IOC Report
airequipmentcorp-doc-08.11.2022.doc

loading gif

Files

File Path
Type
Category
Malicious
airequipmentcorp-doc-08.11.2022.doc
Zip archive data, at least v2.0 to extract
initial sample
malicious
C:\Users\user\AppData\Local\Temp\rECA2.tmp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\yE9E2.tmp.dll
HTML document, ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Temp\~DF32F8B01FD4175FF7.TMP
Composite Document File V2 Document, Cannot read section info
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\airequipmentcorp-doc-08.11.2022.doc.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:45 2022, mtime=Fri Aug 12 00:08:24 2022, atime=Fri Aug 12 00:08:17 2022, length=2203070, window=hide
dropped
malicious
C:\Users\user\AppData\Local\Temp\y6CDC.tmp.dll
HTML document, ASCII text
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\3A11B302-44CB-4EB9-BCB8-49C2BE307D7C
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\2947CA03.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\2F6F238A.png
PNG image data, 410 x 568, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{51DECAAA-E719-4ADB-922F-7BFC4F91483F}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{C3FA9527-8571-4407-A5C8-BB633260A4AC}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\rm[1].htm
HTML document, ASCII text
downloaded
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\Desktop\~$requipmentcorp-doc-08.11.2022.doc
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\rm[1].htm
HTML document, ASCII text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\airequipmentcorp-doc-08.11.2022.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:53 2022, mtime=Tue Mar 8 15:45:53 2022, atime=Thu Aug 11 23:55:11 2022, length=2203070, window=hide
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Users\user\AppData\Local\Temp\rECA2.tmp.exe
"C:\Users\user\AppData\Local\Temp\rECA2.tmp.exe" "C:\Users\user\AppData\Local\Temp\yE9E2.tmp.dll",#1
malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
http://45.8.146.139/fhfty/82PF9MOX9VRXL73GMCXOFE8AGP5ROGT8/rm
45.8.146.139
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://my.microsoftpersonalcontent.com
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
http://45.8.146.139/fhfty/82PF9MOX9VRXL73GMCXOFE8AGP5ROGT8/rmRXL73GMCXOFE8AGP5ROGT8/rm8/rm8/rm_
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
https://api.powerbi.com/beta/myorg/imports
unknown
https://devnull.onenote.com
unknown
https://messaging.action.office.com/
unknown
https://ncus.pagecontentsync.
unknown
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.8.146.139
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
!30
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
"30
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
$80
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
f?0
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\1DADB
1DADB
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\27372
27372
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\27372
27372
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
1//
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
90/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
&3/
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\65EF2
65EF2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 97 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1BDD100F000
heap
page read and write
1BDCF840000
trusted library allocation
page read and write
1BDCFD10000
heap
page read and write
1BDCFD94000
heap
page read and write
1BDC9E90000
heap
page read and write
1BDCFC26000
heap
page read and write
1BDCF6FC000
trusted library allocation
page read and write
1BDD102C000
heap
page read and write
1BDCA9F7000
heap
page read and write
44FAD8E000
stack
page read and write
7ECA3FE000
stack
page read and write
1BDCF70E000
trusted library allocation
page read and write
1BDD1081000
heap
page read and write
1BDD11BA000
heap
page read and write
1BDC9E57000
heap
page read and write
1BDCFD10000
heap
page read and write
24806580000
trusted library allocation
page read and write
1BDD1128000
heap
page read and write
2AE465B0000
heap
page read and write
2AE46F91000
heap
page read and write
1BDCA754000
heap
page read and write
1BDCFA93000
trusted library allocation
page read and write
2AE46FA0000
heap
page read and write
1BDCFD99000
heap
page read and write
2AE46F3B000
heap
page read and write
1BDCF874000
trusted library allocation
page read and write
1BDCFC3C000
heap
page read and write
1BDD10D0000
heap
page read and write
1B7DE6C1000
heap
page read and write
1BDD10C9000
heap
page read and write
2AE47444000
heap
page read and write
1BDCFD2C000
heap
page read and write
1BDCF720000
trusted library allocation
page read and write
1BDCB180000
trusted library allocation
page read and write
1BDD100F000
heap
page read and write
1F814652000
heap
page read and write
1977563C000
heap
page read and write
1BDD11A6000
heap
page read and write
1BDCFC26000
heap
page read and write
1BDD1080000
heap
page read and write
1763CA00000
heap
page read and write
2AE468C7000
heap
page read and write
1BDCF87C000
trusted library allocation
page read and write
2AE46F8D000
heap
page read and write
100C000
unkown
page readonly
44FB1FE000
stack
page read and write
1BDD11D3000
heap
page read and write
1BDD11DE000
heap
page read and write
1BDCFDF6000
heap
page read and write
1F81C300000
trusted library allocation
page read and write
1BDCF6FC000
trusted library allocation
page read and write
1BDCF71C000
trusted library allocation
page read and write
1BDCA9A4000
heap
page read and write
1BDD111F000
heap
page read and write
1BDCFDA3000
heap
page read and write
1BDCF71C000
trusted library allocation
page read and write
1BDCFD58000
heap
page read and write
2AE46F7F000
heap
page read and write
1BDD1064000
heap
page read and write
1BDCA9CC000
heap
page read and write
1F816E79000
heap
page read and write
1BDCFDD2000
heap
page read and write
1E0F0429000
heap
page read and write
1BDCF860000
trusted library allocation
page read and write
1BDCF874000
trusted library allocation
page read and write
1BDD1199000
heap
page read and write
1BDD11B1000
heap
page read and write
1BDD1053000
heap
page read and write
1BDD1147000
heap
page read and write
1F816EA6000
heap
page read and write
1BDCFD02000
heap
page read and write
1BDCFC5B000
heap
page read and write
1BDCFD10000
heap
page read and write
94FF3FB000
stack
page read and write
1BDCA7CE000
heap
page read and write
1B7DE600000
heap
page read and write
1836EDB000
stack
page read and write
1BDCA9FD000
heap
page read and write
1B9A467E000
heap
page read and write
1BDD11D1000
heap
page read and write
1BDD10DB000
heap
