IOC Report

loading gif

Files

File Path
Type
Category
Malicious
KZ429 FEB17 BSRec_InvNet.xlsx
Microsoft Excel 2007+
initial sample
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\6A9BB3D1-196A-47AF-A298-A01CBE8FC190
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\4C29F330.png
PNG image data, 736 x 684, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\73004B2B.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\9D04752.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 660x137, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\C6957DA4.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\DCD9B66F.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\EAAAB955.png
PNG image data, 539 x 117, 1-bit colormap, non-interlaced
dropped
C:\Users\user\Desktop\~$KZ429 FEB17 BSRec_InvNet.xlsx
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\98E6EBE4.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 660x137, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9B0D5918.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AE0576B3.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E4851639.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
C:\Windows\splwow64.exe
C:\Windows\splwow64.exe 12288
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding

URLs

Name
IP
Malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://management.azure.com/
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
https://api.powerbi.com/beta/myorg/imports
unknown
https://devnull.onenote.com
unknown
https://ncus.pagecontentsync.
unknown
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
unknown
https://messaging.office.com/
unknown
https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://augloop.office.com/v2
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
unknown
https://skyapi.live.net/Activity/
unknown
https://clients.config.office.net/user/v1.0/mac
unknown
https://dataservice.o365filtering.com
unknown
https://api.cortana.ai
unknown
https://onedrive.live.com
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
windowsupdate.s.llnwi.net
41.63.96.0

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
$5-
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
%5-
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\General
FileFormatBallotBoxAppIDBootedOnce
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
EXCELFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
.&.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1D60EF9000
stack
page read and write
26869813000
unkown
page read and write
2E2F5F44000
unkown
page read and write
2094BF78000
unkown
page read and write
2E2F5886000
unkown
page read and write
2E2F58AA000
unkown
page read and write
2686A17C000
unkown
page read and write
163D1802000
unkown
page read and write
2E2F5889000
unkown
page read and write
1A6FE108000
unkown
page read and write
2E2F58C3000
unkown
page read and write
2E2F59B5000
unkown
page read and write
2094BF9B000
unkown
page read and write
2E2F5960000
unkown
page read and write
2E2F5916000
unkown
page read and write
1FC06E49000
unkown
page read and write
1D3542FF000
unkown
page read and write
1F895229000
unkown
page read and write
1D3542F2000
unkown
page read and write
2E2F59D8000
unkown
page read and write
2E2F5813000
unkown
page read and write
2E2F5950000
unkown
page read and write
178AC698000
heap
page read and write
2686992B000
unkown
page read and write
1D61AFF000
stack
page read and write
2094B800000
unkown
page read and write
2E2F598A000
unkown
page read and write
26869F60000
remote allocation
page read and write
2E2F59E5000
unkown
page read and write
2686A132000
unkown
page read and write
2E2F59A0000
unkown
page read and write
2E2F6107000
unkown
page read and write
1D36FF23000
unkown
page read and write
BD466F9000
stack
page read and write
1D3540D0000
heap
page read and write
1D373D84000
unkown
page read and write
2E2F58E3000
unkown
page read and write
27FF8360000
remote allocation
page read and write
295E000
stack
page read and write
2E2F59D3000
unkown
page read and write
2E2F596A000
unkown
page read and write
1F89525C000
unkown
page read and write
2E2F5867000
unkown
page read and write
5836F7000
stack
page read and write
2E2F59AC000
unkown
page read and write
2E2F59E5000
unkown
page read and write
CD47E7B000
stack
page read and write
1D373CB3000
unkown
page read and write
2E2F6006000
unkown
page read and write
9D0000
unkown
page read and write
20B8E6C0000
heap
page read and write
6EAE5FF000
stack
page read and write
1FC06E9F000
unkown
page read and write
2E2F59B2000
unkown
page read and write
2E2F5986000
unkown
page read and write
2094B5D0000
heap
page read and write
2E2F6113000
unkown
page read and write
2E2F5896000
unkown
page read and write
163D0FB0000
heap
page read and write
2E2F5F87000
unkown
page read and write
CD483FF000
stack
page read and write
27FF7D02000
unkown
page read and write
2094BFB4000
unkown
page read and write
2094B8BE000
unkown
page read and write
1D36FD00000
trusted library allocation
page read and write
5838FF000
stack
page read and write
2E2F59B7000
unkown
page read and write
178AC7A0000
trusted library allocation
page read and write
EC87EF9000
stack
page read and write
1D373D34000
unkown
page read and write
2E2F588F000
unkown
page read and write
2E2F59E8000
unkown
page read and write
2E2F5F12000
unkown
page read and write
2E2F58A4000
unkown
page read and write
2686A17F000
unkown
page read and write
D6D3C7E000
stack
page read and write
1D374235000
unkown
page read and write
1D354636000
trusted library allocation
page read and write
1F22C51B000
unkown
page read and write
2E2F5918000
unkown
page read and write
1A6FE078000
unkown
page read and write
2E2F586F000
unkown
page read and write
1FC06C10000
heap
page read and write
26869855000
unkown
page read and write
2686A129000
unkown
page read and write
2938B370000
heap
page read and write
5832FD000
stack
page read and write
2094B8C5000
unkown
page read and write
2E2F58C5000
unkown
page read and write
2E2F5952000
unkown
page read and write
27FF7C29000
unkown
page read and write
E30AAFA000
stack
page read and write
2686A16B000
unkown
page read and write
2E2F59B8000
unkown
page read and write
1D3741E2000
unkown
page read and write
1495CA2D000
unkown
page read and write
ED0000
heap
page read and write
178AC680000
heap
page read and write
1D37441C000
unkown
page read and write
1F895200000
unkown
page read and write
4EC2E7E000
stack
page read and write
2094C402000
unkown
page read and write
2094C502000
unkown
page read and write
2E2F58B8000
unkown
page read and write
26869720000
heap
page read and write
2E2F5FD7000
unkown
page read and write
2E2F591B000
unkown
page read and write
2E2F5978000
unkown
page read and write
2094B916000
unkown
page read and write
2094C400000
unkown
page read and write
2094BF7D000
unkown
page read and write
2E2F6125000
unkown
page read and write
2E2F58B6000
unkown
page read and write
2E2F5FD9000
unkown
page read and write
2E2F589E000
unkown
page read and write
1D374490000
unkown
page read and write
178AC5A0000
heap
