IOC Report
cnewton doc 08.11.2022.doc

loading gif

Files

File Path
Type
Category
Malicious
cnewton doc 08.11.2022.doc
Zip archive data, at least v2.0 to extract
initial sample
malicious
C:\Users\user\AppData\Local\Temp\y5A7.tmp.dll
HTML document, ASCII text
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\cnewton doc 08.11.2022.doc.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:50 2022, mtime=Fri Aug 12 00:49:52 2022, atime=Fri Aug 12 00:49:44 2022, length=2248355, window=hide
dropped
malicious
C:\Users\user\AppData\Local\Temp\y745B.tmp.dll
HTML document, ASCII text
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WINWORD.EXE_36a787bf8896eba6a9e85f1761f2a7eec6686b_5f94c319_0fad4122\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A7D.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Aug 12 01:50:36 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER37FB.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER39C1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\AE1D8E82-09A3-4CE3-BB95-E3559641C73B
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\-f[1].htm
HTML document, ASCII text
downloaded
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\~$ewton doc 08.11.2022.doc
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\-f[1].htm
HTML document, ASCII text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\cnewton doc 08.11.2022.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:54 2022, mtime=Tue Mar 8 15:45:54 2022, atime=Fri Aug 12 00:35:14 2022, length=2248355, window=hide
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1220 -s 4160
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1220 -s 4152
malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious

URLs

Name
IP
Malicious
http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f
45.8.146.139
malicious
https://outlook.office.com2006
unknown
https://shell.suite.office.com:1443
unknown
http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f71USERNAME=userUSERPROFILE=C:
unknown
https://autodiscover-s.outlook.com/
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://login.windows.net/common/oauth2/authorizetenk%M
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://login.windows.net/common/oauth2/authorizeaz&L
unknown
https://login.windows.net/common/oauth2/authorizePh
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://login.windows.net/common/oauth2/authorizese
unknown
http://purl.oclc.org/ooxml/drawingml/diagram-E0
unknown
https://login.windows.net/common/oauth2/authorizeAx
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=ImmersiveApp
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://clients.config.office.net/user/v1.0/android/policies_J
unknown
http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-fe
unknown
http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-fn
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
http://weather.service.msn.com/data.aspxBD
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile5QlO
unknown
http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-fOOC:
unknown
https://login.windows.net/common/oauth2/authorize#
unknown
https://my.microsoftpersonalcontent.com
unknown
https://login.windows-ppe.net/common/oauth2/authorizewM%M
unknown
https://login.windows.net/common/oauth2/authorize$
unknown
https://store.office.cn/addinstemplate
unknown
https://api.office.net.&
unknown
https://api.cortana.aiU
unknown
https://login.windows.net/common/oauth2/authorizeox
unknown
https://messaging.engagement.office.com/
unknown
https://onedrive.live.com/embed?i
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://login.windows.net/common/oauth2/authorize/2
unknown
https://www.odwebp.svc.ms
unknown
https://api.office.netA&.H
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://api.powerbi.com/beta/myorg/importshG&M
unknown
https://outlook.office.comBr
unknown
https://login.windows.net/common/oauth2/authorizerdml
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://api.cortana.aiL
unknown
https://onedrive.live.comew
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebookf
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asksCP
unknown
https://outlook.office365.com/autodiscover/autodiscover.
unknown
https://substrate.office.comP
unknown
https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2Area
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://login.windows.net/common/oauth2/authorizeOh
unknown
https://api.diagnostics.office.comom
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://substrate.office.comW
unknown
https://wus2.contentsync.