page read and write
2240A64E000
heap
page read and write
2240A64D000
heap
page read and write
7EC9EFC000
stack
page read and write
1BDD1079000
heap
page read and write
1BDCA9C1000
heap
page read and write
26345DE000
stack
page read and write
1763CB02000
heap
page read and write
1BDCF7A0000
trusted library allocation
page read and write
1BDD1178000
heap
page read and write
1BDD1023000
heap
page read and write
B20000
remote allocation
page read and write
2240A674000
heap
page read and write
1BDD11BA000
heap
page read and write
18B8A513000
heap
page read and write
18B8A500000
heap
page read and write
1BDD10D2000
heap
page read and write
2AE46F85000
heap
page read and write
1BDCFD10000
heap
page read and write
254ED930000
heap
page read and write
BE0000
trusted library allocation
page read and write
B037B7F000
stack
page read and write
1BDCFDFE000
heap
page read and write
AEBDCF8000
stack
page read and write
1BDCFD8B000
heap
page read and write
1BDCFDE9000
heap
page read and write
1BDD115E000
heap
page read and write
1BDCF714000
trusted library allocation
page read and write
7ECA87D000
stack
page read and write
1BDCF87C000
trusted library allocation
page read and write
7C4ECFF000
stack
page read and write
1BDCA9CC000
heap
page read and write
1F817D10000
trusted library allocation
page read and write
1F81C440000
trusted library allocation
page read and write
1BDCFDAD000
heap
page read and write
1F814679000
heap
page read and write
1BDCF540000
trusted library allocation
page read and write
1BDCF716000
trusted library allocation
page read and write
1BDCA9C7000
heap
page read and write
1BDCA9C7000
heap
page read and write
AC09AFF000
stack
page read and write
1BDCFC61000
heap
page read and write
1F81C450000
trusted library allocation
page read and write
1BDCF710000
trusted library allocation
page read and write
1BDCA727000
heap
page read and write
1B9A468D000
heap
page read and write
1BDCFDE5000
heap
page read and write
1F81C454000
trusted library allocation
page read and write
1BDD105B000
heap
page read and write
1BDD11A3000
heap
page read and write
1BDCA702000
heap
page read and write
1BDD115B000
heap
page read and write
2AE46F72000
heap
page read and write
1F817F10000
trusted library section
page readonly
2AE468AF000
heap
page read and write
1BDCA700000
heap
page read and write
AEBDEFA000
stack
page read and write
1BDCF830000
trusted library allocation
page read and write
2AE47402000
heap
page read and write
1BDCFC62000
heap
page read and write
1763CA61000
heap
page read and write
FD284FE000
stack
page read and write
1F81C656000
heap
page read and write
1BDD1126000
heap
page read and write
1F8145E0000
trusted library allocation
page read and write
1BDCA71D000
heap
page read and write
2AE468DA000
heap
page read and write
18B8A47B000
heap
page read and write
1BDCF850000
trusted library allocation
page read and write
1BDCFDB1000
heap
page read and write
1BDD112E000
heap
page read and write
1BDCFD3A000
heap
page read and write
1BDD1181000
heap
page read and write
1BDD10D5000
heap
page read and write
1500A7E000
stack
page read and write
44FB07D000
stack
page read and write
1BDCFD1F000
heap
page read and write
1BDCA9FD000
heap
page read and write
1BDCA72E000
heap
page read and write
1B9A4678000
heap
page read and write
1763CA2A000
heap
page read and write
1BDCA9E4000
heap
page read and write
1BDD11BA000
heap
page read and write
1BDD11E4000
heap
page read and write
1BDCA600000
heap
page read and write
1BDCFD52000
heap
page read and write
15008FF000
stack
page read and write
1BDCF71E000
trusted library allocation
page read and write
1BDD1202000
heap
page read and write
1BDCFD19000
heap
page read and write
1BDD103B000
heap
page read and write
2AE46F13000
heap
page read and write
1BDD1171000
heap
page read and write
2AE467F0000
trusted library allocation
page read and write
1BDCFD17000
heap
page read and write
1BDD116A000
heap
page read and write
1BDCF870000
trusted library allocation
page read and write
1BDCFC69000
heap
page read and write
B20000
remote allocation
page read and write
1F816E71000
heap
page read and write
1BDD10D0000
heap
page read and write
1B9A48B5000
heap
page read and write
1BDCFC26000
heap
page read and write
18B8A451000
heap
page read and write
254EDA4B000
heap
page read and write
1BDCA965000
heap
page read and write
1BDCF870000
trusted library allocation
page read and write
1BDC9E5B000
heap
page read and write
1BDCFC38000
heap
page read and write
2AE46F85000
heap
page read and write
254EDA00000
heap
page read and write
1BDD1135000
heap
page read and write
1BDCF700000
trusted library allocation
page read and write
1BDC9E67000
heap
page read and write
1F814700000
heap
page read and write
1F817F40000
trusted library section
page readonly
1000000
unkown
page readonly
1BDCFD2C000
heap
page read and write
183777F000
stack
page read and write
1BDCFD2F000
heap
page read and write
1BDD1173000
heap
page read and write
1BDCFD10000
heap
page read and write
1F81C600000
heap
page read and write
2240AC60000
trusted library allocation
page read and write
1BDD111D000
heap
page read and write
1BDCA9CC000
heap
page read and write
1BDCF700000
trusted library allocation
page read and write
2240A673000
heap
page read and write
1BDCF87C000
trusted library allocation
page read and write
1BDCFC2F000
heap
page read and write
1BDD1146000
heap
page read and write
1BDCFDFE000
heap
page read and write
1BDD1074000
heap
page read and write
1F81C6A8000
heap
page read and write
2AE47419000
heap
page read and write
248064E0000
heap
page read and write
1F81C570000
remote allocation
page read and write
1BDD1139000
heap
page read and write
18B8A462000
heap
page read and write
254EDA30000
heap
page read and write
1BDD1190000
heap
page read and write
1BDD11CA000
heap
page read and write
2240A662000
heap
page read and write
1BDD102E000
heap
page read and write
1BDCFC69000
heap
page read and write
7C4EE7C000
stack
page read and write
24806613000
heap
page read and write
2AE46800000
heap
page read and write
1BDCFD02000
heap
page read and write
1BDCF880000
trusted library allocation
page read and write
AC09BFF000
stack
page read and write
2240A678000
heap
page read and write
1BDD11D1000
heap
page read and write
1BDCFDA4000
heap
page read and write
2240A600000
heap
page read and write
1BDCFDB1000
heap
page read and write
1BDCA9F8000
heap
page read and write
1F81C434000
trusted library allocation
page read and write
2AE46F7F000
heap
page read and write
1BDCF860000
trusted library allocation
page read and write
1BDD10DE000
heap
page read and write
1BDD1063000
heap
page read and write
2AE46849000
heap
page read and write
1BDCFC34000
heap
page read and write
2AE46813000
heap
page read and write
1BDD10C5000
heap
page read and write