page read and write
1F22C44A000
unkown
page read and write
163D1300000
unkown
page read and write
2E2F59E1000
unkown
page read and write
2769CB30000
heap
page read and write
2686A140000
unkown
page read and write
4EC347E000
stack
page read and write
2E2F5935000
unkown
page read and write
2E2F5F56000
unkown
page read and write
2E2F59DD000
unkown
page read and write
1D3742D7000
unkown
page read and write
2E2F5F5C000
unkown
page read and write
2094C463000
unkown
page read and write
27DE000
stack
page read and write
9B0000
unkown
page readonly
2E2F6128000
unkown
page read and write
2E2F5884000
unkown
page read and write
27FF8360000
remote allocation
page read and write
1F22DDA0000
trusted library allocation
page read and write
2094BF76000
unkown
page read and write
2E2F5978000
unkown
page read and write
2E2F59AB000
unkown
page read and write
1F22C380000
unkown
page read and write
2094BF76000
unkown
page read and write
30BFD7E000
stack
page read and write
2E2F58F6000
unkown
page read and write
2E2F59B9000
unkown
page read and write
2E2F585F000
unkown
page read and write
2E2F59C4000
unkown
page read and write
CD4837D000
stack
page read and write
2E2F59FB000
unkown
page read and write
2E2F5F3F000
unkown
page read and write
2E2F66E0000
remote allocation
page read and write
26869850000
unkown
page read and write
2686A16D000
unkown
page read and write
2938B735000
heap
page read and write
2E2F59A3000
unkown
page read and write
1E6A7FB000
stack
page read and write
1D611FF000
stack
page read and write
CD480FE000
stack
page read and write
2094BF7C000
unkown
page read and write
1FC06E47000
unkown
page read and write
2E2F59A5000
unkown
page read and write
2E2F5931000
unkown
page read and write
2E2F592F000
unkown
page read and write
2E2F594F000
unkown
page read and write
2E2F5F78000
unkown
page read and write
2E2F594A000
unkown
page read and write
2E2F5FDF000
unkown
page read and write
233CF7E000
stack
page read and write
1D35424F000
unkown
page read and write
1FC06F00000
unkown
page read and write
1D3542C0000
unkown
page read and write
2E2F5F57000
unkown
page read and write
2686A170000
unkown
page read and write
2094BFCB000
unkown
page read and write
EC880FB000
stack
page read and write
2E2F5893000
unkown
page read and write
2E2F595C000
unkown
page read and write
2E2F66E0000
remote allocation
page read and write
2E2F59C6000
unkown
page read and write
2094BF8A000
unkown
page read and write
2E2F59A6000
unkown
page read and write
2686A12A000
unkown
page read and write
2E2F59CA000
unkown
page read and write
178AC649000
heap
page read and write
2094B870000
unkown
page read and write
2769C98F000
heap
page read and write
2E2F6138000
unkown
page read and write
2E2F5928000
unkown
page read and write
2686A86A000
unkown
page read and write
2E2F55C0000
heap
page read and write
2E2F614F000
unkown
page read and write
1F22C42A000
unkown
page read and write
1FC06E29000
unkown
page read and write
2094BF86000
unkown
page read and write
1FC06C00000
heap
page read and write
178AC5C0000
heap
page read and write
2938B4CA000
heap
page read and write
1D374195000
unkown
page read and write
2E2F58AB000
unkown
page read and write
2094BFB4000
unkown
page read and write
2E2F5938000
unkown
page read and write
1F895300000
unkown
page read and write
EDB2BBE000
stack
page read and write
163D1213000
unkown
page read and write
1D3742B3000
unkown
page read and write
1F22C402000
unkown
page read and write
27FF7C40000
unkown
page read and write
2E2F58DC000
unkown
page read and write
2E2F592C000
unkown
page read and write
2E2F593F000
unkown
page read and write
1A6FE013000
unkown
page read and write
2094BF82000
unkown
page read and write
27FF8360000
remote allocation
page read and write
2E2F588C000
unkown
page read and write
2E2F589F000
unkown
page read and write
2E2F58A7000
unkown
page read and write
2E2F59AB000
unkown
page read and write
26869892000
unkown
page read and write
1D354313000
unkown
page read and write
2686A132000
unkown
page read and write
2E2F58AD000
unkown
page read and write
2E2F585E000
unkown
page read and write
20B8E78E000
heap
page read and write
1F895302000
unkown
page read and write
2E2F5F7B000
unkown
page read and write
2E2F59CF000
unkown
page read and write
2686A17B000
unkown
page read and write
2686A802000
unkown
page read and write
1495CA2E000
unkown
page read and write
2E2F5F15000
unkown
page read and write
2094B847000
unkown
page read and write
2094B88C000
unkown
page read and write
2E2F5F7C000
unkown
page read and write
2E2F58EF000
unkown
page read and write
44D4DFE000
stack
page read and write
1495C970000
heap
page read and write
1D36FFFC000
unkown
page read and write
1F22C500000
unkown
page read and write
2E2F5877000
unkown
page read and write
19C616FC000
heap
page read and write
1FC06E3C000
unkown
page read and write
2E2F5964000
unkown
page read and write
2938B3E0000
heap
page read and write
27FF7B60000
heap
page read and write
1D3540C0000
heap
page read and write
2E2F591A000
unkown
page read and write
EF0000
remote allocation
page read and write
2E2F59BD000
unkown
page read and write
2E2F598D000
unkown
page read and write
2094BF7A000
unkown
page read and write
2E2F59E2000
unkown
page read and write
2E2F59EA000
unkown
page read and write
1D374143000
unkown
page read and write
4EC307E000
stack
page read and write
2E2F59B6000
unkown
page read and write
2E2F5973000
unkown
page read and write
1D354260000
unkown
page read and write
EC87DFB000
stack
page read and write
1F22C466000
unkown
page read and write
2E2F589B000
unkown
page read and write
20B8E774000
heap
page read and write
2938B4B7000
heap
page read and write
1D374436000
unkown
page read and write
1F8951B0000
unkown
page read and write
2E2F58C4000
unkown
page read and write
D6D397E000
stack
page read and write
2E2F5F77000
unkown
page read and write
1495CA40000
unkown
page read and write
2E2F5FEC000
unkown
page read and write
2E2F5F1D000
unkown
page read and write
2E2F5893000
unkown
page read and write
2E2F5944000
unkown
page read and write
1F89523C000
unkown
page read and write
1D3542DB000
unkown
page read and write
2E2F59B9000
unkown
page read and write
2E2F5964000
unkown
page read and write
2E2F600A000
unkown
page read and write
19C61670000
heap
page read and write
2094BFB5000
unkown
page read and write
2094BFD5000
unkown
page read and write
2E2F5937000
unkown
page read and write
2E2F5F4E000
unkown
page read and write
2E2F5917000
unkown
page read and write
1FC06E76000
unkown
page read and write
758C7E000
stack
page read and write
2E2F6137000
unkown
page read and write
2E2F596F000
unkown
page read and write
1D354225000
unkown
page read and write
2E2F58A9000
unkown
page read and write
2E2F5934000
unkown
page read and write
2E2F5921000
unkown
page read and write
2E2F601B000
unkown
page read and write
4EC2FFC000
stack
page read and write
163D1200000
unkown
page read and write
1F22C48B000
unkown
page read and write
2E2F587F000
unkown
page read and write
1D36FF0B000
unkown
page read and write
2E2F58C7000
unkown
page read and write
1495CA3A000
unkown
page read and write
2094BF81000
unkown
page read and write
