap
page read and write
20E64B4E000
heap
page read and write
210F3FD9000
heap
page read and write
63E1FFC000
stack
page read and write
22A37ED7000
heap
page read and write
63E26EC000
stack
page read and write
63E1DFE000
stack
page read and write
22A37EBE000
heap
page read and write
63E20FE000
stack
page read and write
22A37ED3000
heap
page read and write
1DE9181B000
heap
page read and write
22A37EA2000
heap
page read and write
2AA6B590000
heap
page read and write
5F6E0F9000
stack
page read and write
22A37D0E000
heap
page read and write
19AF4899000
heap
page read and write
210F400C000
heap
page read and write
22A37EBE000
heap
page read and write
2B29A21F000
heap
page read and write
210F4009000
heap
page read and write
210F403E000
heap
page read and write
22A37ED3000
heap
page read and write
2C110D43000
heap
page read and write
22A37ED3000
heap
page read and write
19AF4809000
heap
page read and write
22A37EB3000
heap
page read and write
3580FF8000
stack
page read and write
2B29A1F1000
heap
page read and write
22A37C81000
heap
page read and write
22A37EE7000
heap
page read and write
1DC6EFF000
stack
page read and write
A70E9FE000
stack
page read and write
114E000
stack
page read and write
1DEFA592000
heap
page read and write
22A37CBD000
heap
page read and write
20E64B17000
heap
page read and write
63E1BFD000
stack
page read and write
2B29A2F0000
heap
page read and write
2B29A23A000
heap
page read and write
1DE91823000
heap
page read and write
1DEFC3DA000
heap
page read and write
2AA6B6E4000
heap
page read and write
22A37E98000
heap
page read and write
22A37C98000
heap
page read and write
22A37ED7000
heap
page read and write
20796AC7000
heap
page read and write
2C110D3B000
heap
page read and write
22A37D0E000
heap
page read and write
20E64B2F000
heap
page read and write
D32B0F9000
stack
page read and write
22A37EF3000
heap
page read and write
210F3F9B000
heap
page read and write
ACB37FE000
stack
page read and write
22A37E9A000
heap
page read and write
1DADE240000
heap
page read and write
1DADE27D000
heap
page read and write
1DADE250000
heap
page read and write
2C110C60000
heap
page read and write
19AF487A000
heap
page read and write
19AF4899000
heap
page read and write
22A37EB3000
heap
page read and write
35804F9000
stack
page read and write
1F125DCF000
heap
page read and write
22A37ED3000
heap
page read and write
207969A0000
heap
page read and write
22A37C92000
heap
page read and write
22A37C4C000
heap
page read and write
2AA6B696000
heap
page read and write
1F125E55000
heap
page read and write
20E64B55000
heap
page read and write
1DE91839000
heap
page read and write
2AA6B6A3000
heap
page read and write
1DADFF50000
heap
page read and write
20E64B5A000
heap
page read and write
BF0000
heap
page read and write
210F3FEE000
heap
page read and write
22A37D12000
heap
page read and write
DAC51FE000
stack
page read and write
1DADE21B000
heap
page read and write
210F4002000
heap
page read and write
19AF4867000
heap
page read and write
5F6E5FE000
stack
page read and write
22A37ED4000
heap
page read and write
22A37EBE000
heap
page read and write
1DE9182F000
heap
page read and write
22A37ED7000
heap
page read and write
22A37D12000
heap
page read and write
2C110D40000
heap
page read and write
2E7B000
stack
page read and write
210F400D000
heap
page read and write
22A37EBE000
heap
page read and write
1F125CE0000
heap
page read and write
22A37D1F000
heap
page read and write
20796AB9000
heap
page read and write
1DADE27D000
heap
page read and write
22A37C92000
heap
page read and write
22A37EE7000
heap
page read and write
210F3FD6000
heap
page read and write
22A37C84000
heap
page read and write
1DC6979000
stack
page read and write
C0E000
heap
page read and write
22A37EE7000
heap
page read and write
22A37ED7000
heap
page read and write
1DE91824000
heap
page read and write
19AF4843000
heap
page read and write
63E14EC000
stack
page read and write
DCBAAFF000
stack
page read and write
22A37EBE000
heap
page read and write
F88E2FD000
stack
page read and write
22A37ED3000
heap
page read and write
1DE91846000
heap
page read and write
22A37EBE000
heap
page read and write