1BDCFC61000
heap
page read and write
2AE47403000
heap
page read and write
1BDC9E89000
heap
page read and write
24806675000
heap
page read and write
2AE46F91000
heap
page read and write
AC09CFF000
stack
page read and write
1BDD10C3000
heap
page read and write
1B7DE580000
trusted library allocation
page read and write
1BDCA792000
heap
page read and write
1BDCFD03000
heap
page read and write
1BDCFDF8000
heap
page read and write
2AE47402000
heap
page read and write
1BDD10C7000
heap
page read and write
1BDCF860000
trusted library allocation
page read and write
1F817F30000
trusted library section
page readonly
254EE202000
trusted library allocation
page read and write
1BDCFD0F000
heap
page read and write
1BDD108A000
heap
page read and write
2240A67D000
heap
page read and write
1BDD10E9000
heap
page read and write
19775692000
heap
page read and write
2AE46908000
heap
page read and write
1BDCF870000
trusted library allocation
page read and write
1BDCFA60000
remote allocation
page read and write
2AE46F4B000
heap
page read and write
1BDD1091000
heap
page read and write
1BDD1182000
heap
page read and write
1BDD112F000
heap
page read and write
1BDD11BA000
heap
page read and write
1BDD1158000
heap
page read and write
1BDD1120000
heap
page read and write
2240A63D000
heap
page read and write
1BDD10EF000
heap
page read and write
1BDCA81B000
heap
page read and write
183767F000
stack
page read and write
1BDD105C000
heap
page read and write
1BDD104F000
heap
page read and write
1BDCFC4F000
heap
page read and write
1BDD1070000
heap
page read and write
1977565C000
heap
page read and write
1BDD11BA000
heap
page read and write
94FECCB000
stack
page read and write
1BDD1168000
heap
page read and write
2240A62D000
heap
page read and write
1BDD1091000
heap
page read and write
E760CF9000
stack
page read and write
1BDCFD83000
heap
page read and write
1BDD1184000
heap
page read and write
44FB3F7000
stack
page read and write
E760AFF000
stack
page read and write
1BDCFD83000
heap
page read and write
1BDD108A000
heap
page read and write
1009000
unkown
page readonly
1BDCFD61000
heap
page read and write
1BDCFC58000
heap
page read and write
1BDCB4B0000
trusted library section
page readonly
1BDD1179000
heap
page read and write
2240A667000
heap
page read and write
150097F000
stack
page read and write
1BDD104E000
heap
page read and write
1BDCA7C4000
heap
page read and write
1BDC9E90000
heap
page read and write
1BDD10A3000
heap
page read and write
1BDC9E86000
heap
page read and write
1BDD1011000
heap
page read and write
1E0F0400000
heap
page read and write
1F816E8C000
heap
page read and write
1BDCFC53000
heap
page read and write
1BDCFDF3000
heap
page read and write
1B9A4410000
heap
page read and write
AC0927B000
stack
page read and write
1BDCA960000
heap
page read and write
1BDCB4E0000
trusted library section
page readonly
1F81C540000
trusted library allocation
page read and write
1977562A000
heap
page read and write
1BDCF930000
trusted library allocation
page read and write
1B7DE420000
heap
page read and write
1BDCFDA8000
heap
page read and write
1BDD11A1000
heap
page read and write
1F814613000
heap
page read and write
1BDD11DB000
heap
page read and write
7ECA67F000
stack
page read and write
1B7DE6E2000
heap
page read and write
1BDCA9C8000
heap
page read and write
1BDCA9C7000
heap
page read and write
1F817E30000
trusted library allocation
page read and write
2AE46620000
heap
page read and write
1BDD1079000
heap
page read and write
1BDCFD02000
heap
page read and write
1001000
unkown
page execute read
1763CB13000
heap
page read and write
1F816D50000
heap
page read and write
2AE46F9B000
heap
page read and write
1BDCFC69000
heap
page read and write
1BDCA7AC000
heap
page read and write
1F817D20000
trusted library allocation
page read and write
1BDCF74E000
trusted library allocation
page read and write
7ECA4FE000
stack
page read and write
1BDD0010000
heap
page read and write
AEBD59C000
stack
page read and write
BDF000
stack
page read and write
1500EFE000
stack
page read and write
1500FF5000
stack
page read and write
1BDCFC48000
heap
page read and write
1BDCFC2D000
heap
page read and write
1763D202000
trusted library allocation
page read and write
1BDCA823000
heap
page read and write
1BDD1189000
heap
page read and write
1F816EFD000
heap
page read and write
1BDD100C000
heap
page read and write
1BDCF74A000
trusted library allocation
page read and write
1BDCFDD5000
heap
page read and write
AFC000
stack
page read and write
1BDCFC26000
heap
page read and write
1BDD11D1000
heap
page read and write
1BDCA9C3000
heap
page read and write
2240A647000
heap
page read and write
1BDCF980000
trusted library allocation
page read and write
1BDD1160000
heap
page read and write
1BDCFDC8000
heap
page read and write
2AE46F91000
heap
page read and write
1BDD115D000
heap
page read and write
E76047B000
stack
page read and write
24806629000
heap
page read and write
1F814E02000
trusted library allocation
page read and write
263455B000
stack
page read and write
1BDCF850000
trusted library allocation
page read and write
254EDB02000
heap
page read and write
1BDCFC2D000
heap
page read and write
1BDD1186000
heap
page read and write
44FB4FE000
stack
page read and write
1F81C570000
trusted library allocation
page read and write
1BDCFD61000
heap
page read and write
1B9A4540000
heap
page read and write
1BDCF860000
trusted library allocation
page read and write
1BDCFC34000
heap
page read and write
1B9A4666000
heap
page read and write
1BDD112C000
heap
page read and write
1BDD1102000
heap
page read and write
2AE46F93000
heap
page read and write
2AE4684D000
heap
page read and write
1BDCFC2F000
heap
page read and write
1BDCA9C8000
heap
page read and write
1B9A4661000
heap
page read and write
1009000
unkown
page readonly
2240A682000
heap
page read and write
2480665A000
heap
page read and write
1BDCA7F3000
heap
page read and write
1BDCA975000
heap
page read and write
1BDD10A2000
heap
page read and write
1BDD11E2000
heap
page read and write
7ECA77D000
stack
page read and write
1BDD1196000
heap
page read and write
1BDCF900000
trusted library allocation
page read and write
1BDCFD87000
heap
page read and write
19775590000
heap
page read and write
1BDD10C1000
heap
page read and write
1BDD1119000
heap
page read and write
24806656000
heap
page read and write
1BDCFDEF000
heap
page read and write
1BDCF765000
trusted library allocation
page read and write
1BDD11BA000
heap
page read and write
1BDCA7AF000
heap
page read and write
1F81C440000
trusted library allocation
page read and write
1BDD1090000
heap
page read and write
1BDC9FEB000
heap
page read and write
1F817700000
heap
page read and write
1BDC9FC2000
heap
page read and write
1BDCFC2F000
heap
page read and write