2E2F594A000
unkown
page read and write
2094BF74000
unkown
page read and write
20B8E79B000
heap
page read and write
2E2F59E4000
unkown
page read and write
2E2F59DA000
unkown
page read and write
2E2F5F6C000
unkown
page read and write
19C61650000
heap
page read and write
2E2F588B000
unkown
page read and write
2E2F58A2000
unkown
page read and write
2E2F592A000
unkown
page read and write
2094BF7A000
unkown
page read and write
178AD3B0000
trusted library allocation
page read and write
268698AE000
unkown
page read and write
1D374274000
unkown
page read and write
2E2F5F71000
unkown
page read and write
2E2F5913000
unkown
page read and write
1F895308000
unkown
page read and write
2E2F59D1000
unkown
page read and write
2E2F595A000
unkown
page read and write
1D374000000
unkown
page read and write
2094BF82000
unkown
page read and write
2686A814000
unkown
page read and write
2E2F5923000
unkown
page read and write
2E2F593A000
unkown
page read and write
1D354190000
trusted library allocation
page read and write
2E2F596A000
unkown
page read and write
2686A140000
unkown
page read and write
1D36FF1D000
unkown
page read and write
2686A157000
unkown
page read and write
2094BFD5000
unkown
page read and write
1D374004000
unkown
page read and write
2E2F5F8E000
unkown
page read and write
2686A16F000
unkown
page read and write
4EC317B000
stack
page read and write
233CFF9000
stack
page read and write
1495D130000
unkown
page read and write
1D374123000
unkown
page read and write
2094BF8A000
unkown
page read and write
1FC06E4B000
unkown
page read and write
178AC67A000
heap
page read and write
2686A16F000
unkown
page read and write
1D373DFC000
unkown
page read and write
1D354227000
unkown
page read and write
1D373D3C000
unkown
page read and write
2094BFB4000
unkown
page read and write
BD4667F000
stack
page read and write
2094BFCB000
unkown
page read and write
163D1251000
unkown
page read and write
1F22C43D000
unkown
page read and write
2094BF94000
unkown
page read and write
1D36FF0E000
unkown
page read and write
233CBBC000
stack
page read and write
2E2F59DE000
unkown
page read and write
1F22C3D0000
remote allocation
page read and write
2E2F5F54000
unkown
page read and write
2686A129000
unkown
page read and write
2E2F5F7E000
unkown
page read and write
2E2F58D8000
unkown
page read and write
26869F60000
remote allocation
page read and write
1D36FDD0000
trusted library allocation
page read and write
2094BF72000
unkown
page read and write
2E2F593F000
unkown
page read and write
1F895299000
unkown
page read and write
2769C8D0000
heap
page read and write
2686A12F000
unkown
page read and write
2E2F59E3000
unkown
page read and write
2E2F58B2000
unkown
page read and write
1D374329000
unkown
page read and write
D6D3B77000
stack
page read and write
2938B4CA000
heap
page read and write
2E2F59BD000
unkown
page read and write
2E2F5F47000
unkown
page read and write
2094BF9B000
unkown
page read and write
2E2F58CD000
unkown
page read and write
2E2F6136000
unkown
page read and write
1495CA3D000
unkown
page read and write
26869710000
heap
page read and write
2938B710000
heap
page read and write
2686A129000
unkown
page read and write
1D373D39000
unkown
page read and write
2E2F594E000
unkown
page read and write
1D3740B8000
unkown
page read and write
2E2F5898000
unkown
page read and write
30BFCFF000
stack
page read and write
2E2F59C1000
unkown
page read and write
1D36FF48000
unkown
page read and write
2769C960000
heap
page read and write
E30ADFC000
stack
page read and write
2E2F5943000
unkown
page read and write
1D354200000
unkown
page read and write
2E2F59A8000
unkown
page read and write
27FF8330000
unkown
page read and write
2E2F5F4E000
unkown
page read and write
178AC636000
heap
page read and write
1F895120000
heap
page read and write
7589AE000
stack
page read and write
163D1282000
unkown
page read and write
2094C463000
unkown
page read and write
2E2F59AE000
unkown
page read and write
BD4677A000
stack
page read and write
2686A015000
unkown
page read and write
2E2F5911000
unkown
page read and write
2E2F5947000
unkown
page read and write
CD4817F000
stack
page read and write
2E2F599D000
unkown
page read and write
2938B490000
heap
page read and write
2E2F5F9B000
unkown
page read and write
26869780000
heap
page read and write
1F22C449000
unkown
page read and write
1F89524B000
unkown
page read and write
2094BF5B000
unkown
page read and write
1D614FC000
stack
page read and write
900377E000
stack
page read and write
2E2F58C5000
unkown
page read and write
1495CA63000
unkown
page read and write
EC8817F000
stack
page read and write
2E2F58ED000
unkown
page read and write
1FC06F13000
unkown
page read and write
2E2F5922000
unkown
page read and write
2E2F593B000
unkown
page read and write
2E2F58F2000
unkown
page read and write
2769CC60000
heap
page read and write
178AC693000
heap
page read and write
1A6FE102000
unkown
page read and write
2E2F5958000
unkown
page read and write
1D36FE02000
unkown
page read and write
1495CA31000
unkown
page read and write
2769C976000
heap
page read and write
1A6FE02A000
unkown
page read and write
2E2F5630000
heap
page read and write
1D37421B000
unkown
page read and write
2E2F598F000
unkown
page read and write
2E2F59A2000
unkown
page read and write
1E6A3CE000
stack
page read and write
26869883000
unkown
page read and write
2938B49B000
heap
page read and write
2E2F59AD000
unkown
page read and write
1A6FDF90000
heap
page read and write
2E2F596B000
unkown
page read and write
1D3743A7000
unkown
page read and write
2E2F58AA000
unkown
page read and write
2686A86A000
unkown
page read and write
2E2F59A7000
unkown
page read and write
2E2F59D5000
unkown
page read and write
1495C960000
heap
page read and write
2094BF20000
unkown
page read and write
1D374063000
unkown
page read and write
1D3542E3000
unkown
page read and write
2E2F59E3000
unkown
page read and write
2E2F602C000
unkown
page read and write
EC87FFE000
stack
page read and write
20B8E730000
heap
page read and write
2094C402000
unkown
page read and write
2E2F58CB000
unkown
page read and write
2E2F5FE7000
unkown
page read and write
1F22C477000
unkown
page read and write
1D374482000
unkown
page read and write
178AD180000
trusted library allocation
page read and write
1D36FF43000
unkown
page read and write
2E2F598D000
unkown
page read and write
1D3742CB000
unkown
page read and write
2686A113000
unkown
page read and write
1D36FFF4000
unkown
page read and write
2E2F5F74000
unkown
page read and write
1D37436D000
unkown
page read and write
1495CB02000
unkown
page read and write
1495CA76000
unkown
page read and write
2E2F5956000
unkown
page read and write
2E2F5997000
unkown
page read and write
CD484FD000
stack
page read and write
1D374494000
unkown
page read and write
1D3542EA000
unkown
page read and write
9003B7B000
stack
page read and write
2E2F59A3000
unkown
page read and write
19C616DF000
heap
page read and write
2094BFB4000
unkown
page read and write
2E2F613C000
unkown
page read and write
1D373C00000
unkown
page read and write
2E2F5F2E000
unkown
page read and write
2E2F58B0000
unkown
page read and write
2769C9A1000
