Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
airequipmentcorp-doc-08.11.2022.doc
|
Zip archive data, at least v2.0 to extract
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\rECA2.tmp.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\yE9E2.tmp.dll
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF32F8B01FD4175FF7.TMP
|
Composite Document File V2 Document, Cannot read section info
|
modified
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\airequipmentcorp-doc-08.11.2022.doc.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:45
2022, mtime=Fri Aug 12 00:08:24 2022, atime=Fri Aug 12 00:08:17 2022, length=2203070, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\y6CDC.tmp.dll
|
HTML document, ASCII text
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\3A11B302-44CB-4EB9-BCB8-49C2BE307D7C
|
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\2947CA03.png
|
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\2F6F238A.png
|
PNG image data, 410 x 568, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{51DECAAA-E719-4ADB-922F-7BFC4F91483F}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{C3FA9527-8571-4407-A5C8-BB633260A4AC}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\rm[1].htm
|
HTML document, ASCII text
|
downloaded
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\Desktop\~$requipmentcorp-doc-08.11.2022.doc
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\rm[1].htm
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\airequipmentcorp-doc-08.11.2022.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:53
2022, mtime=Tue Mar 8 15:45:53 2022, atime=Thu Aug 11 23:55:11 2022, length=2203070, window=hide
|
dropped
|
There are 8 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
|
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
|
||
C:\Users\user\AppData\Local\Temp\rECA2.tmp.exe
|
"C:\Users\user\AppData\Local\Temp\rECA2.tmp.exe" "C:\Users\user\AppData\Local\Temp\yE9E2.tmp.dll",#1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.diagnosticssdf.office.com
|
unknown
|
||
https://login.microsoftonline.com/
|
unknown
|
||
https://shell.suite.office.com:1443
|
unknown
|
||
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
|
unknown
|
||
https://autodiscover-s.outlook.com/
|
unknown
|
||
https://roaming.edog.
|
unknown
|
||
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
|
unknown
|
||
https://cdn.entity.
|
unknown
|
||
https://api.addins.omex.office.net/appinfo/query
|
unknown
|
||
https://clients.config.office.net/user/v1.0/tenantassociationkey
|
unknown
|
||
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
|
unknown
|
||
https://powerlift.acompli.net
|
unknown
|
||
https://rpsticket.partnerservices.getmicrosoftkey.com
|
unknown
|
||
https://lookup.onenote.com/lookup/geolocation/v1
|
unknown
|
||
https://cortana.ai
|
unknown
|
||
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
|
unknown
|
||
https://cloudfiles.onenote.com/upload.aspx
|
unknown
|
||
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
|
unknown
|
||
https://entitlement.diagnosticssdf.office.com
|
unknown
|
||
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
|
unknown
|
||
http://45.8.146.139/fhfty/82PF9MOX9VRXL73GMCXOFE8AGP5ROGT8/rm
|
45.8.146.139
|
||
https://api.aadrm.com/
|
unknown
|
||
https://ofcrecsvcapi-int.azurewebsites.net/
|
unknown
|
||
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
|
unknown
|
||
https://api.microsoftstream.com/api/
|
unknown
|
||
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
|
unknown
|
||
https://cr.office.com
|
unknown
|
||
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
|
unknown
|
||
https://portal.office.com/account/?ref=ClientMeControl
|
unknown
|
||
https://graph.ppe.windows.net
|
unknown
|
||
https://res.getmicrosoftkey.com/api/redemptionevents
|
unknown
|
||
https://powerlift-frontdesk.acompli.net
|
unknown
|
||
https://tasks.office.com
|
unknown
|
||
https://officeci.azurewebsites.net/api/
|
unknown
|
||
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
|
unknown
|
||
https://my.microsoftpersonalcontent.com
|
unknown
|
||
https://store.office.cn/addinstemplate
|
unknown
|
||
https://api.aadrm.com
|
unknown
|
||
https://outlook.office.com/autosuggest/api/v1/init?cvid=
|
unknown
|
||
https://globaldisco.crm.dynamics.com
|
unknown
|
||
https://messaging.engagement.office.com/
|
unknown
|
||
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
|
unknown
|
||
https://dev0-api.acompli.net/autodetect
|
unknown
|
||
https://www.odwebp.svc.ms
|
unknown
|
||
https://api.diagnosticssdf.office.com/v2/feedback
|
unknown
|
||
https://api.powerbi.com/v1.0/myorg/groups
|
unknown
|
||
https://web.microsoftstream.com/video/
|
unknown
|
||
https://api.addins.store.officeppe.com/addinstemplate
|
unknown
|
||
https://graph.windows.net
|
unknown
|
||
https://dataservice.o365filtering.com/
|
unknown
|
||
https://officesetup.getmicrosoftkey.com
|
unknown
|
||
https://analysis.windows.net/powerbi/api
|
unknown
|
||
https://prod-global-autodetect.acompli.net/autodetect
|
unknown
|
||
https://outlook.office365.com/autodiscover/autodiscover.json
|
unknown
|
||
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
|
unknown
|
||
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
|
unknown
|
||
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
|
unknown
|
||
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
|
unknown
|
||
https://ncus.contentsync.
|
unknown
|
||
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
|
unknown
|
||
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
|
unknown
|
||
http://weather.service.msn.com/data.aspx
|
unknown
|
||
https://apis.live.net/v5.0/
|
unknown
|
||
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
|
unknown
|
||
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
|
unknown
|
||
https://messaging.lifecycle.office.com/
|
unknown
|
||
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
|
unknown
|
||
https://management.azure.com
|
unknown
|
||
https://outlook.office365.com
|
unknown
|
||
https://wus2.contentsync.
|
unknown
|
||
https://incidents.diagnostics.office.com
|
unknown
|
||
https://clients.config.office.net/user/v1.0/ios
|
unknown
|
||
https://insertmedia.bing.office.net/odc/insertmedia
|
unknown
|
||
https://o365auditrealtimeingestion.manage.office.com
|
unknown
|
||
https://outlook.office365.com/api/v1.0/me/Activities
|
unknown
|
||
https://api.office.net
|
unknown
|
||
https://incidents.diagnosticssdf.office.com
|
unknown
|
||
https://asgsmsproxyapi.azurewebsites.net/
|
unknown
|
||
https://clients.config.office.net/user/v1.0/android/policies
|
unknown
|
||
https://entitlement.diagnostics.office.com
|
unknown
|
||
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
|
unknown
|
||
https://substrate.office.com/search/api/v2/init
|
unknown
|
||
https://outlook.office.com/
|
unknown
|
||
https://storage.live.com/clientlogs/uploadlocation
|
unknown
|
||
https://outlook.office365.com/
|
unknown
|
||
https://webshell.suite.office.com
|
unknown
|
||
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
|
unknown
|
||
https://substrate.office.com/search/api/v1/SearchHistory
|
unknown
|
||
http://45.8.146.139/fhfty/82PF9MOX9VRXL73GMCXOFE8AGP5ROGT8/rmRXL73GMCXOFE8AGP5ROGT8/rm8/rm8/rm_
|
unknown
|
||
https://management.azure.com/
|
unknown
|
||
https://messaging.lifecycle.office.com/getcustommessage16
|
unknown
|
||
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
|
unknown
|
||
https://login.windows.net/common/oauth2/authorize
|
unknown
|
||
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
|
unknown
|
||
https://graph.windows.net/
|
unknown
|
||
https://api.powerbi.com/beta/myorg/imports
|
unknown
|
||
https://devnull.onenote.com
|
unknown
|
||
https://messaging.action.office.com/
|
unknown
|
||
https://ncus.pagecontentsync.
|
unknown
|
||
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.8.146.139
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
|
!30
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
|
"30
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
|
LastBootTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
|
$80
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
|
RemoteClearDate
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
|
Last
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
|
FilePath
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
|
StartDate
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
|
EndDate
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
|
Properties
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
|
Url
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
|
LastClean
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
DisableWinHttpCertAuth
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
DisableIsOwnerRegex
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
DisableSessionAwareHttpClose
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
DisableADALForExtendedApps
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
DisableADALSetSilentAuth
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
msoridDisableGuestCredProvider
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
msoridDisableOstringReplace
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
|
f?0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
|
Name
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
|