1F81C61E000
heap
page read and write
2240A649000
heap
page read and write
1BDCF5D0000
trusted library allocation
page read and write
1BDCA9AD000
heap
page read and write
18B8A460000
heap
page read and write
2AE468A9000
heap
page read and write
1763CB00000
heap
page read and write
1763C950000
heap
page read and write
1BDD10D5000
heap
page read and write
1F816D40000
heap
page read and write
1BDCFC26000
heap
page read and write
1BDC9E13000
heap
page read and write
1BDD10D7000
heap
page read and write
254EDA46000
heap
page read and write
1BDCF712000
trusted library allocation
page read and write
1F81467B000
heap
page read and write
1BDCA9C9000
heap
page read and write
2AE46F85000
heap
page read and write
1BDD10DC000
heap
page read and write
1BDCF700000
trusted library allocation
page read and write
1F81C410000
trusted library allocation
page read and write
1BDCFC34000
heap
page read and write
1F8175E1000
trusted library allocation
page read and write
1BDCF874000
trusted library allocation
page read and write
1BDCFC13000
heap
page read and write
1BDCF6E0000
trusted library allocation
page read and write
1BDD108A000
heap
page read and write
1BDCF74E000
trusted library allocation
page read and write
1BDCFD86000
heap
page read and write
2240A663000
heap
page read and write
1500AFE000
stack
page read and write
1BDCA979000
heap
page read and write
1F817F60000
trusted library section
page readonly
1BDCFB00000
trusted library allocation
page read and write
1BDCFD2D000
heap
page read and write
2AE46F00000
heap
page read and write
1B7DE677000
heap
page read and write
7ECA27E000
stack
page read and write
94FF2FE000
stack
page read and write
1BDD101F000
heap
page read and write
2AE46F89000
heap
page read and write
100C000
unkown
page readonly
24806E02000
trusted library allocation
page read and write
1BDCF720000
trusted library allocation
page read and write
1F814600000
heap
page read and write
2240A648000
heap
page read and write
2AE46913000
heap
page read and write
2AE46889000
heap
page read and write
B9E000
stack
page read and write
1BDCF700000
trusted library allocation
page read and write
150067F000
stack
page read and write
1BDCFC38000
heap
page read and write
1BDD1070000
heap
page read and write
AC095FF000
stack
page read and write
2AE468F2000
heap
page read and write
1BDCF940000
trusted library allocation
page read and write
1BDCFD6F000
heap
page read and write
1F816DE0000
trusted library allocation
page read and write
1F816E41000
heap
page read and write
1F81C706000
heap
page read and write
EA0000
heap
page read and write
1BDCA9CC000
heap
page read and write
2AE468B3000
heap
page read and write
2240A66B000
heap
page read and write
1F816E29000
heap
page read and write
1BDD101C000
heap
page read and write
1F81C614000
heap
page read and write
1BDD1006000
heap
page read and write
1F816EA0000
heap
page read and write
1BDD108A000
heap
page read and write
1BDCF870000
trusted library allocation
page read and write
2634AFE000
stack
page read and write
1BDCA943000
heap
page read and write
1E0F0340000
heap
page read and write
1BDCFC2D000
heap
page read and write
1BDC9DD0000
trusted library allocation
page read and write
1BDCFD10000
heap
page read and write
1BDCA9FD000
heap
page read and write
2240A62E000
heap
page read and write
3FF56FC000
stack
page read and write
1BDCA9CC000
heap
page read and write
1BDCFC43000
heap
page read and write
1BDD119D000
heap
page read and write
1BDD10E0000
heap
page read and write
1763CA13000
heap
page read and write
1F817F20000
trusted library section
page readonly
1BDCFC2F000
heap
page read and write
1F817D03000
trusted library allocation
page read and write
1BDCFDF6000
heap
page read and write
ABD000
stack
page read and write
1F81C431000
trusted library allocation
page read and write
1BDCB4F0000
trusted library section
page readonly
1B9A48B0000
heap
page read and write
1BDCA9E0000
heap
page read and write
1BDD10C2000
heap
page read and write
1BDCFC69000
heap
page read and write
7C4E87B000
stack
page read and write
1BDCF716000
trusted library allocation
page read and write
1BDCFD84000
heap
page read and write
1BDD11BA000
heap
page read and write
3FF5578000
stack
page read and write
E76077A000
stack
page read and write
1BDD114B000
heap
page read and write
1F816E93000
heap
page read and write
1BDC9E50000
heap
page read and write
1BDCF700000
trusted library allocation
page read and write
157FCAC000
stack
page read and write
1000000
unkown
page readonly
1BDCF700000
trusted library allocation
page read and write
1BDD11A4000
heap
page read and write
1500BFB000
stack
page read and write
19775682000
heap
page read and write
1B7DEF00000
heap
page read and write
1BDCFC34000
heap
page read and write
1763CA82000
heap
page read and write
1B9A4672000
heap
page read and write
1BDCFC61000
heap
page read and write
2AE46F6E000
heap
page read and write
1BDD10CB000
heap
page read and write
1BDD1213000
heap
page read and write
1BDCFD8E000
heap
page read and write
1BDCF87C000
trusted library allocation
page read and write
1BDCFDF3000
heap
page read and write
19775702000
heap
page read and write
1BDCFAF0000
trusted library allocation
page read and write
1BDCFD0F000
heap
page read and write
1500DFE000
stack
page read and write
1BDD1007000
heap
page read and write
1BDCFDAD000
heap
page read and write
1BDCFDEC000
heap
page read and write
2AE46829000
heap
page read and write
2240A4A0000
heap
page read and write
1BDCFDAD000
heap
page read and write
254EDA1F000
heap
page read and write
1BDCFC26000
heap
page read and write
1B9A4694000
heap
page read and write
254EDA3C000
heap
page read and write
18B8A508000
heap
page read and write
1F81C703000
heap
page read and write
1BDD11CA000
heap
page read and write
1B7DE480000
heap
page read and write
1BDCA96C000
heap
page read and write
1BDCA9F7000
heap
page read and write
1BDCFD99000
heap
page read and write
1BDD11D3000
heap
page read and write
1F8144E0000
heap
page read and write
1BDCA98B000
heap
page read and write
2634DFE000
stack
page read and write
1BDD10BF000
heap
page read and write
1BDD1004000
heap
page read and write
1B7DE613000
heap
page read and write
1F816E13000
heap
page read and write
1BDCFC5F000
heap
page read and write
2AE46F10000
heap
page read and write
1BDCFD10000
heap
page read and write
1BDCFC37000
heap
page read and write
1BDCF8B0000
trusted library allocation
page read and write
18B8A340000
heap
page read and write
1BDCFDF5000
heap
page read and write
1BDCFD02000
heap
page read and write
1BDCFC61000
heap
page read and write
7C4EBFF000
stack
page read and write
1BDD11BA000
heap
page read and write
E76087B000
stack
page read and write
2AE46F9B000
heap
page read and write
2240A67A000
heap
page read and write
197755C0000
trusted library allocation