heap
page read and write
2938B4C9000
heap
page read and write
2E2F59D9000
unkown
page read and write
2094BF9E000
unkown
page read and write
2686A10F000
unkown
page read and write
20B8E767000
heap
page read and write
90034FD000
stack
page read and write
2E2F6136000
unkown
page read and write
E30ABFF000
stack
page read and write
2E2F6102000
unkown
page read and write
7FF4C1281000
trusted library allocation
page execute read
2E2F5FE4000
unkown
page read and write
1D373CB5000
unkown
page read and write
2E2F58D3000
unkown
page read and write
2E2F59B6000
unkown
page read and write
2E2F59C4000
unkown
page read and write
2094BF87000
unkown
page read and write
2E2F598C000
unkown
page read and write
1D374237000
unkown
page read and write
44D4CFE000
stack
page read and write
1D36FF00000
unkown
page read and write
2094BF58000
unkown
page read and write
2094B913000
unkown
page read and write
2686A002000
unkown
page read and write
1D373E00000
trusted library allocation
page read and write
1F89524E000
unkown
page read and write
2E2F592B000
unkown
page read and write
178AC67E000
heap
page read and write
30BFA7B000
stack
page read and write
2938B400000
heap
page read and write
2E2F5FE3000
unkown
page read and write
2E2F5942000
unkown
page read and write
2094B829000
unkown
page read and write
1D3744B6000
unkown
page read and write
1A6FE100000
unkown
page read and write
1D36FF8B000
unkown
page read and write
2E2F5932000
unkown
page read and write
1D374084000
unkown
page read and write
163D1010000
heap
page read and write
1D37447C000
unkown
page read and write
58357B000
stack
page read and write
2E2F58BC000
unkown
page read and write
1495CA33000
unkown
page read and write
2E2F6109000
unkown
page read and write
EDB2E7E000
stack
page read and write
2E2F5966000
unkown
page read and write
1D610F9000
stack
page read and write
2E2F6002000
unkown
page read and write
2E2F59ED000
unkown
page read and write
19C61A85000
heap
page read and write
178AC64E000
heap
page read and write
2E2F59EB000
unkown
page read and write
1495CA33000
unkown
page read and write
26869825000
unkown
page read and write
2E2F5997000
unkown
page read and write
2E2F58A8000
unkown
page read and write
1495CA42000
unkown
page read and write
1FC06E13000
unkown
page read and write
4EC337F000
stack
page read and write
2094C500000
unkown
page read and write
2E2F594D000
unkown
page read and write
1F895213000
unkown
page read and write
2686A15A000
unkown
page read and write
1495CA60000
unkown
page read and write
2E2F5F7E000
unkown
page read and write
1D36CF50000
trusted library allocation
page read and write
19C61A80000
heap
page read and write
90035FC000
stack
page read and write
178AC698000
heap
page read and write
1F22C513000
unkown
page read and write
2E2F59ED000
unkown
page read and write
1D373D86000
unkown
page read and write
2686A12E000
unkown
page read and write
1495CA67000
unkown
page read and write
27FF7C02000
unkown
page read and write
2E2F59BF000
unkown
page read and write
2E2F59D9000
unkown
page read and write
2E2F5862000
unkown
page read and write
2E2F611A000
unkown
page read and write
2E2F5F86000
unkown
page read and write
2E2F5955000
unkown
page read and write
2686A12C000
unkown
page read and write
2E2F5984000
unkown
page read and write
758DFE000
stack
page read and write
2E2F58BF000
unkown
page read and write
26869829000
unkown
page read and write
2E2F5FFE000
unkown
page read and write
2E2F59EA000
unkown
page read and write
EC87A7C000
stack
page read and write
44D49DC000
stack
page read and write
2E2F58CB000
unkown
page read and write
2E2F5970000
unkown
page read and write
27FF7C5C000
unkown
page read and write
1D374187000
unkown
page read and write
2E2F5971000
unkown
page read and write
2E2F58BC000
unkown
page read and write
2E2F5F85000
unkown
page read and write
1FC06C70000
heap
page read and write
26869878000
unkown
page read and write
2E2F5F7A000
unkown
page read and write
2686A162000
unkown
page read and write
2938B4AA000
heap
page read and write
1D37411F000
unkown
page read and write
1A6FE802000
unkown
page read and write
20B8E6D5000
heap
page read and write
178AC630000
heap
page read and write
EC87C79000
stack
page read and write
DFC000
heap
page read and write
2E2F599C000
unkown
page read and write
2E2F5988000
unkown
page read and write
1F895226000
unkown
page read and write
1A6FE084000
unkown
page read and write
2094C402000
unkown
page read and write
2094BFBF000
unkown
page read and write
2E2F59BB000
unkown
page read and write
1F895249000
unkown
page read and write
2E2F612E000
unkown
page read and write
30BFC7F000
stack
page read and write
58337E000
stack
page read and write
2E2F5F72000
unkown
page read and write
2094BF8A000
unkown
page read and write
1A6FE000000
unkown
page read and write
2E2F5993000
unkown
page read and write
2686A172000
unkown
page read and write
2094BF84000
unkown
page read and write
2094C42E000
unkown
page read and write
1E6A2CB000
stack
page read and write
30BFBFE000
stack
page read and write
2094BF8D000
unkown
page read and write
2094BFB4000
unkown
page read and write
1F895247000
unkown
page read and write
9003A7F000
stack
page read and write
2E2F58EC000
unkown
page read and write
1F22C280000
heap
page read and write
D6D3A7B000
stack
page read and write
2094B5E0000
heap
page read and write
1495CA00000
unkown
page read and write
2E2F58B2000
unkown
page read and write
2094BF97000
unkown
page read and write
27FF7C13000
unkown
page read and write
19C616DA000
heap
page read and write
2E2F59A8000
unkown
page read and write
2E2F58E0000
unkown
page read and write
2686A129000
unkown
page read and write
1495CA78000
unkown
page read and write
268698DD000
unkown
page read and write
1D37439B000
unkown
page read and write
2E2F6103000
unkown
page read and write
2E2F595F000
unkown
page read and write
1495CA7F000
unkown
page read and write
2094B84C000
unkown
page read and write
2094BF82000
unkown
page read and write
1D3743A7000
unkown
page read and write
2094BF19000
unkown
page read and write
2E2F59DA000
unkown
page read and write
2E2F5954000
unkown
page read and write
20B8E760000
heap
page read and write
E30ACF9000
stack
page read and write
2686A176000
unkown
page read and write
2094BF8A000
unkown
page read and write
90036F7000
stack
page read and write
2E2F5869000
unkown
page read and write
2686A155000
unkown
page read and write
758FFE000
stack
page read and write
2E2F599F000
unkown
page read and write
1495CA49000
unkown
page read and write
EDB317F000
stack
page read and write
2E2F58D5000
unkown
page read and write
2686A860000
unkown
page read and write
2E2F5923000
unkown
page read and write
26869899000
unkown
page read and write
2686988C000
unkown
page read and write
1D36FF06000
unkown
page read and write
26869F60000
remote allocation
page read and write
2E2F59C2000
unkown
page read and write
2E2F601E000
unkown
page read and write
2E2F5938000
unkown
page read and write
1495CA29000
unkown
page read and write
2094BF82000
unkown
page read and write
2E2F5890000
unkown
page read and write
2E2F5881000
unkown
page read and write
1D615FF000
stack
page read and write