Extensions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
|
TCWP5FilesIntl_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
|
TCWP6FilesIntl_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\1DADB
|
1DADB
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
|
MSForms
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
|
MSComctlLib
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\27372
|
27372
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
|
File Path
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
|
Datetime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
|
Position
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
|
VisiFlm
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
|
AutoGrammar
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
|
AutosaveInterval
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
|
PreferredView
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
|
en-US
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
|
en-US
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
|
WORDFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
|
LastBootTime
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
|
Name
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
|
Extensions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
|
Name
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
|
Extensions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
|
TCWP5FilesIntl_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
|
TCWP6FilesIntl_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
|
SpellingAndGrammarFiles_1036
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
|
SpellingAndGrammarFiles_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
|
SpellingAndGrammarFiles_3082
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
|
SpellingAndGrammarFiles_1036
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
|
SpellingAndGrammarFiles_1036
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
|
SpellingAndGrammarFiles_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
|
SpellingAndGrammarFiles_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
|
SpellingAndGrammarFiles_3082
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
|
SpellingAndGrammarFiles_3082
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
|
SpellingAndGrammarFiles_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
|
SpellingAndGrammarFiles_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
|
SpellingAndGrammarFiles_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
|
SpellingAndGrammarFiles_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
|
SpellingAndGrammarFiles_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
|
SpellingAndGrammarFiles_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
|
RoamingConfigurableSettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
|
RoamingLastSyncTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
|
RoamingLastWriteTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\27372
|
27372
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
|
Datetime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
|
Position
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
|
Settings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
|
1//
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
|
MTTT
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
|
90/
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
|
&3/
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
|
TCWP5FilesIntl_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
|
TCWP6FilesIntl_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
|
Name
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
|
Extensions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
|
Name
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
|
Extensions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
|
Name
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
|
Extensions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\65EF2
|
65EF2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
WORDFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
|
TCWP5FilesIntl_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
|
TCWP6FilesIntl_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
|
TCWP5FilesIntl_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
|
TCWP6FilesIntl_1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
There are 97 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1BDD100F000
|
heap
|
page read and write
|
||
1BDCF840000
|
trusted library allocation
|
page read and write
|
||
1BDCFD10000
|
heap
|
page read and write
|
||
1BDCFD94000
|
heap
|
page read and write
|
||
1BDC9E90000
|
heap
|
page read and write
|
||
1BDCFC26000
|
heap
|
page read and write
|
||
1BDCF6FC000
|
trusted library allocation
|
page read and write
|
||
1BDD102C000
|
heap
|
page read and write
|
||
1BDCA9F7000
|
heap
|
page read and write
|
||
44FAD8E000
|
stack
|
page read and write
|
||
7ECA3FE000
|
stack
|
page read and write
|
||
1BDCF70E000
|
trusted library allocation
|
page read and write
|
||
1BDD1081000
|
heap
|
page read and write
|
||
1BDD11BA000
|
heap
|
page read and write
|
||
1BDC9E57000
|
heap
|
page read and write
|
||
1BDCFD10000
|
heap
|
page read and write
|
||
24806580000
|
trusted library allocation
|
page read and write
|
||
1BDD1128000
|
heap
|
page read and write
|
||
2AE465B0000
|
heap
|
page read and write
|
||
2AE46F91000
|
heap
|
page read and write
|
||
1BDCA754000
|
heap
|
page read and write
|
||
1BDCFA93000
|
trusted library allocation
|
page read and write
|
||
2AE46FA0000
|
heap
|
page read and write
|
||
1BDCFD99000
|
heap
|
page read and write
|
||
2AE46F3B000
|
heap
|
page read and write
|
||
1BDCF874000
|
trusted library allocation
|
page read and write
|
||
1BDCFC3C000
|
heap
|
page read and write
|
||
1BDD10D0000
|
heap
|
page read and write
|
||
1B7DE6C1000
|
heap
|
page read and write
|
||
1BDD10C9000
|
heap
|
page read and write
|
||
2AE47444000
|
heap
|
page read and write
|
||
1BDCFD2C000
|
heap
|
page read and write
|
||
1BDCF720000
|
trusted library allocation
|
page read and write
|
||
1BDCB180000
|
trusted library allocation
|
page read and write
|
||
1BDD100F000
|
heap
|
page read and write
|
||
1F814652000
|
heap
|
page read and write
|
||
1977563C000
|
heap
|
page read and write
|
||
1BDD11A6000
|
heap
|
page read and write
|
||
1BDCFC26000
|
heap
|
page read and write
|
||
1BDD1080000
|
heap
|
page read and write
|
||
1763CA00000
|
heap
|
page read and write
|
||
2AE468C7000
|
heap
|
page read and write
|
||
1BDCF87C000
|
trusted library allocation
|
page read and write
|
||
2AE46F8D000
|
heap
|
page read and write
|
||
100C000
|
unkown
|
page readonly
|
||
44FB1FE000
|
stack
|
page read and write
|
||
1BDD11D3000
|
heap
|
page read and write
|
||
1BDD11DE000
|
heap
|
page read and write
|
||
1BDCFDF6000
|
heap
|
page read and write
|
||
1F81C300000
|
trusted library allocation
|
page read and write
|
||
1BDCF6FC000
|
trusted library allocation
|
page read and write
|
||
1BDCF71C000
|
trusted library allocation
|
page read and write
|
||
1BDCA9A4000
|
heap
|
page read and write
|
||
1BDD111F000
|
heap
|
page read and write
|
||
1BDCFDA3000
|
heap
|
page read and write
|
||
1BDCF71C000
|
trusted library allocation
|
page read and write
|
||
1BDCFD58000
|
heap
|
page read and write
|
||
2AE46F7F000
|
heap
|
page read and write
|
||
1BDD1064000
|
heap
|
page read and write
|
||
1BDCA9CC000
|
heap
|
page read and write
|
||
1F816E79000
|
heap
|
page read and write
|
||
1BDCFDD2000
|
heap
|
page read and write
|
||
1E0F0429000
|
heap
|
page read and write
|
||
1BDCF860000
|
trusted library allocation
|
page read and write
|
||
1BDCF874000
|
trusted library allocation
|
page read and write
|
||
1BDD1199000
|
heap
|
page read and write
|
||
1BDD11B1000
|
heap
|
page read and write
|
||
1BDD1053000
|
heap
|
page read and write
|
||
1BDD1147000
|
heap
|
page read and write
|
||
1F816EA6000
|
heap
|
page read and write
|
||
1BDCFD02000
|
heap
|
page read and write
|
||
1BDCFC5B000
|
heap
|
page read and write
|
||
1BDCFD10000
|
heap
|
page read and write
|
||
94FF3FB000
|
stack
|
page read and write
|
||
1BDCA7CE000
|
heap
|
page read and write
|
||
1B7DE600000
|
heap
|
page read and write
|
||
1836EDB000
|
stack
|
page read and write
|
||
1BDCA9FD000
|
heap
|
page read and write
|
||
1B9A467E000
|
heap
|
page read and write
|
||
1BDD11D1000
|
heap
|
page read and write
|
||
1BDD10DB000
|
heap
|
page read and write
|
||
2240A64E000
|
heap
|
page read and write
|
||
2240A64D000
|
heap
|
page read and write
|
||
7EC9EFC000
|
stack
|
page read and write
|
||
1BDD1079000
|
heap
|
page read and write
|
||
1BDCA9C1000
|
heap
|
page read and write
|
||
26345DE000
|
stack
|
page read and write
|
||
1763CB02000
|
heap
|
page read and write
|
||
1BDCF7A0000
|
trusted library allocation
|
page read and write
|
||
1BDD1178000
|
heap
|
page read and write
|
||
1BDD1023000
|
heap
|
page read and write
|
||
B20000
|
remote allocation
|
page read and write
|
||
2240A674000
|
heap
|
page read and write
|
||
1BDD11BA000
|
heap
|
page read and write
|
||
18B8A513000
|
heap
|
page read and write
|
||
18B8A500000
|
heap
|
page read and write
|
||
1BDD10D2000
|
heap
|
page read and write
|
||
2AE46F85000
|
heap
|
page read and write
|
||
1BDCFD10000
|