20796B26000
heap
page read and write
2AA6B6D5000
heap
page read and write
E24A9FE000
stack
page read and write
1DADE232000
heap
page read and write
2C110D2B000
heap
page read and write
22A37EBE000
heap
page read and write
1DADE1D9000
heap
page read and write
210F3FE7000
heap
page read and write
22A37D01000
heap
page read and write
F88E0FE000
stack
page read and write
1F125E4C000
heap
page read and write
210F3F40000
heap
page read and write
1DEFA4C6000
heap
page read and write
1DE91860000
heap
page read and write
1DE9181B000
heap
page read and write
22A37EE7000
heap
page read and write
1DADE270000
heap
page read and write
1DE917B0000
heap
page read and write
22A37CBD000
heap
page read and write
63E27FD000
stack
page read and write
1DADE25D000
heap
page read and write
210F400C000
heap
page read and write
1DE91841000
heap
page read and write
2B29A269000
heap
page read and write
20796B15000
heap
page read and write
2B29A201000
heap
page read and write
2AA6B6F7000
heap
page read and write
22A37C78000
heap
page read and write
22A37EE7000
heap
page read and write
19AF4720000
heap
page read and write
1F125E0D000
heap
page read and write
104E000
stack
page read and write
1F125E14000
heap
page read and write
ECF000
stack
page read and write
20796AE5000
heap
page read and write
20E668A0000
heap
page read and write
2C110D4B000
heap
page read and write
22A37EB3000
heap
page read and write
2AA6B698000
heap
page read and write
1DEFA6E0000
heap
page read and write
31FF000
stack
page read and write
DCBAEFD000
stack
page read and write
2B29A20A000
heap
page read and write
2A00000
heap
page read and write
20E64B55000
heap
page read and write
2B29A293000
heap
page read and write
22A37EB3000
heap
page read and write
210F3FE4000
heap
page read and write
2B0B000
stack
page read and write
207969C0000
heap
page read and write
1DADE150000
heap
page read and write
1DADE217000
heap
page read and write
2AA6B490000
heap
page read and write
30FE000
stack
page read and write
1DADE27D000
heap
page read and write
22A37EA2000
heap
page read and write
1DEFA6B0000
heap
page read and write
1DE91876000
heap
page read and write
22A37EA2000
heap
page read and write
1F125D80000
heap
page read and write
DAC50FE000
stack
page read and write
2C110C40000
heap
page read and write
1DADE225000
heap
page read and write
20796AF8000
heap
page read and write
D32B6FF000
stack
page read and write
2C110D37000
heap
page read and write
F88E1FF000
stack
page read and write
22A37CE1000
heap
page read and write
22A36100000
heap
page read and write
29BE000
stack
page read and write
2AA6B693000
heap
page read and write
1F125DF3000
heap
page read and write
5F6E1FE000
stack
page read and write
1DEFA52C000
heap
page read and write
210F401C000
heap
page read and write
2D0E000
stack
page read and write
2C110D25000
heap
page read and write
22A37EB3000
heap
page read and write
2B29A21E000
heap
page read and write
22A37C98000
heap
page read and write
20796990000
heap
page read and write
1DADE268000
heap
page read and write
3580DFF000
stack
page read and write
22A37C69000
heap
page read and write
1DADE22D000
heap
page read and write
2AA6B6AD000
heap
page read and write
1DEFA587000
heap
page read and write
20796DD5000
heap
page read and write
1DE91844000
heap
page read and write
22A37ED3000
heap
page read and write
20E64B0E000
heap
page read and write
22A37EB3000
heap
page read and write
F88DDFE000
stack
page read and write
22A37EBE000
heap
page read and write
1DC73FF000
stack
page read and write
1DE91876000
heap
page read and write
63E29FF000
stack
page read and write
63E23FF000
stack
page read and write
22A37EAE000
heap
page read and write
22A37C81000
heap
page read and write
1DEFA690000
heap
page read and write
2B29A293000
heap
page read and write
1DE9183D000
heap
page read and write
20796DD0000
heap
page read and write
1F125E46000
heap
page read and write
1F125E29000
heap
page read and write
19AF4700000
heap
page read and write
22A37EB3000
heap
page read and write
2AA6B673000
heap
page read and write
22A37EE7000
heap
page read and write
E24ABFF000
stack
page read and write
1DADE214000
heap
page read and write