2E2F593C000
unkown
page read and write
2E2F5F7F000
unkown
page read and write
2E2F59AA000
unkown
page read and write
1F22C45A000
unkown
page read and write
2E2F5F59000
unkown
page read and write
2E2F59FD000
unkown
page read and write
2094B8E0000
unkown
page read and write
2E2F5980000
unkown
page read and write
2E2F598E000
unkown
page read and write
2E2F59D5000
unkown
page read and write
2E2F58BC000
unkown
page read and write
1D3542C3000
unkown
page read and write
1D3743CE000
unkown
page read and write
2E2F614D000
unkown
page read and write
2E2F5F55000
unkown
page read and write
2E2F59D7000
unkown
page read and write
1495CA85000
unkown
page read and write
2E2F5F1E000
unkown
page read and write
1D37401C000
unkown
page read and write
178AC730000
trusted library allocation
page read and write
1F895253000
unkown
page read and write
1A6FDFC0000
unkown
page read and write
2094BF60000
unkown
page read and write
1D37423C000
unkown
page read and write
1FC06F08000
unkown
page read and write
2E2F6138000
unkown
page read and write
EDB30FD000
stack
page read and write
2938B4B7000
heap
page read and write
2E2F5966000
unkown
page read and write
1D374160000
unkown
page read and write
2E2F58A0000
unkown
page read and write
2E2F59B0000
unkown
page read and write
1495CA75000
unkown
page read and write
BD4635A000
stack
page read and write
2686A178000
unkown
page read and write
1F22C518000
unkown
page read and write
2E2F5911000
unkown
page read and write
2E2F59E6000
unkown
page read and write
2E2F5929000
unkown
page read and write
2E2F58FD000
unkown
page read and write
2E2F5950000
unkown
page read and write
2E2F5945000
unkown
page read and write
1D3743CE000
unkown
page read and write
2686A16D000
unkown
page read and write
2094B8D3000
unkown
page read and write
178AC7C0000
heap
page read and write
1D374169000
unkown
page read and write
2094BF20000
unkown
page read and write
2094BF89000
unkown
page read and write
2686A183000
unkown
page read and write
D4E000
stack
page read and write
1A6FDF20000
heap
page read and write
178AD3C0000
heap
page readonly
2938B730000
heap
page read and write
1495CA6A000
unkown
page read and write
1D3743B0000
unkown
page read and write
2E2F5F8C000
unkown
page read and write
2E2F5F88000
unkown
page read and write
2E2F6105000
unkown
page read and write
1D36FF36000
unkown
page read and write
2094BFB2000
unkown
page read and write
2E2F59FD000
unkown
page read and write
2686A15A000
unkown
page read and write
DD0000
heap
page read and write
FB0000
heap
page read and write
27FF7B70000
heap
page read and write
2094BF86000
unkown
page read and write
2E2F59BB000
unkown
page read and write
2686A10E000
unkown
page read and write
2E2F589F000
unkown
page read and write
2E2F59DC000
unkown
page read and write
2E2F588D000
unkown
page read and write
2E2F59B8000
unkown
page read and write
2E2F58E6000
unkown
page read and write
163D1313000
unkown
page read and write
2094B813000
unkown
page read and write
1FC06D70000
unkown
page read and write
1A6FE04B000
unkown
page read and write
1D35430B000
unkown
page read and write
1D617FF000
stack
page read and write
BD467FF000
stack
page read and write
27FF7BD0000
heap
page read and write
1495CA7B000
unkown
page read and write
2686A100000
unkown
page read and write
2094BFC5000
unkown
page read and write
1D373DC5000
unkown
page read and write
20B8E790000
heap
page read and write
2E2F58BF000
unkown
page read and write
2E2F59FF000
unkown
page read and write
2E2F6110000
unkown
page read and write
2E2F59EB000
unkown
page read and write
1495CA13000
unkown
page read and write
2094BF71000
unkown
page read and write
4EC2BFB000
stack
page read and write
163D1275000
unkown
page read and write
178AC470000
trusted library allocation
page read and write
2E2F5F06000
unkown
page read and write
2686A174000
unkown
page read and write
2094BF84000
unkown
page read and write
1D3742CD000
unkown
page read and write
8F0000
heap
page read and write
2686991A000
unkown
page read and write
2E2F5988000
unkown
page read and write
1E6AB7F000
stack
page read and write
2E2F5975000
unkown
page read and write
2E2F59DD000
unkown
page read and write
2E2F58FF000
unkown
page read and write
2E2F59AD000
unkown
page read and write
268698E3000
unkown
page read and write
2E2F58F8000
unkown
page read and write
2686A173000
unkown
page read and write
2686A162000
unkown
page read and write
2E2F58E8000
unkown
page read and write
E30A7CE000
stack
page read and write
178AC7C9000
heap
page read and write
178AC460000
heap
page read and write
268697B0000
unkown
page read and write
2E2F5F80000
unkown
page read and write
178AC63D000
heap
page read and write
1F895279000
unkown
page read and write
2686A15C000
unkown
page read and write
DF3000
heap
page read and write
2094C3A0000
remote allocation
page read and write
2686A171000
unkown
page read and write
2E2F594B000
unkown
page read and write
2094B8A8000
unkown
page read and write
2E2F586A000
unkown
page read and write
2E2F589C000
unkown
page read and write
2E2F5949000
unkown
page read and write
28DE000
stack
page read and write
2769C99D000
heap
page read and write
2E2F611E000
unkown
page read and write
E30AEFE000
stack
page read and write
2E2F5981000
unkown
page read and write
2E2F591E000
unkown
page read and write
20B8E783000
heap
page read and write
2E2F58D8000
unkown
page read and write
2E2F5853000
unkown
page read and write
2E2F59E0000
unkown
page read and write
163D123C000
unkown
page read and write
2686A129000
unkown
page read and write
2E2F5F7C000
unkown
page read and write
1D373DCB000
unkown
page read and write
1495D202000
unkown
page read and write
2E2F5F85000
unkown
page read and write
178AC67E000
heap
page read and write
2E2F5983000
unkown
page read and write
2E2F592D000
unkown
page read and write
2E2F596B000
unkown
page read and write
1495CA57000
unkown
page read and write
2094BF89000
unkown
page read and write
1D354357000
unkown
page read and write
1D612FF000
stack
page read and write
1D374474000
unkown
page read and write
1495CA58000
unkown
page read and write
2E2F583C000
unkown
page read and write
2769C987000
heap
page read and write
1A6FE053000
unkown
page read and write
2E2F59BE000
unkown
page read and write
2E2F59BE000
unkown
page read and write
2E2F611C000
unkown
page read and write
2E2F6123000
unkown
page read and write
1D354368000
unkown
page read and write
2E2F59D0000
unkown
page read and write
2094BF86000
unkown
page read and write
1D3743F7000
unkown
page read and write
2E2F595A000
unkown
page read and write
2E2F5861000
unkown
page read and write
2E2F58AE000
unkown
page read and write
27FF7C00000
unkown
page read and write
1495CA45000
unkown
page read and write
2094BF4D000
unkown
page read and write
2686A129000
unkown
page read and write
1D373CB8000
unkown
page read and write
163D11E0000
unkown
page read and write
1F22C3A0000
trusted library allocation
page read and write
2E2F591C000
unkown
page read and write
1D37412E000
unkown
page read and write
1495CA6C000
unkown
page read and write
2E2F5F49000
unkown
page read and write
DCE000
stack
page read and write
2686A14B000
unkown