unknown
https://globaldisco.crm.dynamics.comom
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://login.windows.net/common/oauth2/authorizevB&L
unknown
https://login.windows.net/common/oauth2/authorizeg
unknown
https://login.windows.net/common/oauth2/authorize~h
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://login.windows.net/common/oauth2/authorizeN=
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://login.windows.net/common/oauth2/authorizeQ
unknown
https://www.odwebp.svc.msom
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://login.windows.net/common/oauth2/authorizeCache
unknown
https://login.windows.net/common/oauth2/authorizeR
unknown
https://login.windows.net/common/oauth2/authorizek27L
unknown
https://login.windows.net/common/oauth2/authorizeS
unknown
https://powerlift.acompli.netPrqL
unknown
https://lifecycle.office.comov
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://outlook.office.com/
unknown
https://login.windows.net/common/oauth2/authorize7ehM
unknown
https://login.windows.net/common/oauth2/authorizeM
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://dataservice.o365filtering.comVb
unknown
https://login.windows.net/common/oauth2/authorize=
unknown
https://login.windows.net/common/oauth2/authorize0
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://analysis.windows.net/powerbi/api/
unknown
There are 91 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.8.146.139
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
{v8
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
|v8
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
az8
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
|c8
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\1F604
1F604
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
ProgramId
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
FileId
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
LowerCaseLongPath
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
LongPathHash
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
Name
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
Publisher
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
Version
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
BinFileVersion
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
BinaryType
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
ProductName
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
ProductVersion
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
LinkDate
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
BinProductVersion
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
Size
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
Language
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
IsPeFile
\REGISTRY\A\{50dbf55d-f1e7-f498-6062-44dfbbd3c1f9}\Root\InventoryApplicationFile\winword.exe|597535ad
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800453F4626F
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
)l0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
/m0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
#o0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\666DE
666DE
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 90 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
E0DF000
unkown
page read and write
93D7000
unkown
page read and write
10166000
unkown
page read and write
92E3000
unkown
page read and write
92BD000
unkown
page read and write
65B99000
unkown
page readonly
30D0000
unkown
page read and write
FB79000
unkown
page read and write
1BA3785F000
heap
page read and write
93B9000
unkown
page read and write
FFE51000
unkown
page execute read
1BA37857000
heap
page read and write
12350000
unkown
page read and write
92B5000
unkown
page read and write
79F98FB000
stack
page read and write
1011B000
unkown
page read and write
1BA323D9000
heap
page read and write
9323000
unkown
page read and write
1BA37724000
heap
page read and write
1BA37825000
heap
page read and write
9127000
unkown
page read and write
1240A000
unkown
page read and write
DC30000
unkown
page read and write
1BA370AA000
trusted library allocation
page read and write
10FE000
heap
page read and write
2DA155FE000
heap
page read and write
9295000
unkown
page read and write
11D0000
unkown
page readonly
9409000
unkown
page read and write
93AF000
unkown
page read and write
1430000
unkown
page readonly
229C5700000
heap
page read and write
9345000
unkown
page read and write
14560000
unkown
page read and write
92E9000
unkown
page read and write
1BA32D30000
trusted library allocation
page read and write
944F000
unkown
page read and write
123F2000
unkown
page read and write
FFE51000
unkown
page execute read
911B000
unkown
page read and write
F6D000
stack
page read and write
933D000
unkown
page read and write
266FF300000
heap
page read and write
93AD000
unkown
page read and write
1BA372B0000
trusted library allocation
page read and write
B0EF000
unkown
page read and write
92DF000
unkown
page read and write
1BA323C9000
heap
page read and write
93FD000
unkown
page read and write