page read and write
1BDCFDE3000
heap
page read and write
1BDCA996000
heap
page read and write
1BDCFDD0000
heap
page read and write
1BDD1096000
heap
page read and write
1BDCA9C0000
heap
page read and write
1BDD113B000
heap
page read and write
1BDC9E00000
heap
page read and write
1BDCF714000
trusted library allocation
page read and write
1BDCA800000
heap
page read and write
2240A641000
heap
page read and write
1BDCA7AC000
heap
page read and write
1BDCFD11000
heap
page read and write
AC099FF000
stack
page read and write
3FF55FE000
stack
page read and write
AEBDF7F000
unkown
page read and write
1BDD10B7000
heap
page read and write
1BDD1076000
heap
page read and write
1BDCFC34000
heap
page read and write
1BDCF710000
trusted library allocation
page read and write
1BDCA9C7000
heap
page read and write
254EDA02000
heap
page read and write
19775700000
heap
page read and write
2AE46F91000
heap
page read and write
1000000
unkown
page readonly
1F81461F000
heap
page read and write
1BDCF74A000
trusted library allocation
page read and write
2AE46DF0000
remote allocation
page read and write
15010FF000
stack
page read and write
2240A676000
heap
page read and write
1BDCFDFA000
heap
page read and write
18374F7000
stack
page read and write
1BDD11BA000
heap
page read and write
1F81C530000
trusted library allocation
page read and write
FD2877E000
stack
page read and write
1BDD119E000
heap
page read and write
1BDCF860000
trusted library allocation
page read and write
1BDD109B000
heap
page read and write
1B9A4677000
heap
page read and write
44FB5FE000
stack
page read and write
1BDD1143000
heap
page read and write
1BDC9E29000
heap
page read and write
E760677000
stack
page read and write
24806702000
heap
page read and write
1BDD113F000
heap
page read and write
2634BF7000
stack
page read and write
1763CA66000
heap
page read and write
1BDCFC69000
heap
page read and write
1BDCA9C8000
heap
page read and write
1BDCFDCC000
heap
page read and write
1BDCF710000
trusted library allocation
page read and write
7ECA5FD000
stack
page read and write
1F817718000
heap
page read and write
1BDCFC34000
heap
page read and write
1BDCA9E7000
heap
page read and write
1BDCA9FE000
heap
page read and write
AC094FC000
stack
page read and write
1BDCA9FF000
heap
page read and write
254EDA29000
heap
page read and write
1001000
unkown
page execute read
2240A500000
heap
page read and write
1BDD1090000
heap
page read and write
1BDCF71C000
trusted library allocation
page read and write
1BDD103B000
heap
page read and write
1BDD11B3000
heap
page read and write
1E0F02D0000
heap
page read and write
263487E000
stack
page read and write
1B7DE6E8000
heap
page read and write
1BDCFC55000
heap
page read and write
1BDD1099000
heap
page read and write
1F81C4E0000
trusted library allocation
page read and write
1F816E58000
heap
page read and write
1500379000
stack
page read and write
30B0000
heap
page read and write
1BDD1069000
heap
page read and write
248064F0000
heap
page read and write
2AE46FD2000
heap
page read and write
E76097F000
stack
page read and write
1BDD107B000
heap
page read and write
1BDD10BA000
heap
page read and write
AC096FF000
stack
page read and write
1F81D000000
heap
page read and write
1BDCFC5C000
heap
page read and write
1BDD1136000
heap
page read and write
1BDD10F2000
heap
page read and write
1BDCF705000
trusted library allocation
page read and write
1BDCF874000
trusted library allocation
page read and write
1BDC9E43000
heap
page read and write
1BDCF910000
trusted library allocation
page read and write
1BDCF8D0000
trusted library allocation
page read and write
1BDCA9CC000
heap
page read and write
1BDCFC69000
heap
page read and write
1BDCFDC7000
heap
page read and write
1BDCFC2F000
heap
page read and write
2AE468C1000
heap
page read and write
1763CA55000
heap
page read and write
1BDCA9BB000
heap
page read and write
2AE47402000
heap
page read and write
1BDD101A000
heap
page read and write
1B7DE6CF000
heap
page read and write
2AE465C0000
heap
page read and write
1BDCFD0F000
heap
page read and write
1BDC9E74000
heap
page read and write
1BDCFD10000
heap
page read and write
1BDCF87C000
trusted library allocation
page read and write
1BDC9E8D000
heap
page read and write
AC0907C000
stack
page read and write
1BDD1102000
heap
page read and write
1BDCFDF3000
heap
page read and write
1BDCFD02000
heap
page read and write
1BDCFC3F000
heap
page read and write
18B8A3B0000
heap
page read and write
1F817602000
heap
page read and write
1F817D00000
trusted library allocation
page read and write
1BDCFDC2000
heap
page read and write
1B9A467E000
heap
page read and write
254EDA43000
heap
page read and write
1BDD1175000
heap
page read and write
1BDCF950000
trusted library allocation
page read and write
1BDCFC69000
heap
page read and write
1F814702000
heap
page read and write
2AE46F8D000
heap
page read and write
1BDCFD5B000
heap
page read and write
1BDCFC50000
heap
page read and write
1B9A4650000
heap
page read and write
1BDCFDD4000
heap
page read and write
1BDCFD00000
heap
page read and write
1BDCF705000
trusted library allocation
page read and write
18B8AC02000
trusted library allocation
page read and write
1E0F0370000
trusted library allocation
page read and write
1000000
unkown
page readonly
2AE46FDC000
heap
page read and write
1BDCF708000
trusted library allocation
page read and write
7C4EA7B000
stack
page read and write
1BDCFDCD000
heap
page read and write
2240A661000
heap
page read and write
1F817600000
heap
page read and write
1BDCF874000
trusted library allocation
page read and write
2240A640000
heap
page read and write
18B8A3E0000
trusted library allocation
page read and write
254ED8D0000
heap
page read and write
150087A000
stack
page read and write
1BDCF722000
trusted library allocation
page read and write
1977565F000
heap
page read and write
1BDCFD2E000
heap
page read and write
1BDD11BA000
heap
page read and write
1F816E7B000
heap
page read and write
1BDD108A000
heap
page read and write
1F81C6F9000
heap
page read and write
1BDD10BF000
heap
page read and write
1BDD1072000
heap
page read and write
1BDD1018000
heap
page read and write
2AE46F76000
heap
page read and write
1BDCA9AC000
heap
page read and write
1BDD111B000
heap
page read and write
AEBDDFF000
stack
page read and write
1BDCFA90000
trusted library allocation
page read and write
1001000
unkown
page execute read
2AE46870000
heap
page read and write
2240A630000
heap
page read and write
1BDD1122000
heap
page read and write
100C000
unkown
page readonly
1BDCA9C8000
heap
page read and write
2AE46F9C000
heap
page read and write
150047A000
stack
page read and write
1BDCFD11000
heap
page read and write
1763C9C0000
heap
page read and write
2AE46F86000
heap
page read and write
1BDCFD6F000