page read and write
268698F2000
unkown
page read and write
2E2F5940000
unkown
page read and write
2094BFB4000
unkown
page read and write
26869887000
unkown
page read and write
2938B4AA000
heap
page read and write
2769C986000
heap
page read and write
2E2F59EE000
unkown
page read and write
2E2F5990000
unkown
page read and write
26869872000
unkown
page read and write
2E2F5919000
unkown
page read and write
2E2F59BC000
unkown
page read and write
2E2F5952000
unkown
page read and write
1F895180000
heap
page read and write
1D3542F6000
unkown
page read and write
1495CA5A000
unkown
page read and write
1D374400000
unkown
page read and write
1D374472000
unkown
page read and write
2094BFD4000
unkown
page read and write
2E2F5933000
unkown
page read and write
27FF8402000
unkown
page read and write
2094BF17000
unkown
page read and write
2686A12D000
unkown
page read and write
2E2F5825000
unkown
page read and write
2E2F5F76000
unkown
page read and write
1D36FF10000
unkown
page read and write
BD4687D000
stack
page read and write
2094BF77000
unkown
page read and write
1FC07602000
unkown
page read and write
2686A14C000
unkown
page read and write
1D37405B000
unkown
page read and write
2094BE02000
unkown
page read and write
2E2F5962000
unkown
page read and write
2E2F5880000
unkown
page read and write
2E2F6119000
unkown
page read and write
2094B854000
unkown
page read and write
2686A174000
unkown
page read and write
2E2F58FB000
unkown
page read and write
2686A800000
unkown
page read and write
2E2F59C0000
unkown
page read and write
9D0000
unkown
page read and write
2E2F59CE000
unkown
page read and write
1F22C502000
unkown
page read and write
2E2F5F50000
unkown
page read and write
2E2F5962000
unkown
page read and write
178AC698000
heap
page read and write
1F895313000
unkown
page read and write
2686A12C000
unkown
page read and write
2E2F5885000
unkown
page read and write
2E2F5F5C000
unkown
page read and write
2769C980000
heap
page read and write
1D374046000
unkown
page read and write
2E2F58D1000
unkown
page read and write
2769C99D000
heap
page read and write
2E2F591C000
unkown
page read and write
1D373DD1000
unkown
page read and write
20B8E6D0000
heap
page read and write
2E2F597B000
unkown
page read and write
9E0000
heap
page read and write
1D373D2F000
unkown
page read and write
2686A16B000
unkown
page read and write
1F22C45A000
unkown
page read and write
2E2F593D000
unkown
page read and write
163D1308000
unkown
page read and write
19C615E0000
heap
page read and write
2E2F5F18000
unkown
page read and write
2E2F6121000
unkown
page read and write
44D4D7E000
stack
page read and write
2E2F5F75000
unkown
page read and write
2686A129000
unkown
page read and write
2E2F611D000
unkown
page read and write
2E2F59C9000
unkown
page read and write
2E2F585E000
unkown
page read and write
2094BFB4000
unkown
page read and write
EDB2B3C000
stack
page read and write
2E2F59B2000
unkown
page read and write
2E2F58BA000
unkown
page read and write
2686988F000
unkown
page read and write
1F22C210000
heap
page read and write
2E2F612F000
unkown
page read and write
EF0000
remote allocation
page read and write
2686A177000
unkown
page read and write
2686983D000
unkown
page read and write
1D373C27000
unkown
page read and write
1F22C3D0000
remote allocation
page read and write
2E2F5951000
unkown
page read and write
2E2F5881000
unkown
page read and write
1A6FE03C000
unkown
page read and write
2E2F6003000
unkown
page read and write
2E2F5882000
unkown
page read and write
2E2F586C000
unkown
page read and write
900347E000
stack
page read and write
30BFAFD000
stack
page read and write
1E6A6FB000
stack
page read and write
2E2F6136000
unkown
page read and write
2E2F66E0000
remote allocation
page read and write
2E2F5993000
unkown
page read and write
2E2F597C000
unkown
page read and write
2E2F610C000
unkown
page read and write
2E2F59D2000
unkown
page read and write
2E2F5916000
unkown
page read and write
2E2F5FD1000
unkown
page read and write
2686A17F000
unkown
page read and write
2E2F59CC000
unkown
page read and write
9C0000
unkown
page readonly
1D36FF8E000
unkown
page read and write
1D3741FF000
unkown
page read and write
2E2F599F000
unkown
page read and write
1F895A02000
unkown
page read and write
2094BF7B000
unkown
page read and write
1D35429E000
unkown
page read and write
1D354326000
unkown
page read and write
2E2F597A000
unkown
page read and write
E30A6CC000
stack
page read and write
EDB307F000
stack
page read and write
2094BF8D000
unkown
page read and write
2E2F58BD000
unkown
page read and write
2E2F587D000
unkown
page read and write
2094B848000
unkown
page read and write
2E2F58FD000
unkown
page read and write
178AC67E000
heap
page read and write
2E2F5871000
unkown
page read and write
EF0000
remote allocation
page read and write
1F22C220000
heap
page read and write
2E2F59C3000
unkown
page read and write
2686A170000
unkown
page read and write
2E2F5991000
unkown
page read and write
2686A844000
unkown
page read and write
6EAE07C000
stack
page read and write
5835FE000
stack
page read and write
2094B84F000
unkown
page read and write
6EAE6FC000
stack
page read and write
2E2F58D8000
unkown
page read and write
2E2F5979000
unkown
page read and write
2E2F5F72000
unkown
page read and write
2686985A000
unkown
page read and write
2E2F5F85000
unkown
page read and write
2E2F593E000
unkown
page read and write
178AD3D0000
trusted library allocation
page read and write
1495CA97000
unkown
page read and write
268698C3000
unkown
page read and write
1FC06E5D000
unkown
page read and write
2E2F590F000
unkown
page read and write
2938B4A5000
heap
page read and write
2E2F5968000
unkown
page read and write
6EAE27D000
stack
page read and write
2769C976000
heap
page read and write
1D616FB000
stack
page read and write
900397A000
stack
page read and write
6EAE7FC000
stack
page read and write
2E2F5914000
unkown
page read and write
2094BFB4000
unkown
page read and write
2E2F5884000
unkown
page read and write
1D373CE5000
unkown
page read and write
2094B902000
unkown
page read and write
1D36FF4F000
unkown
page read and write
6EAE4FE000
stack
page read and write
1D374361000
unkown
page read and write
2E2F5884000
unkown
page read and write
2094BF8B000
unkown
page read and write
2094BFB4000
unkown
page read and write
2E2F6131000
unkown
page read and write
E30AFFB000
stack
page read and write
2E2F5F51000
unkown
page read and write
1D354213000
unkown
page read and write
26869867000
unkown
page read and write
2094B8EE000
unkown
page read and write
19C616F9000
heap
page read and write
178AC65D000
heap
page read and write
2E2F59FE000
unkown
page read and write
2E2F5888000
unkown
page read and write
2E2F5F70000
unkown
page read and write
EC87CFD000
stack
page read and write
2094BF97000
unkown
page read and write
1FC06E00000
unkown
page read and write
233D0F9000
stack
page read and write
2E2F59FF000
unkown
page read and write
2094B908000
unkown
page read and write
2E2F599A000
unkown
page read and write
1FC06F02000
unkown
page read and write
1F22C3D0000
remote allocation
page read and write
26869831000
unkown
page read and write
2E2F5994000