heap
|
page read and write
|
||
254ED930000
|
heap
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
B037B7F000
|
stack
|
page read and write
|
||
1BDCFDFE000
|
heap
|
page read and write
|
||
AEBDCF8000
|
stack
|
page read and write
|
||
1BDCFD8B000
|
heap
|
page read and write
|
||
1BDCFDE9000
|
heap
|
page read and write
|
||
1BDD115E000
|
heap
|
page read and write
|
||
1BDCF714000
|
trusted library allocation
|
page read and write
|
||
7ECA87D000
|
stack
|
page read and write
|
||
1BDCF87C000
|
trusted library allocation
|
page read and write
|
||
7C4ECFF000
|
stack
|
page read and write
|
||
1BDCA9CC000
|
heap
|
page read and write
|
||
1F817D10000
|
trusted library allocation
|
page read and write
|
||
1F81C440000
|
trusted library allocation
|
page read and write
|
||
1BDCFDAD000
|
heap
|
page read and write
|
||
1F814679000
|
heap
|
page read and write
|
||
1BDCF540000
|
trusted library allocation
|
page read and write
|
||
1BDCF716000
|
trusted library allocation
|
page read and write
|
||
1BDCA9C7000
|
heap
|
page read and write
|
||
1BDCA9C7000
|
heap
|
page read and write
|
||
AC09AFF000
|
stack
|
page read and write
|
||
1BDCFC61000
|
heap
|
page read and write
|
||
1F81C450000
|
trusted library allocation
|
page read and write
|
||
1BDCF710000
|
trusted library allocation
|
page read and write
|
||
1BDCA727000
|
heap
|
page read and write
|
||
1B9A468D000
|
heap
|
page read and write
|
||
1BDCFDE5000
|
heap
|
page read and write
|
||
1F81C454000
|
trusted library allocation
|
page read and write
|
||
1BDD105B000
|
heap
|
page read and write
|
||
1BDD11A3000
|
heap
|
page read and write
|
||
1BDCA702000
|
heap
|
page read and write
|
||
1BDD115B000
|
heap
|
page read and write
|
||
2AE46F72000
|
heap
|
page read and write
|
||
1F817F10000
|
trusted library section
|
page readonly
|
||
2AE468AF000
|
heap
|
page read and write
|
||
1BDCA700000
|
heap
|
page read and write
|
||
AEBDEFA000
|
stack
|
page read and write
|
||
1BDCF830000
|
trusted library allocation
|
page read and write
|
||
2AE47402000
|
heap
|
page read and write
|
||
1BDCFC62000
|
heap
|
page read and write
|
||
1763CA61000
|
heap
|
page read and write
|
||
FD284FE000
|
stack
|
page read and write
|
||
1F81C656000
|
heap
|
page read and write
|
||
1BDD1126000
|
heap
|
page read and write
|
||
1F8145E0000
|
trusted library allocation
|
page read and write
|
||
1BDCA71D000
|
heap
|
page read and write
|
||
2AE468DA000
|
heap
|
page read and write
|
||
18B8A47B000
|
heap
|
page read and write
|
||
1BDCF850000
|
trusted library allocation
|
page read and write
|
||
1BDCFDB1000
|
heap
|
page read and write
|
||
1BDD112E000
|
heap
|
page read and write
|
||
1BDCFD3A000
|
heap
|
page read and write
|
||
1BDD1181000
|
heap
|
page read and write
|
||
1BDD10D5000
|
heap
|
page read and write
|
||
1500A7E000
|
stack
|
page read and write
|
||
44FB07D000
|
stack
|
page read and write
|
||
1BDCFD1F000
|
heap
|
page read and write
|
||
1BDCA9FD000
|
heap
|
page read and write
|
||
1BDCA72E000
|
heap
|
page read and write
|
||
1B9A4678000
|
heap
|
page read and write
|
||
1763CA2A000
|
heap
|
page read and write
|
||
1BDCA9E4000
|
heap
|
page read and write
|
||
1BDD11BA000
|
heap
|
page read and write
|
||
1BDD11E4000
|
heap
|
page read and write
|
||
1BDCA600000
|
heap
|
page read and write
|
||
1BDCFD52000
|
heap
|
page read and write
|
||
15008FF000
|
stack
|
page read and write
|
||
1BDCF71E000
|
trusted library allocation
|
page read and write
|
||
1BDD1202000
|
heap
|
page read and write
|
||
1BDCFD19000
|
heap
|
page read and write
|
||
1BDD103B000
|
heap
|
page read and write
|
||
2AE46F13000
|
heap
|
page read and write
|
||
1BDD1171000
|
heap
|
page read and write
|
||
2AE467F0000
|
trusted library allocation
|
page read and write
|
||
1BDCFD17000
|
heap
|
page read and write
|
||
1BDD116A000
|
heap
|
page read and write
|
||
1BDCF870000
|
trusted library allocation
|
page read and write
|
||
1BDCFC69000
|
heap
|
page read and write
|
||
B20000
|
remote allocation
|
page read and write
|
||
1F816E71000
|
heap
|
page read and write
|
||
1BDD10D0000
|
heap
|
page read and write
|
||
1B9A48B5000
|
heap
|
page read and write
|
||
1BDCFC26000
|
heap
|
page read and write
|
||
18B8A451000
|
heap
|
page read and write
|
||
254EDA4B000
|
heap
|
page read and write
|
||
1BDCA965000
|
heap
|
page read and write
|
||
1BDCF870000
|
trusted library allocation
|
page read and write
|
||
1BDC9E5B000
|
heap
|
page read and write
|
||
1BDCFC38000
|
heap
|
page read and write
|
||
2AE46F85000
|
heap
|
page read and write
|
||
254EDA00000
|
heap
|
page read and write
|
||
1BDD1135000
|
heap
|
page read and write
|
||
1BDCF700000
|
trusted library allocation
|
page read and write
|
||
1BDC9E67000
|
heap
|
page read and write
|
||
1F814700000
|
heap
|
page read and write
|
||
1F817F40000
|
trusted library section
|
page readonly
|
||
1000000
|
unkown
|
page readonly
|
||
1BDCFD2C000
|
heap
|
page read and write
|
||
183777F000
|
stack
|
page read and write
|
||
1BDCFD2F000
|
heap
|
page read and write
|
||
1BDD1173000
|
heap
|
page read and write
|
||
1BDCFD10000
|
heap
|
page read and write
|
||
1F81C600000
|
heap
|
page read and write
|
||
2240AC60000
|
trusted library allocation
|
page read and write
|
||
1BDD111D000
|
heap
|
page read and write
|
||
1BDCA9CC000
|
heap
|
page read and write
|
||
1BDCF700000
|
trusted library allocation
|
page read and write
|
||
2240A673000
|
heap
|
page read and write
|
||
1BDCF87C000
|
trusted library allocation
|
page read and write
|
||
1BDCFC2F000
|
heap
|
page read and write
|
||
1BDD1146000
|
heap
|
page read and write
|
||
1BDCFDFE000
|
heap
|
page read and write
|
||
1BDD1074000
|
heap
|
page read and write
|
||
1F81C6A8000
|
heap
|
page read and write
|
||
2AE47419000
|
heap
|
page read and write
|
||
248064E0000
|
heap
|
page read and write
|
||
1F81C570000
|
remote allocation
|
page read and write
|
||
1BDD1139000
|
heap
|
page read and write
|
||
18B8A462000
|
heap
|
page read and write
|
||
254EDA30000
|
heap
|
page read and write
|
||
1BDD1190000
|
heap
|
page read and write
|
||
1BDD11CA000
|
heap
|
page read and write
|
||
2240A662000
|
heap
|
page read and write
|
||
1BDD102E000
|
heap
|
page read and write
|
||
1BDCFC69000
|
heap
|
page read and write
|
||
7C4EE7C000
|
stack
|
page read and write
|
||
24806613000
|
heap
|
page read and write
|
||
2AE46800000
|
heap
|
page read and write
|
||
1BDCFD02000
|
heap
|
page read and write
|
||
1BDCF880000
|
trusted library allocation
|
page read and write
|
||
AC09BFF000
|
stack
|
page read and write
|
||
2240A678000
|
heap
|
page read and write
|
||
1BDD11D1000
|
heap
|
page read and write
|
||
1BDCFDA4000
|
heap
|
page read and write
|
||
2240A600000
|
heap
|
page read and write
|
||
1BDCFDB1000
|
heap
|
page read and write
|
||
1BDCA9F8000
|
heap
|
page read and write
|
||
1F81C434000
|
trusted library allocation
|
page read and write
|
||
2AE46F7F000
|
heap
|
page read and write
|
||
1BDCF860000
|
trusted library allocation
|
page read and write
|
||
1BDD10DE000
|
heap
|
page read and write
|
||
1BDD1063000
|
heap
|
page read and write
|
||
2AE46849000
|
heap
|
page read and write
|
||
1BDCFC34000
|
heap
|
page read and write
|
||
2AE46813000
|
heap
|
page read and write
|
||
1BDD10C5000
|
heap
|
page read and write
|
||
1BDCFC61000
|
heap
|
page read and write
|
||
2AE47403000
|
heap
|
page read and write
|
||
1BDC9E89000
|
heap
|
page read and write
|
||
24806675000
|
heap
|
page read and write
|
||
2AE46F91000
|
heap
|
page read and write
|
||
AC09CFF000
|
stack
|
page read and write
|
||
1BDD10C3000
|
heap
|
page read and write
|
||
1B7DE580000
|
trusted library allocation
|
page read and write
|
||
1BDCA792000
|
heap
|
page read and write
|
||
1BDCFD03000
|
heap
|
page read and write
|
||
1BDCFDF8000
|
heap
|
page read and write
|
||
2AE47402000
|
heap
|
page read and write
|
||
1BDD10C7000
|
heap
|
page read and write
|
||
1BDCF860000
|
trusted library allocation
|
page read and write
|
||
1F817F30000
|
trusted library section
|
page readonly
|
||
254EE202000
|
trusted library allocation
|
page read and write
|
||
1BDCFD0F000
|
heap
|
page read and write
|
||
1BDD108A000
|
heap
|
page read and write
|
||
2240A67D000
|
heap
|
page read and write
|
||
1BDD10E9000
|
heap
|
page read and write
|
||
19775692000
|
heap
|
page read and write
|
||
2AE46908000
|
heap
|
page read and write
|
||
1BDCF870000
|
trusted library allocation
|
page read and write
|
||
1BDCFA60000
|
remote allocation
|
page read and write
|
||
2AE46F4B000
|
heap
|
page read and write
|
||
1BDD1091000
|
heap
|
page read and write
|
||
1BDD1182000
|
heap
|
page read and write
|
||
1BDD112F000
|
heap
|
page read and write
|
||
1BDD11BA000
|
heap
|
page read and write
|
||
1BDD1158000
|
heap
|
page read and write
|
||
1BDD1120000
|
heap
|
page read and write
|
||
2240A63D000
|
heap
|
page read and write
|
||
1BDD10EF000
|
heap
|
page read and write
|
||
1BDCA81B000
|
heap
|
page read and write
|
||
183767F000
|
stack
|
page read and write
|
||
1BDD105C000
|
heap
|
page read and write
|
||
1BDD104F000
|
heap
|
page read and write
|
||
1BDCFC4F000
|
heap
|
page read and write
|
||
1BDD1070000
|
heap
|
page read and write
|
||
1977565C000
|
heap
|
page read and write
|
||
1BDD11BA000
|
heap
|
page read and write
|
||
94FECCB000
|
stack
|
page read and write
|
||
1BDD1168000
|
heap
|
page read and write
|
||
2240A62D000