heap
page read and write
1BDD1200000
heap
page read and write
18B8A429000
heap
page read and write
1BDD1018000
heap
page read and write
1BDCA9B0000
heap
page read and write
1BDD1000000
heap
page read and write
1BDD108D000
heap
page read and write
1F81C550000
trusted library allocation
page read and write
1F816E76000
heap
page read and write
1BDCA9C7000
heap
page read and write
1BDD1072000
heap
page read and write
1BDD108A000
heap
page read and write
1BDD108A000
heap
page read and write
B0377FC000
stack
page read and write
1BDD116C000
heap
page read and write
2240A64B000
heap
page read and write
1BDCA9C7000
heap
page read and write
1BDCB3D0000
trusted library allocation
page read and write
1BDD119B000
heap
page read and write
18B8A486000
heap
page read and write
AEBD87E000
stack
page read and write
1BDCA9F7000
heap
page read and write
1F814602000
heap
page read and write
1BDCFC69000
heap
page read and write
1BDCFDF3000
heap
page read and write
E760F7C000
stack
page read and write
1BDCFC62000
heap
page read and write
1BDC9E3C000
heap
page read and write
1BDCF9A0000
trusted library allocation
page read and write
2AE46F9B000
heap
page read and write
1BDC9C70000
heap
page read and write
1BDCA9CC000
heap
page read and write
1BDD1132000
heap
page read and write
1BDD1124000
heap
page read and write
1BDD1053000
heap
page read and write
1BDD118D000
heap
page read and write
1F816F02000
heap
page read and write
1BDCFD04000
heap
page read and write
3FF547F000
stack
page read and write
94FF4FF000
stack
page read and write
1E0F03A0000
remote allocation
page read and write
1BDCB511000
trusted library allocation
page read and write
1B7DE713000
heap
page read and write
1BDD1017000
heap
page read and write
24806550000
heap
page read and write
1BDD1164000
heap
page read and write
1BDCA802000
heap
page read and write
1BDD11B5000
heap
page read and write
1BDCF708000
trusted library allocation
page read and write
1BDD10F7000
heap
page read and write
1BDCF712000
trusted library allocation
page read and write
1BDD1081000
heap
page read and write
1BDD10FF000
heap
page read and write
1BDCF71E000
trusted library allocation
page read and write
1BDD11B8000
heap
page read and write
1F816EB3000
heap
page read and write
1BDCFC2D000
heap
page read and write
1BDD1055000
heap
page read and write
1BDCA9F7000
heap
page read and write
1BDD109D000
heap
page read and write
18B8A45C000
heap
page read and write
18B8A47C000
heap
page read and write
1BDCFC61000
heap
page read and write
1F816F13000
heap
page read and write
A50000
heap
page read and write
18B8A502000
heap
page read and write
2240A63A000
heap
page read and write
1001000
unkown
page execute read
E760B7E000
stack
page read and write
1BDCFC69000
heap
page read and write
1F817615000
heap
page read and write
AEBD8FE000
stack
page read and write
1BDD10F1000
heap
page read and write
1F814470000
heap
page read and write
1BDCFC2D000
heap
page read and write
1BDD1083000
heap
page read and write
1B7DE702000
heap
page read and write
1BDCA9A8000
heap
page read and write
1763CA5A000
heap
page read and write
1BDCFC2D000
heap
page read and write
1009000
unkown
page readonly
E760D7F000
stack
page read and write
1BDCFD6D000
heap
page read and write
1BDCA9CC000
heap
page read and write
1F81C570000
remote allocation
page read and write
1BDD11BA000
heap
page read and write
1BDD102A000
heap
page read and write
E760BFF000
stack
page read and write
1BDD11E0000
heap
page read and write
1BDCFC2F000
heap
page read and write
1BDCFDF3000
heap
page read and write
1F81C64A000
heap
page read and write
1F817F50000
trusted library section
page readonly
1B9A465B000
heap
page read and write
100C000
unkown
page readonly
1BDCF71A000
trusted library allocation
page read and write
1F814628000
heap
page read and write
1BDCFDC4000
heap
page read and write
1BDCA900000
heap
page read and write
3FF567E000
stack
page read and write
2240A639000
heap
page read and write
1B7DE62A000
heap
page read and write
19775654000
heap
page read and write
1F81C62C000
heap
page read and write
7C4F2FF000
stack
page read and write
1F817718000
heap
page read and write
2AE4683C000
heap
page read and write
1763CA3C000
heap
page read and write
1BDD102E000
heap
page read and write
E760A7B000
stack
page read and write
1BDCF70C000
trusted library allocation
page read and write
15011FC000
stack
page read and write
1BDCFD83000
heap
page read and write
1763CA5C000
heap
page read and write
1F817713000
heap
page read and write
1BDD1090000
heap
page read and write
1BDC9F8E000
heap
page read and write
24806600000
heap
page read and write
254ED8E0000
heap
page read and write
1BDCA76F000
heap
page read and write
1BDCFC55000
heap
page read and write
1BDCFD02000
heap
page read and write
1B9A4666000
heap
page read and write
19775600000
heap
page read and write
E76117F000
stack
page read and write
2AE46916000
heap
page read and write
1BDD10EB000
heap
page read and write
2240A679000
heap
page read and write
1E0F0502000
heap
page read and write
1BDD114D000
heap
page read and write
19775520000
heap
page read and write
7C4EEFB000
stack
page read and write
15001FF000
stack
page read and write
1BDD1066000
heap
page read and write
E760DFF000
stack
page read and write
1BDCFD30000
heap
page read and write
B037979000
stack
page read and write
1BDCFC34000
heap
page read and write
1BDCFC34000
heap
page read and write
2AE46F8D000
heap
page read and write
1BDCFC02000
heap
page read and write
1BDD10CD000
heap
page read and write
1BDCA9FE000
heap
page read and write
AC097FD000
stack
page read and write
1BDCA7F7000
heap
page read and write
1BDD102D000
heap
page read and write
1BDCF700000
trusted library allocation
page read and write
1BDCF5C0000
trusted library allocation
page read and write
1B7DE680000
heap
page read and write
1BDD1116000
heap
page read and write
1BDCFD10000
heap
page read and write
1BDD105C000
heap
page read and write
1B7DEE02000
heap
page read and write
1BDD1025000
heap
page read and write
1BDCFDE7000
heap
page read and write
2240A613000
heap
page read and write
1B9A4674000
heap
page read and write
E30000
heap
page read and write
1BDCFD87000
heap
page read and write
1BDCFD13000
heap
page read and write
1763CA5E000
heap
page read and write
1BDCFD1D000
heap
page read and write
1BDCFC2F000
heap
page read and write
1B7DEF12000
heap
page read and write
44FAD0C000
stack
page read and write
24806713000
heap
page read and write
1BDCB500000
trusted library section
page readonly
1BDD1090000
heap
page read and write
1BDCFD02000
heap
page read and write
1BDCA9CC000
heap
page read and write
1BDD10A2000
heap
page read and write
1BDCA9DA000
heap
page read and write
2AE46DF0000
remote allocation
page read and write
100C000
unkown
page readonly
1BDD10CF000