17A7CA44000
heap
page read and write
8DDE33B000
stack
page read and write
1BA37634000
heap
page read and write
144D0000
unkown
page read and write
1C82C3C0000
trusted library section
page readonly
13FE000
unkown
page read and write
9463000
unkown
page read and write
944B000
unkown
page read and write
90F7000
unkown
page read and write
9121000
unkown
page read and write
1C830900000
trusted library allocation
page read and write
14838000
unkown
page read and write
1017F000
unkown
page read and write
93FD000
unkown
page read and write
D65E000
unkown
page read and write
1BA3765C000
heap
page read and write
93C1000
unkown
page read and write
A0B7000
unkown
page read and write
13CFB000
unkown
page read and write
1BA3793B000
heap
page read and write
A508C79000
stack
page read and write
1C8308E1000
trusted library allocation
page read and write
1C82B490000
heap
page read and write
11C8000
unkown
page read and write
4BA377D000
stack
page read and write
1BA377E6000
heap
page read and write
1017A000
unkown
page read and write
910B000
unkown
page read and write
1BA3786D000
heap
page read and write
9429000
unkown
page read and write
12521000
unkown
page read and write
B420000
unkown
page read and write
9127000
unkown
page read and write
BDCD000
unkown
page read and write
1BA323C9000
heap
page read and write
13CFF000
unkown
page read and write
9407000
unkown
page read and write
9339000
unkown
page read and write
CD69000
unkown
page read and write
934D000
unkown
page read and write
1BA3782E000
heap
page read and write
CFFE000
unkown
page read and write
1C830C49000
heap
page read and write
146A0000
unkown
page read and write
1BA3784D000
heap
page read and write
935B000
unkown
page read and write
1BA37825000
heap
page read and write
1BA37742000
heap
page read and write
93CF000
unkown
page read and write
D3E7000
unkown
page read and write
12528000
unkown
page read and write
C2B27B000
stack
page read and write
1BA378E0000
heap
page read and write
1310FF60000
trusted library allocation
page read and write
1BA377E1000
heap
page read and write
1BA377DD000
heap
page read and write
944D000
unkown
page read and write
1BA371C0000
trusted library allocation
page read and write
9335000
unkown
page read and write
92B5000
unkown
page read and write
DD70000
unkown
page read and write
DD36000
unkown
page execute and read and write
1BA37290000
trusted library allocation
page read and write
1C034908000
heap
page read and write
1C82B489000
heap
page read and write
935F000
unkown
page read and write
10193000
unkown
page read and write
9423000
unkown
page read and write
2DA15360000
heap
page read and write
B44B000
unkown
page read and write
14190000
unkown
page read and write
A0A1000
unkown
page read and write
DA37000
unkown
page read and write
1BA37700000
heap
page read and write
1A30000
unkown
page readonly
1BA3774F000
heap
page read and write
1C830A20000
remote allocation
page read and write
1BA37074000
trusted library allocation
page read and write
FFE53000
unkown
page execute read
D407000
unkown
page read and write
93AB000
unkown
page read and write
FCC3000
unkown
page read and write
D3A5000
unkown
page read and write
9433000
unkown
page read and write
B496000
unkown
page read and write
D8C0000
unkown
page readonly
13110000000
heap
page read and write
936D000
unkown
page read and write
1BA3793E000
heap
page read and write
B1AD000
unkown
page read and write
93A9000
unkown
page read and write
1BA37661000
heap
page read and write
D178000
unkown
page read and write
1BA37869000
heap
page read and write
C2ADF7000
stack
page read and write
101E8000
unkown
page read and write
261D5380000
heap
page read and write
12528000
unkown
page read and write
9105000
unkown
page read and write
1F830393000
heap
page read and write
932B000
unkown
page read and write
101B1000
unkown
page read and write
940B000
unkown
page read and write
1BA3782C000
heap
page read and write
1BA31FCC000
heap
page read and write
16E88C59000
heap
page read and write
1BA323D5000
heap
page read and write
D921000
unkown
page read and write
25A86202000
trusted library allocation
page read and write
CABC000
unkown
page read and write
13CE0000
unkown
page read and write
1BA31813000
heap
page read and write
10C0000
unkown
page readonly
1BA377F2000
heap
page read and write
1BA374C0000
trusted library allocation
page read and write
93EB000
unkown
page read and write
17A7CA69000
heap
page read and write
12435000
unkown
page read and write
936F000
unkown
page read and write
1BA3785D000
heap
page read and write
DD70000
unkown
page read and write
1BA37800000
heap
page read and write
9467000
unkown
page read and write
93AF000
unkown
page read and write
90FB000
unkown
page read and write
10198000
unkown
page read and write
A5097F5000
stack
page read and write
9419000
unkown
page read and write
92B9000
unkown
page read and write
1BA37879000
heap
page read and write
1C03484F000
heap
page read and write
227ED7E000
unkown
page read and write
9345000
unkown
page read and write
16E88C61000
heap
page read and write
B097000
unkown
page read and write
1BE61281000
heap
page read and write