|
heap
|
page read and write
|
||
1BDD1091000
|
heap
|
page read and write
|
||
E760CF9000
|
stack
|
page read and write
|
||
1BDCFD83000
|
heap
|
page read and write
|
||
1BDD1184000
|
heap
|
page read and write
|
||
44FB3F7000
|
stack
|
page read and write
|
||
E760AFF000
|
stack
|
page read and write
|
||
1BDCFD83000
|
heap
|
page read and write
|
||
1BDD108A000
|
heap
|
page read and write
|
||
1009000
|
unkown
|
page readonly
|
||
1BDCFD61000
|
heap
|
page read and write
|
||
1BDCFC58000
|
heap
|
page read and write
|
||
1BDCB4B0000
|
trusted library section
|
page readonly
|
||
1BDD1179000
|
heap
|
page read and write
|
||
2240A667000
|
heap
|
page read and write
|
||
150097F000
|
stack
|
page read and write
|
||
1BDD104E000
|
heap
|
page read and write
|
||
1BDCA7C4000
|
heap
|
page read and write
|
||
1BDC9E90000
|
heap
|
page read and write
|
||
1BDD10A3000
|
heap
|
page read and write
|
||
1BDC9E86000
|
heap
|
page read and write
|
||
1BDD1011000
|
heap
|
page read and write
|
||
1E0F0400000
|
heap
|
page read and write
|
||
1F816E8C000
|
heap
|
page read and write
|
||
1BDCFC53000
|
heap
|
page read and write
|
||
1BDCFDF3000
|
heap
|
page read and write
|
||
1B9A4410000
|
heap
|
page read and write
|
||
AC0927B000
|
stack
|
page read and write
|
||
1BDCA960000
|
heap
|
page read and write
|
||
1BDCB4E0000
|
trusted library section
|
page readonly
|
||
1F81C540000
|
trusted library allocation
|
page read and write
|
||
1977562A000
|
heap
|
page read and write
|
||
1BDCF930000
|
trusted library allocation
|
page read and write
|
||
1B7DE420000
|
heap
|
page read and write
|
||
1BDCFDA8000
|
heap
|
page read and write
|
||
1BDD11A1000
|
heap
|
page read and write
|
||
1F814613000
|
heap
|
page read and write
|
||
1BDD11DB000
|
heap
|
page read and write
|
||
7ECA67F000
|
stack
|
page read and write
|
||
1B7DE6E2000
|
heap
|
page read and write
|
||
1BDCA9C8000
|
heap
|
page read and write
|
||
1BDCA9C7000
|
heap
|
page read and write
|
||
1F817E30000
|
trusted library allocation
|
page read and write
|
||
2AE46620000
|
heap
|
page read and write
|
||
1BDD1079000
|
heap
|
page read and write
|
||
1BDCFD02000
|
heap
|
page read and write
|
||
1001000
|
unkown
|
page execute read
|
||
1763CB13000
|
heap
|
page read and write
|
||
1F816D50000
|
heap
|
page read and write
|
||
2AE46F9B000
|
heap
|
page read and write
|
||
1BDCFC69000
|
heap
|
page read and write
|
||
1BDCA7AC000
|
heap
|
page read and write
|
||
1F817D20000
|
trusted library allocation
|
page read and write
|
||
1BDCF74E000
|
trusted library allocation
|
page read and write
|
||
7ECA4FE000
|
stack
|
page read and write
|
||
1BDD0010000
|
heap
|
page read and write
|
||
AEBD59C000
|
stack
|
page read and write
|
||
BDF000
|
stack
|
page read and write
|
||
1500EFE000
|
stack
|
page read and write
|
||
1500FF5000
|
stack
|
page read and write
|
||
1BDCFC48000
|
heap
|
page read and write
|
||
1BDCFC2D000
|
heap
|
page read and write
|
||
1763D202000
|
trusted library allocation
|
page read and write
|
||
1BDCA823000
|
heap
|
page read and write
|
||
1BDD1189000
|
heap
|
page read and write
|
||
1F816EFD000
|
heap
|
page read and write
|
||
1BDD100C000
|
heap
|
page read and write
|
||
1BDCF74A000
|
trusted library allocation
|
page read and write
|
||
1BDCFDD5000
|
heap
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
1BDCFC26000
|
heap
|
page read and write
|
||
1BDD11D1000
|
heap
|
page read and write
|
||
1BDCA9C3000
|
heap
|
page read and write
|
||
2240A647000
|
heap
|
page read and write
|
||
1BDCF980000
|
trusted library allocation
|
page read and write
|
||
1BDD1160000
|
heap
|
page read and write
|
||
1BDCFDC8000
|
heap
|
page read and write
|
||
2AE46F91000
|
heap
|
page read and write
|
||
1BDD115D000
|
heap
|
page read and write
|
||
E76047B000
|
stack
|
page read and write
|
||
24806629000
|
heap
|
page read and write
|
||
1F814E02000
|
trusted library allocation
|
page read and write
|
||
263455B000
|
stack
|
page read and write
|
||
1BDCF850000
|
trusted library allocation
|
page read and write
|
||
254EDB02000
|
heap
|
page read and write
|
||
1BDCFC2D000
|
heap
|
page read and write
|
||
1BDD1186000
|
heap
|
page read and write
|
||
44FB4FE000
|
stack
|
page read and write
|
||
1F81C570000
|
trusted library allocation
|
page read and write
|
||
1BDCFD61000
|
heap
|
page read and write
|
||
1B9A4540000
|
heap
|
page read and write
|
||
1BDCF860000
|
trusted library allocation
|
page read and write
|
||
1BDCFC34000
|
heap
|
page read and write
|
||
1B9A4666000
|
heap
|
page read and write
|
||
1BDD112C000
|
heap
|
page read and write
|
||
1BDD1102000
|
heap
|
page read and write
|
||
2AE46F93000
|
heap
|
page read and write
|
||
2AE4684D000
|
heap
|
page read and write
|
||
1BDCFC2F000
|
heap
|
page read and write
|
||
1BDCA9C8000
|
heap
|
page read and write
|
||
1B9A4661000
|
heap
|
page read and write
|
||
1009000
|
unkown
|
page readonly
|
||
2240A682000
|
heap
|
page read and write
|
||
2480665A000
|
heap
|
page read and write
|
||
1BDCA7F3000
|
heap
|
page read and write
|
||
1BDCA975000
|
heap
|
page read and write
|
||
1BDD10A2000
|
heap
|
page read and write
|
||
1BDD11E2000
|
heap
|
page read and write
|
||
7ECA77D000
|
stack
|
page read and write
|
||
1BDD1196000
|
heap
|
page read and write
|
||
1BDCF900000
|
trusted library allocation
|
page read and write
|
||
1BDCFD87000
|
heap
|
page read and write
|
||
19775590000
|
heap
|
page read and write
|
||
1BDD10C1000
|
heap
|
page read and write
|
||
1BDD1119000
|
heap
|
page read and write
|
||
24806656000
|
heap
|
page read and write
|
||
1BDCFDEF000
|
heap
|
page read and write
|
||
1BDCF765000
|
trusted library allocation
|
page read and write
|
||
1BDD11BA000
|
heap
|
page read and write
|
||
1BDCA7AF000
|
heap
|
page read and write
|
||
1F81C440000
|
trusted library allocation
|
page read and write
|
||
1BDD1090000
|
heap
|
page read and write
|
||
1BDC9FEB000
|
heap
|
page read and write
|
||
1F817700000
|
heap
|
page read and write
|
||
1BDC9FC2000
|
heap
|
page read and write
|
||
1BDCFC2F000
|
heap
|
page read and write
|
||
1F81C61E000
|
heap
|
page read and write
|
||
2240A649000
|
heap
|
page read and write
|
||
1BDCF5D0000
|
trusted library allocation
|
page read and write
|
||
1BDCA9AD000
|
heap
|
page read and write
|
||
18B8A460000
|
heap
|
page read and write
|
||
2AE468A9000
|
heap
|
page read and write
|
||
1763CB00000
|
heap
|
page read and write
|
||
1763C950000
|
heap
|
page read and write
|
||
1BDD10D5000
|
heap
|
page read and write
|
||
1F816D40000
|
heap
|
page read and write
|
||
1BDCFC26000
|
heap
|
page read and write
|
||
1BDC9E13000
|
heap
|
page read and write
|
||
1BDD10D7000
|
heap
|
page read and write
|
||
254EDA46000
|
heap
|
page read and write
|
||
1BDCF712000
|
trusted library allocation
|
page read and write
|
||
1F81467B000
|
heap
|
page read and write
|
||
1BDCA9C9000
|
heap
|
page read and write
|
||
2AE46F85000
|
heap
|
page read and write
|
||
1BDD10DC000
|
heap
|
page read and write
|
||
1BDCF700000
|
trusted library allocation
|
page read and write
|
||
1F81C410000
|
trusted library allocation
|
page read and write
|
||
1BDCFC34000
|
heap
|
page read and write
|
||
1F8175E1000
|
trusted library allocation
|
page read and write
|
||
1BDCF874000
|
trusted library allocation
|
page read and write
|
||
1BDCFC13000
|
heap
|
page read and write
|
||
1BDCF6E0000
|
trusted library allocation
|
page read and write
|
||
1BDD108A000
|
heap
|
page read and write
|
||
1BDCF74E000
|
trusted library allocation
|
page read and write
|
||
1BDCFD86000
|
heap
|
page read and write
|
||
2240A663000
|
heap
|
page read and write
|
||
1500AFE000
|
stack
|
page read and write
|
||
1BDCA979000
|
heap
|
page read and write
|
||
1F817F60000
|
trusted library section
|
page readonly
|
||
1BDCFB00000
|
trusted library allocation
|
page read and write
|
||
1BDCFD2D000
|
heap
|
page read and write
|
||
2AE46F00000
|
heap
|
page read and write
|
||
1B7DE677000
|
heap
|
page read and write
|
||
7ECA27E000
|
stack
|
page read and write
|
||
94FF2FE000
|
stack
|
page read and write
|
||
1BDD101F000
|
heap
|
page read and write
|
||
2AE46F89000
|
heap
|
page read and write
|
||
100C000
|
unkown
|
page readonly
|
||
24806E02000
|
trusted library allocation
|
page read and write
|
||
1BDCF720000
|
trusted library allocation
|
page read and write
|
||
1F814600000
|
heap
|
page read and write
|
||
2240A648000
|
heap
|
page read and write
|
||
2AE46913000
|
heap
|
page read and write
|
||
2AE46889000
|
heap
|
page read and write
|
||
B9E000
|
stack
|
page read and write
|
||
1BDCF700000
|
trusted library allocation
|
page read and write
|
||
150067F000
|
stack
|
page read and write
|
||
1BDCFC38000
|
heap
|
page read and write
|
||
1BDD1070000
|
heap
|
page read and write
|
||
AC095FF000
|
stack
|
page read and write
|
||
2AE468F2000
|
heap
|
page read and write
|
||
1BDCF940000
|
trusted library allocation
|
page read and write
|
||
1BDCFD6F000
|
heap
|
page read and write
|
||
1F816DE0000
|
trusted library allocation
|
page read and write
|
||
1F816E41000
|
heap
|
page read and write
|
||
1F81C706000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
1BDCA9CC000
|
heap
|
page read and write
|
||
2AE468B3000
|
heap
|
page read and write
|
||
2240A66B000
|
heap
|
page read and write
|
||
1F816E29000
|
heap
|
page read and write
|
||
1BDD101C000
|
heap
|
page read and write
|
||
1F81C614000