heap
page read and write
1F81C6B0000
heap
page read and write
1F81C2F0000
trusted library allocation
page read and write
1BDCFC2D000
heap
page read and write
2240A645000
heap
page read and write
2634CFF000
stack
page read and write
1F81C63D000
heap
page read and write
1BDCFC26000
heap
page read and write
1BDCB530000
trusted library allocation
page read and write
1500CFD000
stack
page read and write
1BDD1091000
heap
page read and write
1BDCF78C000
trusted library allocation
page read and write
1BDD116E000
heap
page read and write
1BDD0010000
heap
page read and write
30B8000
heap
page read and write
1BDCA9CC000
heap
page read and write
1F81C560000
trusted library allocation
page read and write
1F81C520000
trusted library allocation
page read and write
1BDCFC4D000
heap
page read and write
1BDCFC2F000
heap
page read and write
1F816DF0000
trusted library section
page read and write
1BDCF6E0000
trusted library allocation
page read and write
1BDCA7CA000
heap
page read and write
1BDC9E6E000
heap
page read and write
2240A629000
heap
page read and write
1BDD1157000
heap
page read and write
1BDCF710000
trusted library allocation
page read and write
1BDD1131000
heap
page read and write
1BDCFC56000
heap
page read and write
1B7DE410000
heap
page read and write
1BDCFC26000
heap
page read and write
1BDD1074000
heap
page read and write
2AE46E02000
heap
page read and write
1BDCFA60000
remote allocation
page read and write
1BDCFD1B000
heap
page read and write
1BDD1093000
heap
page read and write
254EDA13000
heap
page read and write
1BDCF550000
trusted library allocation
page read and write
1BDCFD4A000
heap
page read and write
1BDCAE80000
trusted library allocation
page read and write
1BDD1013000
heap
page read and write
1B9A4695000
heap
page read and write
1BDCF87C000
trusted library allocation
page read and write
2AE46F91000
heap
page read and write
1BDCF718000
trusted library allocation
page read and write
2AE46FAC000
heap
page read and write
1BDD101A000
heap
page read and write
1BDCF718000
trusted library allocation
page read and write
1BDD108D000
heap
page read and write
1BDCFC53000
heap
page read and write
2240A490000
heap
page read and write
254ED960000
trusted library allocation
page read and write
1BDCA80A000
heap
page read and write
18373FB000
stack
page read and write
1BDCF870000
trusted library allocation
page read and write
1BDCFC34000
heap
page read and write
1BDCA858000
heap
page read and write
24806602000
heap
page read and write
1BDCFDF3000
heap
page read and write
1BDCFD1A000
heap
page read and write
FBF000
stack
page read and write
E7E000
stack
page read and write
1BDCFC3C000
heap
page read and write
1BDCF765000
trusted library allocation
page read and write
1BDCB4D0000
trusted library section
page readonly
1BDCB540000
trusted library allocation
page read and write
1BDD10BE000
heap
page read and write
1BDD113D000
heap
page read and write
1BDCA9CC000
heap
page read and write
2634A7B000
stack
page read and write
1BDCFC2D000
heap
page read and write
1BDCF900000
trusted library allocation
page read and write
1BDD1028000
heap
page read and write
1BDCFDFE000
heap
page read and write
1BDCFDC5000
heap
page read and write
AEBDAFA000
stack
page read and write
1F81C418000
trusted library allocation
page read and write
1BDCFD02000
heap
page read and write
1763C9F0000
trusted library allocation
page read and write
1BDCFC2D000
heap
page read and write
1BDCFC34000
heap
page read and write
1BDCFC2F000
heap
page read and write
19775690000
heap
page read and write
254EDA52000
heap
page read and write
1BDCA460000
trusted library allocation
page read and write
1BDCFD03000
heap
page read and write
2240A642000
heap
page read and write
1BDD1020000
heap
page read and write
1BDCFDF4000
heap
page read and write
1BDCFC10000
heap
page read and write
150057A000
stack
page read and write
1BDD108A000
heap
page read and write
1BDCFC38000
heap
page read and write
1BDCFD02000
heap
page read and write
2AE46F9B000
heap
page read and write
1BDCA615000
heap
page read and write
1BDCF710000
trusted library allocation
page read and write
7C4ED7C000
stack
page read and write
1E0F0C02000
trusted library allocation
page read and write
2AE46DF0000
remote allocation
page read and write
B0373FC000
stack
page read and write
1BDCA85A000
heap
page read and write
1BDCFC2F000
heap
page read and write
B037A7E000
stack
page read and write
1F814480000
heap
page read and write
2AE46F91000
heap
page read and write
FD2887E000
stack
page read and write
1BDC9E76000
heap
page read and write
1836F5E000
stack
page read and write
1BDD1028000
heap
page read and write
1E0F0413000
heap
page read and write
1BDCA9AA000
heap
page read and write
1BDCFD21000
heap
page read and write
1BDCA72C000
heap
page read and write
1BDCFD10000
heap
page read and write
1BDCFC00000
heap
page read and write
1BDD1151000
heap
page read and write
263497B000
stack
page read and write
1F81C430000
trusted library allocation
page read and write
1BDCB4C0000
trusted library section
page readonly
1BDD1166000
heap
page read and write
1BDCFD2F000
heap
page read and write
1BDCFC26000
heap
page read and write
1763CA8E000
heap
page read and write
1E0F03A0000
remote allocation
page read and write
1BDCA9A8000
heap
page read and write
1BDD109E000
heap
page read and write
2480666F000
heap
page read and write
15009FE000
stack
page read and write
1BDCF6E0000
trusted library allocation
page read and write
1B7DE679000
heap
page read and write
1BDCA9CC000
heap
page read and write
2AE47400000
heap
page read and write
150077E000
stack
page read and write
1BDCFD10000
heap
page read and write
1BDCA9FD000
heap
page read and write
19775662000
heap
page read and write
1BDD10EC000
heap
page read and write
AC093FE000
stack
page read and write
1BDCA9FD000
heap
page read and write
1F81C570000
remote allocation
page read and write
1BDCFC26000
heap
page read and write
1BDC9F13000
heap
page read and write
1763CB08000
heap
page read and write
1BDD1113000
heap
page read and write
19775708000
heap
page read and write
1BDD1057000
heap
page read and write
1F816E00000
heap
page read and write
2240A660000
heap
page read and write
1BDCA71D000
heap
page read and write
1BDD1162000
heap
page read and write
2AE46F91000
heap
page read and write
18B8A413000
heap
page read and write
1BDD1188000
heap
page read and write
1BDD11D1000
heap
page read and write
24806665000
heap
page read and write
1E0F03A0000
remote allocation
page read and write
1BDD1015000
heap
page read and write
1BDCFDDF000
heap
page read and write
1BDD114F000
heap
page read and write
18B8A350000
heap
page read and write
1BDD1004000
heap
page read and write
1BDCFC61000
heap
page read and write
1BDD1117000
heap
page read and write
1BDCFDE1000
heap