22A37CE1000
heap
page read and write
3580AFF000
stack
page read and write
2B29A180000
heap
page read and write
22A37D01000
heap
page read and write
1F125E46000
heap
page read and write
22A37CBD000
heap
page read and write
22A37EBE000
heap
page read and write
DCBABFE000
stack
page read and write
22A37C98000
heap
page read and write
22A37EA2000
heap
page read and write
20796B15000
heap
page read and write
22A37EBE000
heap
page read and write
30BD000
stack
page read and write
2AA6B67C000
heap
page read and write
22A37CA0000
heap
page read and write
20E64B2C000
heap
page read and write
210F5E20000
heap
page read and write
20E64B0F000
heap
page read and write
1DE9182B000
heap
page read and write
F88D949000
stack
page read and write
22A37ECB000
heap
page read and write
210F4030000
heap
page read and write
22A37ECB000
heap
page read and write
20796ACD000
heap
page read and write
210F403E000
heap
page read and write
20796ACB000
heap
page read and write
1DADE240000
heap
page read and write
2B29A207000
heap
page read and write
22A37ECB000
heap
page read and write
22A37EBE000
heap
page read and write
22A37C92000
heap
page read and write
2B29A1A0000
heap
page read and write
2AA6B67C000
heap
page read and write
2B29A23F000
heap
page read and write
210F4032000
heap
page read and write
20E64B1F000
heap
page read and write
22A37CC8000
heap
page read and write
22A37D0D000
heap
page read and write
D32B1FE000
stack
page read and write
297E000
stack
page read and write
1F125E2A000
heap
page read and write
22A37D1F000
heap
page read and write
20796B15000
heap
page read and write
22A37D1F000
heap
page read and write
2AA6B570000
heap
page read and write
1F125DAA000
heap
page read and write
20E64B3A000
heap
page read and write
210F4041000
heap
page read and write
DAC4FFE000
stack
page read and write
22A37EA2000
heap
page read and write
20796AEB000
heap
page read and write
22A37ED3000
heap
page read and write
1DE91A65000
heap
page read and write
1DADE155000
heap
page read and write
2B29A27D000
heap
page read and write
210F4007000
heap
page read and write
2B29A27D000
heap
page read and write
63E1AFF000
stack
page read and write
22A37EBF000
heap
page read and write
1DE9187E000
heap
page read and write
22A37CA7000
heap
page read and write
1F126120000
heap
page read and write
20E64B6B000
heap
page read and write
20E64B06000
heap
page read and write
22A37D0E000
heap
page read and write
1F125E2B000
heap
page read and write
1DE9181A000
heap
page read and write
63E21FF000
stack
page read and write
1F125DFC000
heap
page read and write
2B29A21F000
heap
page read and write
63E14FC000
stack
page read and write
2C110D52000
heap
page read and write
22A360C0000
unkown
page read and write
1DE91841000
heap
page read and write
22A37EE7000
heap
page read and write
1DADE24D000
heap
page read and write
20E64B6B000
heap
page read and write
22A35FE7000
heap
page read and write
5F6E6FF000
stack
page read and write
22A37ECB000
heap
page read and write
19AF484A000
heap
page read and write
41EB8FD000
stack
page read and write
1DE91830000
heap
page read and write
22A35EF0000
heap
page read and write
22A37ECB000
heap
page read and write
22A37EA6000
heap
page read and write
ACB32FF000
stack
page read and write
1F125DFF000
heap
page read and write
41EB9FE000
stack
page read and write
2AA6B69D000
heap
page read and write
22A37C9F000
heap
page read and write
22A37ED7000
heap
page read and write
2C110CC8000
heap
page read and write
19AF4847000
heap
page read and write
19AF4854000
heap
page read and write
1F125DF2000
heap
page read and write
2B29A234000
heap
page read and write
22A37D1F000
heap
page read and write
22A37EBE000
heap
page read and write
22A37ED3000
heap
page read and write
20E64B0E000
heap
page read and write
2C110D28000
heap
page read and write
1F125E46000
heap
page read and write
210F3FFF000
heap
page read and write
63E28FF000
stack
page read and write
210F3F77000
heap
page read and write
63E24FF000
stack
page read and write
22A37EE7000
heap
page read and write
22A37C81000
heap
page read and write
22A37ED3000
heap
page read and write
1DE9181C000
heap
page read and write