|
heap
|
page read and write
|
||
1BDD1006000
|
heap
|
page read and write
|
||
1F816EA0000
|
heap
|
page read and write
|
||
1BDD108A000
|
heap
|
page read and write
|
||
1BDCF870000
|
trusted library allocation
|
page read and write
|
||
2634AFE000
|
stack
|
page read and write
|
||
1BDCA943000
|
heap
|
page read and write
|
||
1E0F0340000
|
heap
|
page read and write
|
||
1BDCFC2D000
|
heap
|
page read and write
|
||
1BDC9DD0000
|
trusted library allocation
|
page read and write
|
||
1BDCFD10000
|
heap
|
page read and write
|
||
1BDCA9FD000
|
heap
|
page read and write
|
||
2240A62E000
|
heap
|
page read and write
|
||
3FF56FC000
|
stack
|
page read and write
|
||
1BDCA9CC000
|
heap
|
page read and write
|
||
1BDCFC43000
|
heap
|
page read and write
|
||
1BDD119D000
|
heap
|
page read and write
|
||
1BDD10E0000
|
heap
|
page read and write
|
||
1763CA13000
|
heap
|
page read and write
|
||
1F817F20000
|
trusted library section
|
page readonly
|
||
1BDCFC2F000
|
heap
|
page read and write
|
||
1F817D03000
|
trusted library allocation
|
page read and write
|
||
1BDCFDF6000
|
heap
|
page read and write
|
||
ABD000
|
stack
|
page read and write
|
||
1F81C431000
|
trusted library allocation
|
page read and write
|
||
1BDCB4F0000
|
trusted library section
|
page readonly
|
||
1B9A48B0000
|
heap
|
page read and write
|
||
1BDCA9E0000
|
heap
|
page read and write
|
||
1BDD10C2000
|
heap
|
page read and write
|
||
1BDCFC69000
|
heap
|
page read and write
|
||
7C4E87B000
|
stack
|
page read and write
|
||
1BDCF716000
|
trusted library allocation
|
page read and write
|
||
1BDCFD84000
|
heap
|
page read and write
|
||
1BDD11BA000
|
heap
|
page read and write
|
||
3FF5578000
|
stack
|
page read and write
|
||
E76077A000
|
stack
|
page read and write
|
||
1BDD114B000
|
heap
|
page read and write
|
||
1F816E93000
|
heap
|
page read and write
|
||
1BDC9E50000
|
heap
|
page read and write
|
||
1BDCF700000
|
trusted library allocation
|
page read and write
|
||
157FCAC000
|
stack
|
page read and write
|
||
1000000
|
unkown
|
page readonly
|
||
1BDCF700000
|
trusted library allocation
|
page read and write
|
||
1BDD11A4000
|
heap
|
page read and write
|
||
1500BFB000
|
stack
|
page read and write
|
||
19775682000
|
heap
|
page read and write
|
||
1B7DEF00000
|
heap
|
page read and write
|
||
1BDCFC34000
|
heap
|
page read and write
|
||
1763CA82000
|
heap
|
page read and write
|
||
1B9A4672000
|
heap
|
page read and write
|
||
1BDCFC61000
|
heap
|
page read and write
|
||
2AE46F6E000
|
heap
|
page read and write
|
||
1BDD10CB000
|
heap
|
page read and write
|
||
1BDD1213000
|
heap
|
page read and write
|
||
1BDCFD8E000
|
heap
|
page read and write
|
||
1BDCF87C000
|
trusted library allocation
|
page read and write
|
||
1BDCFDF3000
|
heap
|
page read and write
|
||
19775702000
|
heap
|
page read and write
|
||
1BDCFAF0000
|
trusted library allocation
|
page read and write
|
||
1BDCFD0F000
|
heap
|
page read and write
|
||
1500DFE000
|
stack
|
page read and write
|
||
1BDD1007000
|
heap
|
page read and write
|
||
1BDCFDAD000
|
heap
|
page read and write
|
||
1BDCFDEC000
|
heap
|
page read and write
|
||
2AE46829000
|
heap
|
page read and write
|
||
2240A4A0000
|
heap
|
page read and write
|
||
1BDCFDAD000
|
heap
|
page read and write
|
||
254EDA1F000
|
heap
|
page read and write
|
||
1BDCFC26000
|
heap
|
page read and write
|
||
1B9A4694000
|
heap
|
page read and write
|
||
254EDA3C000
|
heap
|
page read and write
|
||
18B8A508000
|
heap
|
page read and write
|
||
1F81C703000
|
heap
|
page read and write
|
||
1BDD11CA000
|
heap
|
page read and write
|
||
1B7DE480000
|
heap
|
page read and write
|
||
1BDCA96C000
|
heap
|
page read and write
|
||
1BDCA9F7000
|
heap
|
page read and write
|
||
1BDCFD99000
|
heap
|
page read and write
|
||
1BDD11D3000
|
heap
|
page read and write
|
||
1F8144E0000
|
heap
|
page read and write
|
||
1BDCA98B000
|
heap
|
page read and write
|
||
2634DFE000
|
stack
|
page read and write
|
||
1BDD10BF000
|
heap
|
page read and write
|
||
1BDD1004000
|
heap
|
page read and write
|
||
1B7DE613000
|
heap
|
page read and write
|
||
1F816E13000
|
heap
|
page read and write
|
||
1BDCFC5F000
|
heap
|
page read and write
|
||
2AE46F10000
|
heap
|
page read and write
|
||
1BDCFD10000
|
heap
|
page read and write
|
||
1BDCFC37000
|
heap
|
page read and write
|
||
1BDCF8B0000
|
trusted library allocation
|
page read and write
|
||
18B8A340000
|
heap
|
page read and write
|
||
1BDCFDF5000
|
heap
|
page read and write
|
||
1BDCFD02000
|
heap
|
page read and write
|
||
1BDCFC61000
|
heap
|
page read and write
|
||
7C4EBFF000
|
stack
|
page read and write
|
||
1BDD11BA000
|
heap
|
page read and write
|
||
E76087B000
|
stack
|
page read and write
|
||
2AE46F9B000
|
heap
|
page read and write
|
||
2240A67A000
|
heap
|
page read and write
|
||
197755C0000
|
trusted library allocation
|
page read and write
|
||
1BDCFDE3000
|
heap
|
page read and write
|
||
1BDCA996000
|
heap
|
page read and write
|
||
1BDCFDD0000
|
heap
|
page read and write
|
||
1BDD1096000
|
heap
|
page read and write
|
||
1BDCA9C0000
|
heap
|
page read and write
|
||
1BDD113B000
|
heap
|
page read and write
|
||
1BDC9E00000
|
heap
|
page read and write
|
||
1BDCF714000
|
trusted library allocation
|
page read and write
|
||
1BDCA800000
|
heap
|
page read and write
|
||
2240A641000
|
heap
|
page read and write
|
||
1BDCA7AC000
|
heap
|
page read and write
|
||
1BDCFD11000
|
heap
|
page read and write
|
||
AC099FF000
|
stack
|
page read and write
|
||
3FF55FE000
|
stack
|
page read and write
|
||
AEBDF7F000
|
unkown
|
page read and write
|
||
1BDD10B7000
|
heap
|
page read and write
|
||
1BDD1076000
|
heap
|
page read and write
|
||
1BDCFC34000
|
heap
|
page read and write
|
||
1BDCF710000
|
trusted library allocation
|
page read and write
|
||
1BDCA9C7000
|
heap
|
page read and write
|
||
254EDA02000
|
heap
|
page read and write
|
||
19775700000
|
heap
|
page read and write
|
||
2AE46F91000
|
heap
|
page read and write
|
||
1000000
|
unkown
|
page readonly
|
||
1F81461F000
|
heap
|
page read and write
|
||
1BDCF74A000
|
trusted library allocation
|
page read and write
|
||
2AE46DF0000
|
remote allocation
|
page read and write
|
||
15010FF000
|
stack
|
page read and write
|
||
2240A676000
|
heap
|
page read and write
|
||
1BDCFDFA000
|
heap
|
page read and write
|
||
18374F7000
|
stack
|
page read and write
|
||
1BDD11BA000
|
heap
|
page read and write
|
||
1F81C530000
|
trusted library allocation
|
page read and write
|
||
FD2877E000
|
stack
|
page read and write
|
||
1BDD119E000
|
heap
|
page read and write
|
||
1BDCF860000
|
trusted library allocation
|
page read and write
|
||
1BDD109B000
|
heap
|
page read and write
|
||
1B9A4677000
|
heap
|
page read and write
|
||
44FB5FE000
|
stack
|
page read and write
|
||
1BDD1143000
|
heap
|
page read and write
|
||
1BDC9E29000
|
heap
|
page read and write
|
||
E760677000
|
stack
|
page read and write
|
||
24806702000
|
heap
|
page read and write
|
||
1BDD113F000
|
heap
|
page read and write
|
||
2634BF7000
|
stack
|
page read and write
|
||
1763CA66000
|
heap
|
page read and write
|
||
1BDCFC69000
|
heap
|
page read and write
|
||
1BDCA9C8000
|
heap
|
page read and write
|
||
1BDCFDCC000
|
heap
|
page read and write
|
||
1BDCF710000
|
trusted library allocation
|
page read and write
|
||
7ECA5FD000
|
stack
|
page read and write
|
||
1F817718000
|
heap
|
page read and write
|
||
1BDCFC34000
|
heap
|
page read and write
|
||
1BDCA9E7000
|
heap
|
page read and write
|
||
1BDCA9FE000
|
heap
|
page read and write
|
||
AC094FC000
|
stack
|
page read and write
|
||
1BDCA9FF000
|
heap
|
page read and write
|
||
254EDA29000
|
heap
|
page read and write
|
||
1001000
|
unkown
|
page execute read
|
||
2240A500000
|
heap
|
page read and write
|
||
1BDD1090000
|
heap
|
page read and write
|
||
1BDCF71C000
|
trusted library allocation
|
page read and write
|
||
1BDD103B000
|
heap
|
page read and write
|
||
1BDD11B3000
|
heap
|
page read and write
|
||
1E0F02D0000
|
heap
|
page read and write
|
||
263487E000
|
stack
|
page read and write
|
||
1B7DE6E8000
|
heap
|
page read and write
|
||
1BDCFC55000
|
heap
|
page read and write
|
||
1BDD1099000
|
heap
|
page read and write
|
||
1F81C4E0000
|
trusted library allocation
|
page read and write
|
||
1F816E58000
|
heap
|
page read and write
|
||
1500379000
|
stack
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
1BDD1069000
|
heap
|
page read and write
|
||
248064F0000
|
heap
|
page read and write
|
||
2AE46FD2000
|
heap
|
page read and write
|
||
E76097F000
|
stack
|
page read and write
|
||
1BDD107B000
|
heap
|
page read and write
|
||
1BDD10BA000
|
heap
|
page read and write
|
||
AC096FF000
|
stack
|
page read and write
|
||
1F81D000000
|
heap
|
page read and write
|
||
1BDCFC5C000
|
heap
|
page read and write
|
||
1BDD1136000
|
heap
|
page read and write
|
||
1BDD10F2000
|
heap
|
page read and write
|
||
1BDCF705000
|
trusted library allocation
|
page read and write
|
||
1BDCF874000
|
trusted library allocation
|
page read and write
|
||
1BDC9E43000
|
heap
|
page read and write
|
||
1BDCF910000
|
trusted library allocation
|
page read and write
|
||
1BDCF8D0000
|
trusted library allocation
|
page read and write
|
||
1BDCA9CC000
|
heap
|
page read and write
|
||
1BDCFC69000
|
heap
|
page read and write
|
||
1BDCFDC7000
|
heap
|
page read and write
|
||
1BDCFC2F000
|
heap
|
page read and write
|
||