unkown
page read and write
2E2F601C000
unkown
page read and write
2E2F59D0000
unkown
page read and write
1D3743AF000
unkown
page read and write
163D1302000
unkown
page read and write
1D3741F3000
unkown
page read and write
1D374451000
unkown
page read and write
2E2F58E1000
unkown
page read and write
2094BF7A000
unkown
page read and write
1D613FC000
stack
page read and write
D6D38FB000
stack
page read and write
1495CA7C000
unkown
page read and write
2E2F6005000
unkown
page read and write
2E2F5F7E000
unkown
page read and write
2E2F59C6000
unkown
page read and write
2769C930000
heap
page read and write
1495CA4E000
unkown
page read and write
26869913000
unkown
page read and write
2686A85C000
unkown
page read and write
2E2F5995000
unkown
page read and write
2E2F59D6000
unkown
page read and write
2094BF88000
unkown
page read and write
2E2F59A9000
unkown
page read and write
178AC690000
heap
page read and write
2E2F5887000
unkown
page read and write
2E2F5983000
unkown
page read and write
1F22E000000
trusted library allocation
page read and write
2769C9A0000
heap
page read and write
26869831000
unkown
page read and write
2E2F58DD000
unkown
page read and write
2E2F594D000
unkown
page read and write
2094BF7C000
unkown
page read and write
1495C9D0000
heap
page read and write
2E2F58BC000
unkown
page read and write
2094BFB4000
unkown
page read and write
2094B84D000
unkown
page read and write
75892B000
stack
page read and write
D6D35CE000
stack
page read and write
2E2F6117000
unkown
page read and write
2769C99D000
heap
page read and write
2E2F5990000
unkown
page read and write
2E2F5FA7000
unkown
page read and write
2686A831000
unkown
page read and write
2E2F58AE000
unkown
page read and write
2E2F5E02000
unkown
page read and write
1FC06E5D000
unkown
page read and write
2E2F5FC1000
unkown
page read and write
2E2F59B3000
unkown
page read and write
163D122A000
unkown
page read and write
1495CA6E000
unkown
page read and write
1F22C413000
unkown
page read and write
2E2F5FEF000
unkown
page read and write
2E2F596C000
unkown
page read and write
26869892000
unkown
page read and write
2686A000000
unkown
page read and write
1D37418D000
unkown
page read and write
1D374184000
unkown
page read and write
1D608FA000
stack
page read and write
2E2F5999000
unkown
page read and write
1F22DE02000
unkown
page read and write
9B0000
unkown
page readonly
2E2F5F18000
unkown
page read and write
2E2F58BB000
unkown
page read and write
268698CA000
unkown
page read and write
2E2F5F1D000
unkown
page read and write
2E2F599E000
unkown
page read and write
2E2F55D0000
heap
page read and write
1F895286000
unkown
page read and write
2E2F5864000
unkown
page read and write
2686A10E000
unkown
page read and write
2E2F598C000
unkown
page read and write
2094B884000
unkown
page read and write
1D36CFE0000
trusted library allocation
page read and write
D6D354E000
stack
page read and write
1E6AA7F000
stack
page read and write
2E2F5936000
unkown
page read and write
2686A17C000
unkown
page read and write
2E2F59A1000
unkown
page read and write
2E2F5939000
unkown
page read and write
58327B000
stack
page read and write
2686A140000
unkown
page read and write
2E2F596E000
unkown
page read and write
26869800000
unkown
page read and write
1D60FFE000
stack
page read and write
2686A80A000
unkown
page read and write
2E2F5884000
unkown
page read and write
1D3542E7000
unkown
page read and write
1F22C400000
unkown
page read and write
2094C402000
unkown
page read and write
2E2F58B1000
unkown
page read and write
2E2F5976000
unkown
page read and write
1D354218000
unkown
page read and write
2E2F5958000
unkown
page read and write
26869877000
unkown
page read and write
9AC000
stack
page read and write
2E2F58B5000
unkown
page read and write
2E2F6003000
unkown
page read and write
1F22C44A000
unkown
page read and write
178AC7D0000
trusted library allocation
page read and write
2094B83C000
unkown
page read and write
2E2F6100000
unkown
page read and write
2E2F6000000
unkown
page read and write
2094BFD8000
unkown
page read and write
1FC06E4E000
unkown
page read and write
2E2F598F000
unkown
page read and write
20B8E787000
heap
page read and write
9003CFD000
stack
page read and write
2E2F59D8000
unkown
page read and write
2E2F5F6D000
unkown
page read and write
2E2F595E000
unkown
page read and write
1E6A87E000
stack
page read and write
FB5000
heap
page read and write
2E2F5FF4000
unkown
page read and write
2E2F5875000
unkown
page read and write
2E2F5F02000
unkown
page read and write
2686A159000
unkown
page read and write
9003BFF000
stack
page read and write
2686A17F000
unkown
page read and write
2E2F59E0000
unkown
page read and write
BD463DF000
stack
page read and write
2686A10E000
unkown
page read and write
2E2F59E2000
unkown
page read and write
1D373C17000
unkown
page read and write
2E2F5980000
unkown
page read and write
2E2F5871000
unkown
page read and write
2E2F5F79000
unkown
page read and write
2E2F595E000
unkown
page read and write
90031EB000
stack
page read and write
D6D3D7F000
stack
page read and write
1D36FFDB000
unkown
page read and write
2E2F5949000
unkown
page read and write
1D354259000
unkown
page read and write
2094BF71000
unkown
page read and write
2E2F5F4C000
unkown
page read and write
1D373CFD000
unkown
page read and write
2686980B000
unkown
page read and write
1D373D94000
unkown
page read and write
163D125E000
unkown
page read and write
2E2F5930000
unkown
page read and write
1495CA46000
unkown
page read and write
1D373D6E000
unkown
page read and write
1D37437E000
unkown
page read and write
26869870000
unkown
page read and write
2769C98F000
heap
page read and write
2E2F59C7000
unkown
page read and write
1FC06E9B000
unkown
page read and write
1F89525C000
unkown
page read and write
19C616C0000
heap
page read and write
178AD3E0000
trusted library allocation
page read and write
1D354399000
unkown
page read and write
1D373D4F000
unkown
page read and write
1D3744CA000
unkown
page read and write
2E2F59A4000
unkown
page read and write
2E2F5FDE000
unkown
page read and write
2094BFB4000
unkown
page read and write
2686A176000
unkown
page read and write
2E2F5995000
unkown
page read and write
1FC06E6E000
unkown
page read and write
1FC06E81000
unkown
page read and write
2E2F5931000
unkown
page read and write
2E2F5913000
unkown
page read and write
D6D34CB000
stack
page read and write
2769C996000
heap
page read and write
1F895110000
heap
page read and write
2E2F596E000
unkown
page read and write
2686A137000
unkown
page read and write
2E2F5985000
unkown
page read and write
2769C971000
heap
page read and write
2E2F601B000
unkown
page read and write
2E2F5F10000
unkown
page read and write
2686A129000
unkown
page read and write
2E2F5891000
unkown
page read and write
2686A846000
unkown
page read and write
2E2F5926000
unkown
page read and write
6EAE9FF000
stack
page read and write
2094C3A0000
remote allocation
page read and write
2769C99D000
heap
page read and write
58347B000
stack
page read and write
2E2F5F70000
unkown
page read and write
163D1264000
unkown
page read and write
19C616D5000
heap
page read and write
2E2F59C8000