page read and write
1BDCF870000
trusted library allocation
page read and write
1BDD10F7000
heap
page read and write
1F81C6E8000
heap
page read and write
1F81C700000
heap
page read and write
2AE46F91000
heap
page read and write
2240A646000
heap
page read and write
1F81C41E000
trusted library allocation
page read and write
19775713000
heap
page read and write
1BDCA9F3000
heap
page read and write
FD2897F000
stack
page read and write
18372FB000
stack
page read and write
1BDD10D9000
heap
page read and write
1BDCFDB1000
heap
page read and write
1BDD10B2000
heap
page read and write
2240A644000
heap
page read and write
1BDD1192000
heap
page read and write
1BDCFD4C000
heap
page read and write
2240A702000
heap
page read and write
94FF1FB000
stack
page read and write
183757E000
stack
page read and write
1F81C704000
heap
page read and write
E760E7E000
stack
page read and write
1BDD117B000
heap
page read and write
1BDCFDB1000
heap
page read and write
1BDCA9CC000
heap
page read and write
7ECA37E000
stack
page read and write
3FF51FA000
stack
page read and write
1BDCF874000
trusted library allocation
page read and write
1BDD117E000
heap
page read and write
1BDCF8E0000
trusted library allocation
page read and write
18B8A43C000
heap
page read and write
1BDCA95C000
heap
page read and write
1763CA77000
heap
page read and write
1BDCA94D000
heap
page read and write
1B7DE63E000
heap
page read and write
1BDD1141000
heap
page read and write
1F81C663000
heap
page read and write
1BDCFDF3000
heap
page read and write
1BDCFDCA000
heap
page read and write
2240A664000
heap
page read and write
1F81C6A5000
heap
page read and write
1BDD1153000
heap
page read and write
1BDD1195000
heap
page read and write
2AE47402000
heap
page read and write
1BDCA602000
heap
page read and write
2AE46902000
heap
page read and write
1BDD11BA000
heap
page read and write
1E0F043D000
heap
page read and write
1BDD112B000
heap
page read and write
1BDCFDF3000
heap
page read and write
B20000
remote allocation
page read and write
1BDCFDF3000
heap
page read and write
18B8A467000
heap
page read and write
7C4F0FE000
stack
page read and write
1BDD11AD000
heap
page read and write
1F81C70A000
heap
page read and write
1BDCF860000
trusted library allocation
page read and write
19775530000
heap
page read and write
1F816DB0000
heap
page read and write
1BDCA9F7000
heap
page read and write
1BDD115A000
heap
page read and write
1BDD10D3000
heap
page read and write
1BDCA9AD000
heap
page read and write
1BDCF722000
trusted library allocation
page read and write
1BDC9E65000
heap
page read and write
1BDD1114000
heap
page read and write
15006FF000
stack
page read and write
1BDCF71A000
trusted library allocation
page read and write
1E0F045C000
heap
page read and write
1BDC9CD0000
heap
page read and write
18B8A47B000
heap
page read and write
1BDCFC2C000
heap
page read and write
1F81C708000
heap
page read and write
2480663D000
heap
page read and write
1BDCFD15000
heap
page read and write
1BDCFC62000
heap
page read and write
1BDCA9FA000
heap
page read and write
7C4EFFD000
stack
page read and write
18B8A402000
heap
page read and write
1BDD1090000
heap
page read and write
1BDD11A0000
heap
page read and write
1BDCA986000
heap
page read and write
2AE46FAC000
heap
page read and write
1E0F0402000
heap
page read and write
44FB2FB000
stack
page read and write
1B7DE6C9000
heap
page read and write
1BDD11D2000
heap
page read and write
1BDD11CA000
heap
page read and write
1000000
unkown
page readonly
1763C960000
heap
page read and write
1BDD118B000
heap
page read and write
1BDD117D000
heap
page read and write
1BDCA9FD000
heap
page read and write
1BDD108D000
heap
page read and write
1BDCA9C7000
heap
page read and write
FD2857E000
stack
page read and write
1B9A468E000
heap
page read and write
1BDD1149000
heap
page read and write
18B8A400000
heap
page read and write
FD2847C000
stack
page read and write
1BDCA969000
heap
page read and write
1F817702000
heap
page read and write
1BDCFDF3000
heap
page read and write
1BDCFA60000
remote allocation
page read and write
7C4F1FD000
stack
page read and write
1BDD1100000
heap
page read and write
15002FB000
stack
page read and write
1BDCFC2D000
heap
page read and write
1BDCF8C0000
trusted library allocation
page read and write
1009000
unkown
page readonly
1B7DE6D2000
heap
page read and write
1BDD11D3000
heap
page read and write
1BDCFC61000
heap
page read and write
1BDD1090000
heap
page read and write
1BDCA9C7000
heap
page read and write
1BDD11AF000
heap
page read and write
1F81C6E1000
heap
page read and write
1BDD11DC000
heap
page read and write
15000FB000
stack
page read and write
1B9A467E000
heap
page read and write
1BDCF780000
trusted library allocation
page read and write
3FF54FF000
stack
page read and write
1BDD10B6000
heap
page read and write
1BDCF70C000
trusted library allocation
page read and write
1BDD100C000
heap
page read and write
1BDCF70E000
trusted library allocation
page read and write
1BDCFD83000
heap
page read and write
19775613000
heap
page read and write
1009000
unkown
page readonly
2AE46F81000
heap
page read and write
1BDD1155000
heap
page read and write
1F8182B0000
trusted library allocation
page read and write
1F81C410000
trusted library allocation
page read and write
1BDCFD10000
heap
page read and write
AC098FF000
stack
page read and write
2AE468E1000
heap
page read and write
1F814641000
heap
page read and write
1BDCA9F1000
heap
page read and write
1BDCA9FB000
heap
page read and write
1BDD103D000
heap
page read and write
2AE468EA000
heap
page read and write
1BDCFC55000
heap
page read and write
1BDCF714000
trusted library allocation
page read and write
1BDD10F4000
heap
page read and write
1BDCFDA0000
heap
page read and write
1BDCFD3C000
heap
page read and write
1BDD11D3000
heap
page read and write
1BDCFDAD000
heap
page read and write
1BDCFC39000
heap
page read and write
1BDCFC26000
heap
page read and write
1BDCFDC0000
heap
page read and write
1BDCA9C7000
heap
page read and write
1BDCFDF3000
heap
page read and write
1BDC9C60000
heap
page read and write
1F814713000
heap
page read and write
1B9A4560000
heap
page read and write
1001000
unkown
page execute read
1BDD107D000
heap
page read and write
1BDCFC69000
heap
page read and write
19775E02000
trusted library allocation
page read and write
1BDCFD10000
heap
page read and write
1BDD102F000
heap
page read and write
1BDCA7E1000
heap
page read and write
AEBDBF7000
stack
page read and write
1BDCFD10000
heap
page read and write
1BDCA7C7000
heap
page read and write
1BDCA9AA000
heap
page read and write
2240AE02000
trusted library allocation
page read and write
1E0F02E0000
heap
page read and write
1836FDE000
stack
page read and write
There are 1248 hidden memdumps, click here to show them.