2AE468C1000
|
heap
|
page read and write
|
||
1763CA55000
|
heap
|
page read and write
|
||
1BDCA9BB000
|
heap
|
page read and write
|
||
2AE47402000
|
heap
|
page read and write
|
||
1BDD101A000
|
heap
|
page read and write
|
||
1B7DE6CF000
|
heap
|
page read and write
|
||
2AE465C0000
|
heap
|
page read and write
|
||
1BDCFD0F000
|
heap
|
page read and write
|
||
1BDC9E74000
|
heap
|
page read and write
|
||
1BDCFD10000
|
heap
|
page read and write
|
||
1BDCF87C000
|
trusted library allocation
|
page read and write
|
||
1BDC9E8D000
|
heap
|
page read and write
|
||
AC0907C000
|
stack
|
page read and write
|
||
1BDD1102000
|
heap
|
page read and write
|
||
1BDCFDF3000
|
heap
|
page read and write
|
||
1BDCFD02000
|
heap
|
page read and write
|
||
1BDCFC3F000
|
heap
|
page read and write
|
||
18B8A3B0000
|
heap
|
page read and write
|
||
1F817602000
|
heap
|
page read and write
|
||
1F817D00000
|
trusted library allocation
|
page read and write
|
||
1BDCFDC2000
|
heap
|
page read and write
|
||
1B9A467E000
|
heap
|
page read and write
|
||
254EDA43000
|
heap
|
page read and write
|
||
1BDD1175000
|
heap
|
page read and write
|
||
1BDCF950000
|
trusted library allocation
|
page read and write
|
||
1BDCFC69000
|
heap
|
page read and write
|
||
1F814702000
|
heap
|
page read and write
|
||
2AE46F8D000
|
heap
|
page read and write
|
||
1BDCFD5B000
|
heap
|
page read and write
|
||
1BDCFC50000
|
heap
|
page read and write
|
||
1B9A4650000
|
heap
|
page read and write
|
||
1BDCFDD4000
|
heap
|
page read and write
|
||
1BDCFD00000
|
heap
|
page read and write
|
||
1BDCF705000
|
trusted library allocation
|
page read and write
|
||
18B8AC02000
|
trusted library allocation
|
page read and write
|
||
1E0F0370000
|
trusted library allocation
|
page read and write
|
||
1000000
|
unkown
|
page readonly
|
||
2AE46FDC000
|
heap
|
page read and write
|
||
1BDCF708000
|
trusted library allocation
|
page read and write
|
||
7C4EA7B000
|
stack
|
page read and write
|
||
1BDCFDCD000
|
heap
|
page read and write
|
||
2240A661000
|
heap
|
page read and write
|
||
1F817600000
|
heap
|
page read and write
|
||
1BDCF874000
|
trusted library allocation
|
page read and write
|
||
2240A640000
|
heap
|
page read and write
|
||
18B8A3E0000
|
trusted library allocation
|
page read and write
|
||
254ED8D0000
|
heap
|
page read and write
|
||
150087A000
|
stack
|
page read and write
|
||
1BDCF722000
|
trusted library allocation
|
page read and write
|
||
1977565F000
|
heap
|
page read and write
|
||
1BDCFD2E000
|
heap
|
page read and write
|
||
1BDD11BA000
|
heap
|
page read and write
|
||
1F816E7B000
|
heap
|
page read and write
|
||
1BDD108A000
|
heap
|
page read and write
|
||
1F81C6F9000
|
heap
|
page read and write
|
||
1BDD10BF000
|
heap
|
page read and write
|
||
1BDD1072000
|
heap
|
page read and write
|
||
1BDD1018000
|
heap
|
page read and write
|
||
2AE46F76000
|
heap
|
page read and write
|
||
1BDCA9AC000
|
heap
|
page read and write
|
||
1BDD111B000
|
heap
|
page read and write
|
||
AEBDDFF000
|
stack
|
page read and write
|
||
1BDCFA90000
|
trusted library allocation
|
page read and write
|
||
1001000
|
unkown
|
page execute read
|
||
2AE46870000
|
heap
|
page read and write
|
||
2240A630000
|
heap
|
page read and write
|
||
1BDD1122000
|
heap
|
page read and write
|
||
100C000
|
unkown
|
page readonly
|
||
1BDCA9C8000
|
heap
|
page read and write
|
||
2AE46F9C000
|
heap
|
page read and write
|
||
150047A000
|
stack
|
page read and write
|
||
1BDCFD11000
|
heap
|
page read and write
|
||
1763C9C0000
|
heap
|
page read and write
|
||
2AE46F86000
|
heap
|
page read and write
|
||
1BDCFD6F000
|
heap
|
page read and write
|
||
1BDD1200000
|
heap
|
page read and write
|
||
18B8A429000
|
heap
|
page read and write
|
||
1BDD1018000
|
heap
|
page read and write
|
||
1BDCA9B0000
|
heap
|
page read and write
|
||
1BDD1000000
|
heap
|
page read and write
|
||
1BDD108D000
|
heap
|
page read and write
|
||
1F81C550000
|
trusted library allocation
|
page read and write
|
||
1F816E76000
|
heap
|
page read and write
|
||
1BDCA9C7000
|
heap
|
page read and write
|
||
1BDD1072000
|
heap
|
page read and write
|
||
1BDD108A000
|
heap
|
page read and write
|
||
1BDD108A000
|
heap
|
page read and write
|
||
B0377FC000
|
stack
|
page read and write
|
||
1BDD116C000
|
heap
|
page read and write
|
||
2240A64B000
|
heap
|
page read and write
|
||
1BDCA9C7000
|
heap
|
page read and write
|
||
1BDCB3D0000
|
trusted library allocation
|
page read and write
|
||
1BDD119B000
|
heap
|
page read and write
|
||
18B8A486000
|
heap
|
page read and write
|
||
AEBD87E000
|
stack
|
page read and write
|
||
1BDCA9F7000
|
heap
|
page read and write
|
||
1F814602000
|
heap
|
page read and write
|
||
1BDCFC69000
|
heap
|
page read and write
|
||
1BDCFDF3000
|
heap
|
page read and write
|
||
E760F7C000
|
stack
|
page read and write
|
||
1BDCFC62000
|
heap
|
page read and write
|
||
1BDC9E3C000
|
heap
|
page read and write
|
||
1BDCF9A0000
|
trusted library allocation
|
page read and write
|
||
2AE46F9B000
|
heap
|
page read and write
|
||
1BDC9C70000
|
heap
|
page read and write
|
||
1BDCA9CC000
|
heap
|
page read and write
|
||
1BDD1132000
|
heap
|
page read and write
|
||
1BDD1124000
|
heap
|
page read and write
|
||
1BDD1053000
|
heap
|
page read and write
|
||
1BDD118D000
|
heap
|
page read and write
|
||
1F816F02000
|
heap
|
page read and write
|
||
1BDCFD04000
|
heap
|
page read and write
|
||
3FF547F000
|
stack
|
page read and write
|
||
94FF4FF000
|
stack
|
page read and write
|
||
1E0F03A0000
|
remote allocation
|
page read and write
|
||
1BDCB511000
|
trusted library allocation
|
page read and write
|
||
1B7DE713000
|
heap
|
page read and write
|
||
1BDD1017000
|
heap
|
page read and write
|
||
24806550000
|
heap
|
page read and write
|
||
1BDD1164000
|
heap
|
page read and write
|
||
1BDCA802000
|
heap
|
page read and write
|
||
1BDD11B5000
|
heap
|
page read and write
|
||
1BDCF708000
|
trusted library allocation
|
page read and write
|
||
1BDD10F7000
|
heap
|
page read and write
|
||
1BDCF712000
|
trusted library allocation
|
page read and write
|
||
1BDD1081000
|
heap
|
page read and write
|
||
1BDD10FF000
|
heap
|
page read and write
|
||
1BDCF71E000
|
trusted library allocation
|
page read and write
|
||
1BDD11B8000
|
heap
|
page read and write
|
||
1F816EB3000
|
heap
|
page read and write
|
||
1BDCFC2D000
|
heap
|
page read and write
|
||
1BDD1055000
|
heap
|
page read and write
|
||
1BDCA9F7000
|
heap
|
page read and write
|
||
1BDD109D000
|
heap
|
page read and write
|
||
18B8A45C000
|
heap
|
page read and write
|
||
18B8A47C000
|
heap
|
page read and write
|
||
1BDCFC61000
|
heap
|
page read and write
|
||
1F816F13000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
18B8A502000
|
heap
|
page read and write
|
||
2240A63A000
|
heap
|
page read and write
|
||
1001000
|
unkown
|
page execute read
|
||
E760B7E000
|
stack
|
page read and write
|
||
1BDCFC69000
|
heap
|
page read and write
|
||
1F817615000
|
heap
|
page read and write
|
||
AEBD8FE000
|
stack
|
page read and write
|
||
1BDD10F1000
|
heap
|
page read and write
|
||
1F814470000
|
heap
|
page read and write
|
||
1BDCFC2D000
|
heap
|
page read and write
|
||
1BDD1083000
|
heap
|
page read and write
|
||
1B7DE702000
|
heap
|
page read and write
|
||
1BDCA9A8000
|
heap
|
page read and write
|
||
1763CA5A000
|
heap
|
page read and write
|
||
1BDCFC2D000
|
heap
|
page read and write
|
||
1009000
|
unkown
|
page readonly
|
||
E760D7F000
|
stack
|
page read and write
|
||
1BDCFD6D000
|
heap
|
page read and write
|
||
1BDCA9CC000
|
heap
|
page read and write
|
||
1F81C570000
|
remote allocation
|
page read and write
|
||
1BDD11BA000
|
heap
|
page read and write
|
||
1BDD102A000
|
heap
|
page read and write
|
||
E760BFF000
|
stack
|
page read and write
|
||
1BDD11E0000
|
heap
|
page read and write
|
||
1BDCFC2F000
|
heap
|
page read and write
|
||
1BDCFDF3000
|
heap
|
page read and write
|
||
1F81C64A000
|
heap
|
page read and write
|
||
1F817F50000
|
trusted library section
|
page readonly
|
||
1B9A465B000
|
heap
|
page read and write
|
||
100C000
|
unkown
|
page readonly
|
||
1BDCF71A000
|
trusted library allocation
|
page read and write
|
||
1F814628000
|
heap
|
page read and write
|
||
1BDCFDC4000
|
heap
|
page read and write
|
||
1BDCA900000
|
heap
|
page read and write
|
||
3FF567E000
|
stack
|
page read and write
|
||
2240A639000
|
heap
|
page read and write
|
||
1B7DE62A000
|
heap
|
page read and write
|
||
19775654000
|
heap
|
page read and write
|
||
1F81C62C000
|
heap
|
page read and write
|
||
7C4F2FF000
|
stack
|
page read and write
|
||
1F817718000
|
heap
|
page read and write
|
||
2AE4683C000
|
heap
|
page read and write
|
||
1763CA3C000
|
heap
|
page read and write
|
||
1BDD102E000
|
heap
|
page read and write
|
||
E760A7B000
|
stack
|
page read and write
|
||
1BDCF70C000
|
trusted library allocation
|
page read and write
|
||
15011FC000
|
stack
|
page read and write
|
||
1BDCFD83000
|
heap
|
page read and write
|
||
1763CA5C000
|
heap
|
page read and write
|
||
1F817713000
|
heap
|
page read and write
|
||
1BDD1090000
|
heap
|
page read and write
|
||
1BDC9F8E000
|
heap
|
page read and write
|
||
24806600000
|
heap
|
page read and write
|
||
254ED8E0000
|
heap
|
page read and write
|
||
1BDCA76F000
|
heap
|
page read and write
|
||
1BDCFC55000
|
heap
|
page read and write
|
||
1BDCFD02000
|
heap
|
page read and write
|
||