unkown
page read and write
2094B8A8000
unkown
page read and write
268698CA000
unkown
page read and write
2686A17C000
unkown
page read and write
2094BF84000
unkown
page read and write
2094B8E7000
unkown
page read and write
2094C3A0000
remote allocation
page read and write
2E2F58C8000
unkown
page read and write
2E2F5979000
unkown
page read and write
2E2F5F1D000
unkown
page read and write
1D374217000
unkown
page read and write
2E2F5F46000
unkown
page read and write
1495CA5C000
unkown
page read and write
1D374300000
unkown
page read and write
2E2F58B6000
unkown
page read and write
2E2F5928000
unkown
page read and write
2094BF95000
unkown
page read and write
1D3541A0000
trusted library allocation
page read and write
2686992B000
unkown
page read and write
1D3740CC000
unkown
page read and write
2E2F5975000
unkown
page read and write
2686A174000
unkown
page read and write
2E2F5920000
unkown
page read and write
1D374253000
unkown
page read and write
178AC67E000
heap
page read and write
2E2F5F8E000
unkown
page read and write
2094B8E7000
unkown
page read and write
2E2F59B5000
unkown
page read and write
1D3541D0000
heap
page read and write
2094BDA0000
unkown
page read and write
2E2F5F43000
unkown
page read and write
2E2F5961000
unkown
page read and write
1D36FFC2000
unkown
page read and write
2E2F5934000
unkown
page read and write
2E2F59DB000
unkown
page read and write
2E2F59BA000
unkown
page read and write
2686A868000
unkown
page read and write
758EFE000
stack
page read and write
2E2F5865000
unkown
page read and write
19C616CB000
heap
page read and write
2938B4B7000
heap
page read and write
2E2F5899000
unkown
page read and write
2E2F598A000
unkown
page read and write
2094BF71000
unkown
page read and write
1D60DFE000
stack
page read and write
26869902000
unkown
page read and write
1D354130000
heap
page read and write
1E6A977000
stack
page read and write
1FC06E53000
unkown
page read and write
DD8000
heap
page read and write
2094BF77000
unkown
page read and write
1D36FFA1000
unkown
page read and write
2E2F5954000
unkown
page read and write
2094B84A000
unkown
page read and write
6EAE3FE000
stack
page read and write
2E2F5948000
unkown
page read and write
178AC65C000
heap
page read and write
2769CC65000
heap
page read and write
163D0FA0000
heap
page read and write
2E2F5913000
unkown
page read and write
1A6FE048000
unkown
page read and write
2E2F59DF000
unkown
page read and write
1D36FFA4000
unkown
page read and write
2686A151000
unkown
page read and write
2E2F5F00000
unkown
page read and write
2094BFB4000
unkown
page read and write
178AC67B000
heap
page read and write
2686A10E000
unkown
page read and write
2E2F58BD000
unkown
page read and write
2E2F58CB000
unkown
page read and write
1E6A34E000
stack
page read and write
2686A10E000
unkown
page read and write
2E2F59B1000
unkown
page read and write
268698CC000
unkown
page read and write
2E2F58F5000
unkown
page read and write
2E2F5FFC000
unkown
page read and write
EDB2FFE000
stack
page read and write
268698BF000
unkown
page read and write
2E2F5800000
unkown
page read and write
CD47FFD000
stack
page read and write
2E2F592E000
unkown
page read and write
2E2F612B000
unkown
page read and write
178AC740000
trusted library allocation
page read and write
2E2F5879000
unkown
page read and write
1D3742DB000
unkown
page read and write
2094B640000
heap
page read and write
2E2F58B4000
unkown
page read and write
2E2F6137000
unkown
page read and write
2094B8E4000
unkown
page read and write
2094BF00000
unkown
page read and write
2094B8F5000
unkown
page read and write
178AD430000
trusted library allocation
page read and write
2E2F5968000
unkown
page read and write
2E2F5F74000
unkown
page read and write
4EC3277000
stack
page read and write
2E2F5973000
unkown
page read and write
1495CA62000
unkown
page read and write
29DF000
stack
page read and write
2E2F5986000
unkown
page read and write
1D374492000
unkown
page read and write
2094BFD4000
unkown
page read and write
2E2F5961000
unkown
page read and write
2686A15B000
unkown
page read and write
1495CA5F000
unkown
page read and write
2E2F593D000
unkown
page read and write
1A6FE04E000
unkown
page read and write
1D374488000
unkown
page read and write
1D374164000
unkown
page read and write
2E2F5945000
unkown
page read and write
2E2F5F70000
unkown
page read and write
1D35434F000
unkown
page read and write
1D37412C000
unkown
page read and write
2E2F5941000
unkown
page read and write
2094BF93000
unkown
page read and write
2686A151000
unkown
page read and write
2686A110000
unkown
page read and write
178AC67D000
heap
page read and write
2094B8B2000
unkown
page read and write
30BFB7E000
stack
page read and write
1D374200000
unkown
page read and write
1A6FE06A000
unkown
page read and write
2686A12B000
unkown
page read and write
2E2F5970000
unkown
page read and write
268698C0000
unkown
page read and write
20B8E930000
heap
page read and write
2769C981000
heap
page read and write
2E2F59E6000
unkown
page read and write
1D3544D1000
trusted library allocation
page read and write
44D4C7D000
stack
page read and write
2E2F5894000
unkown
page read and write
1A6FE113000
unkown
page read and write
2E2F596D000
unkown
page read and write
2094B849000
unkown
page read and write
9C0000
unkown
page readonly
4EC2EFE000
stack
page read and write
DED000
heap
page read and write
2E2F59F3000
unkown
page read and write
1D354335000
unkown
page read and write
2E2F6009000
unkown
page read and write
2E2F5F80000
unkown
page read and write
19C616DF000
heap
page read and write
2094B852000
unkown
page read and write
1495CA65000
unkown
page read and write
2E2F599B000
unkown
page read and write
5837FF000
stack
page read and write
2686A82E000
unkown
page read and write
2686A15C000
unkown
page read and write
2E2F588E000
unkown
page read and write
2E2F58C1000
unkown
page read and write
1F895270000
unkown
page read and write
178AC7C5000
heap
page read and write
2E2F6133000
unkown
page read and write
2E2F59DF000
unkown
page read and write
2E2F5829000
unkown
page read and write
2769C995000
heap
page read and write
1D37437D000
unkown
page read and write
1D37420B000
unkown
page read and write
2E2F5F53000
unkown
page read and write
2E2F59B1000
unkown
page read and write
2E2F597D000
unkown
page read and write
1F22C459000
unkown
page read and write
2094BF78000
unkown
page read and write
2E2F5F0E000
unkown
page read and write
2E2F5971000
unkown
page read and write
2E2F59A7000
unkown
page read and write
2E2F58CF000
unkown
page read and write
2E2F5F4C000
unkown
page read and write
2E2F5883000
unkown
page read and write
E30B2FF000
stack
page read and write
2E2F5D90000
unkown
page read and write
268698A2000
unkown
page read and write
2E2F5925000
unkown
page read and write
7590FF000
stack
page read and write
2E2F594E000
unkown
page read and write
2686A85C000
unkown
page read and write
26869892000
unkown
page read and write
9003877000
stack
page read and write
2E2F59AF000
unkown
page read and write
2E2F58D8000
unkown
page read and write
1A6FDF30000
heap
page read and write
There are 1374 hidden memdumps, click here to show them.