1DE917B7000
heap
page read and write
22A37CC8000
heap
page read and write
A70F0FF000
stack
page read and write
22A37EA2000
heap
page read and write
19AF4887000
heap
page read and write
22A37D1F000
heap
page read and write
20796AC1000
heap
page read and write
22A37CA0000
heap
page read and write
1DE91832000
heap
page read and write
2AA6B692000
heap
page read and write
19AF485A000
heap
page read and write
1DC6CFE000
stack
page read and write
20E64B17000
heap
page read and write
2B29A2F5000
heap
page read and write
22A37CBD000
heap
page read and write
22A37EBE000
heap
page read and write
DCBB0FF000
stack
page read and write
22A37EE7000
heap
page read and write
2C110DB3000
heap
page read and write
22A37EB3000
heap
page read and write
19AF4887000
heap
page read and write
19AF4887000
heap
page read and write
22A37EE7000
heap
page read and write
2AA6B692000
heap
page read and write
41EB2FE000
stack
page read and write
ACB31FE000
stack
page read and write
22A37C40000
heap
page read and write
2C110D61000
heap
page read and write
2C110D8F000
heap
page read and write
210F3F9C000
heap
page read and write
20E64B15000
heap
page read and write
1DADE239000
heap
page read and write
1DE9184C000
heap
page read and write
DCBADFE000
stack
page read and write
22A37D1F000
heap
page read and write
2FBD000
stack
page read and write
22A37C9E000
heap
page read and write
210F3FE5000
heap
page read and write
22A37D0D000
heap
page read and write
22A37C78000
heap
page read and write
1F125DEB000
heap
page read and write
2C110D64000
heap
page read and write
2C110D5E000
heap
page read and write
2B29A215000
heap
page read and write
22A37C78000
heap
page read and write
22A37D01000
heap
page read and write
1DEFA4C0000
heap
page read and write
1F125E46000
heap
page read and write
22A37D01000
heap
page read and write
2AA6B6C7000
heap
page read and write
210F3F20000
heap
page read and write
20796B27000
heap
page read and write
20E64B0D000
heap
page read and write
22A37C98000
heap
page read and write
1DADE247000
heap
page read and write
1DADE27D000
heap
page read and write
22A37ECB000
heap
page read and write
22A37D0D000
heap
page read and write
210F4005000
heap
page read and write
2B29A269000
heap
page read and write
1DC6DFE000
stack
page read and write
22A37EBE000
heap
page read and write
2AA6B667000
heap
page read and write
22A36150000
heap
page read and write
22A37EBE000
heap
page read and write
22A37ED3000
heap
page read and write
1DE9182A000
heap
page read and write
2AA6B7C0000
heap
page read and write
22A37C98000
heap
page read and write
22A37EBE000
heap
page read and write
20E64D60000
heap
page read and write
1DEFA5B6000
heap
page read and write
5F6E3FF000
stack
page read and write
22A37EBE000
heap
page read and write
A70EDFE000
stack
page read and write
2B29A225000
heap
page read and write
22A37D12000
heap
page read and write
1DE9184C000
heap
page read and write
22A37EA3000
heap
page read and write
3580BFB000
stack
page read and write
20E64B36000
heap
page read and write
1F125DE7000
heap
page read and write
22A37EB3000
heap
page read and write
22A37C78000
heap
page read and write
2C0F000
stack
page read and write
1F125D10000
heap
page read and write
20796AD5000
heap
page read and write
22A37C98000
heap
page read and write
22A37D1F000
heap
page read and write
1F125E10000
heap
page read and write
22A37C84000
heap
page read and write
22A37C92000
heap
page read and write
22A37EE7000
heap
page read and write
22A37D1F000
heap
page read and write
2AA6B668000
heap
page read and write
1DADE1B8000
heap
page read and write
2AA6B661000
heap
page read and write
2AA6B67F000
heap
page read and write
22A37ED3000
heap
page read and write
20796AB8000
heap
page read and write
19AF4853000
heap
page read and write
22A37C6B000
heap
page read and write
210F401F000
heap
page read and write
20796AC3000
heap
page read and write
22A37ED3000
heap
page read and write
2AA6B6F6000
heap
page read and write
1DADE244000
heap
page read and write
20796B17000
heap
page read and write
22A37EA2000
heap
page read and write
22A37EE7000
heap
page read and write
There are 926 hidden memdumps, click here to show them.