1B9A4666000
|
heap
|
page read and write
|
||
19775600000
|
heap
|
page read and write
|
||
E76117F000
|
stack
|
page read and write
|
||
2AE46916000
|
heap
|
page read and write
|
||
1BDD10EB000
|
heap
|
page read and write
|
||
2240A679000
|
heap
|
page read and write
|
||
1E0F0502000
|
heap
|
page read and write
|
||
1BDD114D000
|
heap
|
page read and write
|
||
19775520000
|
heap
|
page read and write
|
||
7C4EEFB000
|
stack
|
page read and write
|
||
15001FF000
|
stack
|
page read and write
|
||
1BDD1066000
|
heap
|
page read and write
|
||
E760DFF000
|
stack
|
page read and write
|
||
1BDCFD30000
|
heap
|
page read and write
|
||
B037979000
|
stack
|
page read and write
|
||
1BDCFC34000
|
heap
|
page read and write
|
||
1BDCFC34000
|
heap
|
page read and write
|
||
2AE46F8D000
|
heap
|
page read and write
|
||
1BDCFC02000
|
heap
|
page read and write
|
||
1BDD10CD000
|
heap
|
page read and write
|
||
1BDCA9FE000
|
heap
|
page read and write
|
||
AC097FD000
|
stack
|
page read and write
|
||
1BDCA7F7000
|
heap
|
page read and write
|
||
1BDD102D000
|
heap
|
page read and write
|
||
1BDCF700000
|
trusted library allocation
|
page read and write
|
||
1BDCF5C0000
|
trusted library allocation
|
page read and write
|
||
1B7DE680000
|
heap
|
page read and write
|
||
1BDD1116000
|
heap
|
page read and write
|
||
1BDCFD10000
|
heap
|
page read and write
|
||
1BDD105C000
|
heap
|
page read and write
|
||
1B7DEE02000
|
heap
|
page read and write
|
||
1BDD1025000
|
heap
|
page read and write
|
||
1BDCFDE7000
|
heap
|
page read and write
|
||
2240A613000
|
heap
|
page read and write
|
||
1B9A4674000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
1BDCFD87000
|
heap
|
page read and write
|
||
1BDCFD13000
|
heap
|
page read and write
|
||
1763CA5E000
|
heap
|
page read and write
|
||
1BDCFD1D000
|
heap
|
page read and write
|
||
1BDCFC2F000
|
heap
|
page read and write
|
||
1B7DEF12000
|
heap
|
page read and write
|
||
44FAD0C000
|
stack
|
page read and write
|
||
24806713000
|
heap
|
page read and write
|
||
1BDCB500000
|
trusted library section
|
page readonly
|
||
1BDD1090000
|
heap
|
page read and write
|
||
1BDCFD02000
|
heap
|
page read and write
|
||
1BDCA9CC000
|
heap
|
page read and write
|
||
1BDD10A2000
|
heap
|
page read and write
|
||
1BDCA9DA000
|
heap
|
page read and write
|
||
2AE46DF0000
|
remote allocation
|
page read and write
|
||
100C000
|
unkown
|
page readonly
|
||
1BDD10CF000
|
heap
|
page read and write
|
||
1F81C6B0000
|
heap
|
page read and write
|
||
1F81C2F0000
|
trusted library allocation
|
page read and write
|
||
1BDCFC2D000
|
heap
|
page read and write
|
||
2240A645000
|
heap
|
page read and write
|
||
2634CFF000
|
stack
|
page read and write
|
||
1F81C63D000
|
heap
|
page read and write
|
||
1BDCFC26000
|
heap
|
page read and write
|
||
1BDCB530000
|
trusted library allocation
|
page read and write
|
||
1500CFD000
|
stack
|
page read and write
|
||
1BDD1091000
|
heap
|
page read and write
|
||
1BDCF78C000
|
trusted library allocation
|
page read and write
|
||
1BDD116E000
|
heap
|
page read and write
|
||
1BDD0010000
|
heap
|
page read and write
|
||
30B8000
|
heap
|
page read and write
|
||
1BDCA9CC000
|
heap
|
page read and write
|
||
1F81C560000
|
trusted library allocation
|
page read and write
|
||
1F81C520000
|
trusted library allocation
|
page read and write
|
||
1BDCFC4D000
|
heap
|
page read and write
|
||
1BDCFC2F000
|
heap
|
page read and write
|
||
1F816DF0000
|
trusted library section
|
page read and write
|
||
1BDCF6E0000
|
trusted library allocation
|
page read and write
|
||
1BDCA7CA000
|
heap
|
page read and write
|
||
1BDC9E6E000
|
heap
|
page read and write
|
||
2240A629000
|
heap
|
page read and write
|
||
1BDD1157000
|
heap
|
page read and write
|
||
1BDCF710000
|
trusted library allocation
|
page read and write
|
||
1BDD1131000
|
heap
|
page read and write
|
||
1BDCFC56000
|
heap
|
page read and write
|
||
1B7DE410000
|
heap
|
page read and write
|
||
1BDCFC26000
|
heap
|
page read and write
|
||
1BDD1074000
|
heap
|
page read and write
|
||
2AE46E02000
|
heap
|
page read and write
|
||
1BDCFA60000
|
remote allocation
|
page read and write
|
||
1BDCFD1B000
|
heap
|
page read and write
|
||
1BDD1093000
|
heap
|
page read and write
|
||
254EDA13000
|
heap
|
page read and write
|
||
1BDCF550000
|
trusted library allocation
|
page read and write
|
||
1BDCFD4A000
|
heap
|
page read and write
|
||
1BDCAE80000
|
trusted library allocation
|
page read and write
|
||
1BDD1013000
|
heap
|
page read and write
|
||
1B9A4695000
|
heap
|
page read and write
|
||
1BDCF87C000
|
trusted library allocation
|
page read and write
|
||
2AE46F91000
|
heap
|
page read and write
|
||
1BDCF718000
|
trusted library allocation
|
page read and write
|
||
2AE46FAC000
|
heap
|
page read and write
|
||
1BDD101A000
|
heap
|
page read and write
|
||
1BDCF718000
|
trusted library allocation
|
page read and write
|
||
1BDD108D000
|
heap
|
page read and write
|
||
1BDCFC53000
|
heap
|
page read and write
|
||
2240A490000
|
heap
|
page read and write
|
||
254ED960000
|
trusted library allocation
|
page read and write
|
||
1BDCA80A000
|
heap
|
page read and write
|
||
18373FB000
|
stack
|
page read and write
|
||
1BDCF870000
|
trusted library allocation
|
page read and write
|
||
1BDCFC34000
|
heap
|
page read and write
|
||
1BDCA858000
|
heap
|
page read and write
|
||
24806602000
|
heap
|
page read and write
|
||
1BDCFDF3000
|
heap
|
page read and write
|
||
1BDCFD1A000
|
heap
|
page read and write
|
||
FBF000
|
stack
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
1BDCFC3C000
|
heap
|
page read and write
|
||
1BDCF765000
|
trusted library allocation
|
page read and write
|
||
1BDCB4D0000
|
trusted library section
|
page readonly
|
||
1BDCB540000
|
trusted library allocation
|
page read and write
|
||
1BDD10BE000
|
heap
|
page read and write
|
||
1BDD113D000
|
heap
|
page read and write
|
||
1BDCA9CC000
|
heap
|
page read and write
|
||
2634A7B000
|
stack
|
page read and write
|
||
1BDCFC2D000
|
heap
|
page read and write
|
||
1BDCF900000
|
trusted library allocation
|
page read and write
|
||
1BDD1028000
|
heap
|
page read and write
|
||
1BDCFDFE000
|
heap
|
page read and write
|
||
1BDCFDC5000
|
heap
|
page read and write
|
||
AEBDAFA000
|
stack
|
page read and write
|
||
1F81C418000
|
trusted library allocation
|
page read and write
|
||
1BDCFD02000
|
heap
|
page read and write
|
||
1763C9F0000
|
trusted library allocation
|
page read and write
|
||
1BDCFC2D000
|
heap
|
page read and write
|
||
1BDCFC34000
|
heap
|
page read and write
|
||
1BDCFC2F000
|
heap
|
page read and write
|
||
19775690000
|
heap
|
page read and write
|
||
254EDA52000
|
heap
|
page read and write
|
||
1BDCA460000
|
trusted library allocation
|
page read and write
|
||
1BDCFD03000
|
heap
|
page read and write
|
||
2240A642000
|
heap
|
page read and write
|
||
1BDD1020000
|
heap
|
page read and write
|
||
1BDCFDF4000
|
heap
|
page read and write
|
||
1BDCFC10000
|
heap
|
page read and write
|
||
150057A000
|
stack
|
page read and write
|
||
1BDD108A000
|
heap
|
page read and write
|
||
1BDCFC38000
|
heap
|
page read and write
|
||
1BDCFD02000
|
heap
|
page read and write
|
||
2AE46F9B000
|
heap
|
page read and write
|
||
1BDCA615000
|
heap
|
page read and write
|
||
1BDCF710000
|
trusted library allocation
|
page read and write
|
||
7C4ED7C000
|
stack
|
page read and write
|
||
1E0F0C02000
|
trusted library allocation
|
page read and write
|
||
2AE46DF0000
|
remote allocation
|
page read and write
|
||
B0373FC000
|
stack
|
page read and write
|
||
1BDCA85A000
|
heap
|
page read and write
|
||
1BDCFC2F000
|
heap
|
page read and write
|
||
B037A7E000
|
stack
|
page read and write
|
||
1F814480000
|
heap
|
page read and write
|
||
2AE46F91000
|
heap
|
page read and write
|
||
FD2887E000
|
stack
|
page read and write
|
||
1BDC9E76000
|
heap
|
page read and write
|
||
1836F5E000
|
stack
|
page read and write
|
||
1BDD1028000
|
heap
|
page read and write
|
||
1E0F0413000
|
heap
|
page read and write
|
||
1BDCA9AA000
|
heap
|
page read and write
|
||
1BDCFD21000
|
heap
|
page read and write
|
||
1BDCA72C000
|
heap
|
page read and write
|
||
1BDCFD10000
|
heap
|
page read and write
|
||
1BDCFC00000
|
heap
|
page read and write
|
||
1BDD1151000
|
heap
|
page read and write
|
||
263497B000
|
stack
|
page read and write
|
||
1F81C430000
|
trusted library allocation
|
page read and write
|
||
1BDCB4C0000
|
trusted library section
|
page readonly
|
||
1BDD1166000
|
heap
|
page read and write
|
||
1BDCFD2F000
|
heap
|
page read and write
|
||
1BDCFC26000
|
heap
|
page read and write
|
||
1763CA8E000
|
heap
|
page read and write
|
||
1E0F03A0000
|
remote allocation
|
page read and write
|
||
1BDCA9A8000
|
heap
|
page read and write
|
||
1BDD109E000
|
heap
|
page read and write
|
||
2480666F000
|
heap
|
page read and write
|
||
15009FE000
|
stack
|
page read and write
|
||
1BDCF6E0000
|
trusted library allocation
|
page read and write
|
||
1B7DE679000
|
heap
|
page read and write
|
||
1BDCA9CC000
|
heap
|
page read and write
|
||
2AE47400000
|
heap
|
page read and write
|
||
150077E000
|
stack
|
page read and write
|
||
1BDCFD10000
|
heap
|
page read and write
|
||
1BDCA9FD000
|
heap
|
page read and write
|
||
19775662000
|
heap
|
page read and write
|
||
1BDD10EC000
|
heap
|
page read and write
|
||
AC093FE000
|
stack
|
page read and write
|
||
1BDCA9FD000
|
heap
|
page read and write
|
||
1F81C570000
|
remote allocation
|
page read and write
|
||
1BDCFC26000
|
heap
|
page read and write
|
||
1BDC9F13000
|
heap
|
page read and write
|
||
1763CB08000
|
heap
|
page read and write
|
||
1BDD1113000
|
heap
|
page read and write
|
||
19775708000
|
heap
|
page read and write
|
||
1BDD1057000
|
heap
|
page read and write
|
||
1F816E00000
|
heap
|
page read and write
|
||
2240A660000
|
heap
|
page read and write
|
||
1BDCA71D000
|
heap
|
page read and write
|
||
1BDD1162000
|
heap
|
page read and write
|
||
2AE46F91000
|
heap
|
page read and write
|
||
18B8A413000
|
heap
|
page read and write
|
||
1BDD1188000
|
heap
|
page read and write
|
||
1BDD11D1000
|
heap
|
page read and write
|
||
24806665000
|
heap
|
page read and write
|
||
1E0F03A0000
|
remote allocation
|
page read and write
|
||
1BDD1015000
|
heap
|
page read and write
|
||
1BDCFDDF000
|
heap
|
page read and write
|
||
1BDD114F000
|
heap
|
page read and write
|
||
18B8A350000
|
heap
|
page read and write
|
||
1BDD1004000
|
heap
|
page read and write
|
||
1BDCFC61000
|
heap
|
page read and write
|
||
1BDD1117000
|
heap
|
page read and write
|
||
1BDCFDE1000
|
heap
|
page read and write
|
||
1BDCF870000
|
trusted library allocation
|
page read and write
|
||
1BDD10F7000
|
heap
|
page read and write
|
||
1F81C6E8000
|
heap
|
page read and write
|
||
1F81C700000
|
heap
|
page read and write
|
||
2AE46F91000
|
heap
|
page read and write
|
||
2240A646000
|
heap
|
page read and write
|
||
1F81C41E000
|
trusted library allocation
|
page read and write
|
||
19775713000
|
heap
|
page read and write
|
||
1BDCA9F3000
|
heap
|
page read and write
|
||
FD2897F000
|
stack
|
page read and write
|
||
18372FB000
|
stack
|
page read and write
|
||
1BDD10D9000
|
heap
|
page read and write
|
||
1BDCFDB1000
|
heap
|
page read and write
|
||
1BDD10B2000
|
heap
|
page read and write
|
||
2240A644000
|
heap
|
page read and write
|
||
1BDD1192000
|
heap
|
page read and write
|
||
1BDCFD4C000
|
heap
|
page read and write
|
||
2240A702000
|
heap
|
page read and write
|
||
94FF1FB000
|
stack
|
page read and write
|
||
183757E000
|
stack
|
page read and write
|
||
1F81C704000
|
heap
|
page read and write
|
||
E760E7E000
|
stack
|
page read and write
|
||
1BDD117B000
|
heap
|
page read and write
|
||
1BDCFDB1000
|
heap
|
page read and write
|
||
1BDCA9CC000
|
heap
|
page read and write
|
||
7ECA37E000
|
stack
|
page read and write
|
||
3FF51FA000
|
stack
|
page read and write
|
||
1BDCF874000
|
trusted library allocation
|
page read and write
|
||
1BDD117E000
|
heap
|
page read and write
|
||
1BDCF8E0000
|
trusted library allocation
|
page read and write
|
||
18B8A43C000
|
heap
|
page read and write
|
||
1BDCA95C000
|
heap
|
page read and write
|
||
1763CA77000
|
heap
|
page read and write
|
||
1BDCA94D000
|
heap
|
page read and write
|
||
1B7DE63E000
|
heap
|
page read and write
|
||
1BDD1141000
|
heap
|
page read and write
|
||
1F81C663000
|
heap
|
page read and write
|
||
1BDCFDF3000
|
heap
|
page read and write
|
||
1BDCFDCA000
|
heap
|
page read and write
|
||
2240A664000
|
heap
|
page read and write
|
||
1F81C6A5000
|
heap
|
page read and write
|
||
1BDD1153000
|
heap
|
page read and write
|
||
1BDD1195000
|
heap
|
page read and write
|
||
2AE47402000
|
heap
|
page read and write
|
||
1BDCA602000
|
heap
|
page read and write
|
||
2AE46902000
|
heap
|
page read and write
|
||
1BDD11BA000
|
heap
|
page read and write
|
||
1E0F043D000
|
heap
|
page read and write
|
||
1BDD112B000
|
heap
|
page read and write
|
||
1BDCFDF3000
|
heap
|
page read and write
|
||
B20000
|
remote allocation
|
page read and write
|
||
1BDCFDF3000
|
heap
|
page read and write
|
||
18B8A467000
|
heap
|
page read and write
|
||
7C4F0FE000
|
stack
|
page read and write
|
||
1BDD11AD000
|
heap
|
page read and write
|
||
1F81C70A000
|
heap
|
page read and write
|
||
1BDCF860000
|
trusted library allocation
|
page read and write
|
||
19775530000
|
heap
|
page read and write
|
||
1F816DB0000
|
heap
|
page read and write
|
||
1BDCA9F7000
|
heap
|
page read and write
|
||
1BDD115A000
|
heap
|
page read and write
|
||
1BDD10D3000
|
heap
|
page read and write
|
||
1BDCA9AD000
|
heap
|
page read and write
|
||
1BDCF722000
|
trusted library allocation
|
page read and write
|
||
1BDC9E65000
|
heap
|
page read and write
|
||
1BDD1114000
|
heap
|
page read and write
|
||
15006FF000
|
stack
|
page read and write
|
||
1BDCF71A000
|
trusted library allocation
|
page read and write
|
||
1E0F045C000
|
heap
|
page read and write
|
||
1BDC9CD0000
|
heap
|
page read and write
|
||
18B8A47B000
|
heap
|
page read and write
|
||
1BDCFC2C000
|
heap
|
page read and write
|
||
1F81C708000
|
heap
|
page read and write
|
||
2480663D000
|
heap
|
page read and write
|
||
1BDCFD15000
|
heap
|
page read and write
|
||
1BDCFC62000
|
heap
|
page read and write
|
||
1BDCA9FA000
|
heap
|
page read and write
|
||
7C4EFFD000
|
stack
|
page read and write
|
||
18B8A402000
|
heap
|
page read and write
|
||
1BDD1090000
|
heap
|
page read and write
|
||
1BDD11A0000
|
heap
|
page read and write
|
||
1BDCA986000
|
heap
|
page read and write
|
||
2AE46FAC000
|
heap
|
page read and write
|
||
1E0F0402000
|
heap
|
page read and write
|
||
44FB2FB000
|
stack
|
page read and write
|
||
1B7DE6C9000
|
heap
|
page read and write
|
||
1BDD11D2000
|
heap
|
page read and write
|
||
1BDD11CA000
|
heap
|
page read and write
|
||
1000000
|
unkown
|
page readonly
|
||
1763C960000
|
heap
|
page read and write
|
||
1BDD118B000
|
heap
|
page read and write
|
||
1BDD117D000
|
heap
|
page read and write
|
||
1BDCA9FD000
|
heap
|
page read and write
|
||
1BDD108D000
|
heap
|
page read and write
|
||
1BDCA9C7000
|
heap
|
page read and write
|
||
FD2857E000
|
stack
|
page read and write
|
||
1B9A468E000
|
heap
|
page read and write
|
||
1BDD1149000
|
heap
|
page read and write
|
||
18B8A400000
|
heap
|
page read and write
|
||
FD2847C000
|
stack
|
page read and write
|
||
1BDCA969000
|
heap
|
page read and write
|
||
1F817702000
|
heap
|
page read and write
|
||
1BDCFDF3000
|
heap
|
page read and write
|
||
1BDCFA60000
|
remote allocation
|
page read and write
|
||
7C4F1FD000
|
stack
|
page read and write
|
||
1BDD1100000
|
heap
|
page read and write
|
||
15002FB000
|
stack
|
page read and write
|
||
1BDCFC2D000
|
heap
|
page read and write
|
||
1BDCF8C0000
|
trusted library allocation
|
page read and write
|
||
1009000
|
unkown
|
page readonly
|
||
1B7DE6D2000
|
heap
|
page read and write
|
||
1BDD11D3000
|
heap
|
page read and write
|
||
1BDCFC61000
|
heap
|
page read and write
|
||
1BDD1090000
|
heap
|
page read and write
|
||
1BDCA9C7000
|
heap
|
page read and write
|
||
1BDD11AF000
|
heap
|
page read and write
|
||
1F81C6E1000
|
heap
|
page read and write
|
||
1BDD11DC000
|
heap
|
page read and write
|
||
15000FB000
|
stack
|
page read and write
|
||
1B9A467E000
|
heap
|
page read and write
|
||
1BDCF780000
|
trusted library allocation
|
page read and write
|
||
3FF54FF000
|
stack
|
page read and write
|
||
1BDD10B6000
|
heap
|
page read and write
|
||
1BDCF70C000
|
trusted library allocation
|
page read and write
|
||
1BDD100C000
|
heap
|
page read and write
|
||
1BDCF70E000
|
trusted library allocation
|
page read and write
|
||
1BDCFD83000
|
heap
|
page read and write
|
||
19775613000
|
heap
|
page read and write
|
||
1009000
|
unkown
|
page readonly
|
||
2AE46F81000
|
heap
|
page read and write
|
||
1BDD1155000
|
heap
|
page read and write
|
||
1F8182B0000
|
trusted library allocation
|
page read and write
|
||
1F81C410000
|
trusted library allocation
|
page read and write
|
||
1BDCFD10000
|
heap
|
page read and write
|
||
AC098FF000
|
stack
|
page read and write
|
||
2AE468E1000
|
heap
|
page read and write
|
||
1F814641000
|
heap
|
page read and write
|
||
1BDCA9F1000
|
heap
|
page read and write
|
||
1BDCA9FB000
|
heap
|
page read and write
|
||
1BDD103D000
|
heap
|
page read and write
|
||
2AE468EA000
|
heap
|
page read and write
|
||
1BDCFC55000
|
heap
|
page read and write
|
||
1BDCF714000
|
trusted library allocation
|
page read and write
|
||
1BDD10F4000
|
heap
|
page read and write
|
||
1BDCFDA0000
|
heap
|
page read and write
|
||
1BDCFD3C000
|
heap
|
page read and write
|
||
1BDD11D3000
|
heap
|
page read and write
|
||
1BDCFDAD000
|
heap
|
page read and write
|
||
1BDCFC39000
|
heap
|
page read and write
|
||
1BDCFC26000
|
heap
|
page read and write
|
||
1BDCFDC0000
|
heap
|
page read and write
|
||
1BDCA9C7000
|
heap
|
page read and write
|
||
1BDCFDF3000
|
heap
|
page read and write
|
||
1BDC9C60000
|
heap
|
page read and write
|
||
1F814713000
|
heap
|
page read and write
|
||
1B9A4560000
|
heap
|
page read and write
|
||
1001000
|
unkown
|
page execute read
|
||
1BDD107D000
|
heap
|
page read and write
|
||
1BDCFC69000
|
heap
|
page read and write
|
||
19775E02000
|
trusted library allocation
|
page read and write
|
||
1BDCFD10000
|
heap
|
page read and write
|
||
1BDD102F000
|
heap
|
page read and write
|
||
1BDCA7E1000
|
heap
|
page read and write
|
||
AEBDBF7000
|
stack
|
page read and write
|
||
1BDCFD10000
|
heap
|
page read and write
|
||
1BDCA7C7000
|
heap
|
page read and write
|
||
1BDCA9AA000
|
heap
|
page read and write
|
||
2240AE02000
|
trusted library allocation
|
page read and write
|
||
1E0F02E0000
|
heap
|
page read and write
|
||
1836FDE000
|
stack
|
page read and write
|
There are 1248 hidden memdumps, click here to show them.