9439000
unkown
page read and write
9359000
unkown
page read and write
1BA37060000
trusted library allocation
page read and write
1BA37626000
heap
page read and write
18932CE5000
heap
page read and write
FFE5D000
unkown
page execute read
B1AD000
unkown
page read and write
9383000
unkown
page read and write
1F82FA70000
heap
page read and write
1BA371D4000
trusted library allocation
page read and write
942D000
unkown
page read and write
C2B17E000
stack
page read and write
B50D000
unkown
page read and write
1BA377C8000
heap
page read and write
12D10000
unkown
page readonly
E0DF000
unkown
page read and write
25A85C50000
heap
page read and write
D98F000
unkown
page read and write
1470000
unkown
page readonly
CF73CF7000
stack
page read and write
1BA37634000
heap
page read and write
1BA3774F000
heap
page read and write
1F830322000
heap
page read and write
93ED000
unkown
page read and write
B086000
unkown
page read and write
1BA379CB000
heap
page read and write
1410000
unkown
page readonly
9113000
unkown
page read and write
90D5000
unkown
page read and write
10579000
unkown
page read and write
1BA379A6000
heap
page read and write
1C034858000
heap
page read and write
B0A0000
unkown
page read and write
11C4000
unkown
page read and write
1BA32E60000
trusted library section
page readonly
227E67C000
stack
page read and write
3153000
unkown
page read and write
FC80000
unkown
page read and write
1F830388000
heap
page read and write
943D000
unkown
page read and write
93E5000
unkown
page read and write
12375000
unkown
page read and write
90FD000
unkown
page read and write
1BA3183C000
heap
page read and write
1BA371DC000
trusted library allocation
page read and write
9113000
unkown
page read and write
18932CC6000
heap
page read and write
1BA3706E000
trusted library allocation
page read and write
101A2000
unkown
page read and write
1C82B48B000
heap
page read and write
1C034877000
heap
page read and write
1F830300000
heap
page read and write
92DF000
unkown
page read and write
16E88C3C000
heap
page read and write
146E0000
unkown
page read and write
C2B07A000
stack
page read and write
1BA31D90000
trusted library allocation
page read and write
D3A5000
unkown
page read and write
159E000
unkown
page read and write
D93A000
unkown
page read and write
147E8000
unkown
page read and write
92E5000
unkown
page read and write
1C034850000
heap
page read and write
CF7387C000
stack
page read and write
1BA37669000
heap
page read and write
9291000
unkown
page read and write
261D543B000
heap
page read and write
CFFE000
unkown
page read and write
92E1000
unkown
page read and write
FFE27000
unkown
page execute read
9431000
unkown
page read and write
DEBC000
unkown
page read and write
1BA371C0000
trusted library allocation
page read and write
382597C000
stack
page read and write
9117000
unkown
page read and write
FFE31000
unkown
page execute read
93B5000
unkown
page read and write
1BA377F9000
heap
page read and write
B0A0000
unkown
page read and write
11C8000
heap
page read and write
93EB000
unkown
page read and write
1F830382000
heap
page read and write
F6D000
stack
page read and write
936B000
unkown
page read and write
11A1000
heap
page read and write
D931000
unkown
page read and write
141A0000
unkown
page read and write
9423000
unkown
page read and write
9057000
unkown
page read and write
1BA319C2000
heap
page read and write
93FB000
unkown
page read and write
1F8303A3000
heap
page read and write
A139000
unkown
page read and write
1BA378A6000
heap
page read and write
92DB000
unkown
page read and write
17A7CA62000
heap
page read and write
9413000
unkown
page read and write
9409000
unkown
page read and write
10120000
unkown
page read and write
1BA37869000
heap
page read and write
DC2A000
unkown
page read and write
14156000
unkown
page read and write
9115000
unkown
page read and write
1BA379E4000
heap
page read and write
1BA37060000
trusted library allocation
page read and write
101A2000
unkown
page read and write
D13D000
unkown
page read and write
1BA38010000
heap
page read and write
CEFE000
unkown
page read and write
DDBC000
unkown
page read and write
1BA3779B000
heap
page read and write
79F967E000
stack
page read and write
1C82C400000
trusted library section
page readonly
229C4F13000
heap
page read and write
CEAD000
unkown
page read and write
D277000
unkown
page read and write
1BA378D0000
heap
page read and write
DABC000
unkown
page read and write
B0D8000
unkown
page read and write
1BA37834000
heap
page read and write
12B40000
unkown
page readonly
14151000
unkown
page read and write
101A7000
unkown
page read and write
940B000
unkown
page read and write
B837AF7000
stack
page read and write
93C9000
unkown
page read and write
1BA371D4000
trusted library allocation
page read and write
1BA37865000
heap
page read and write
1AE09EB0000
heap
page read and write
946F000
unkown
page read and write
141D9000
unkown
page read and write
1417B000
unkown
page read and write
14BE0000
unkown
page read and write
D27F000
unkown
page read and write
1BA37078000
trusted library allocation
page read and write
9369000
unkown
page read and write
1BA3785D000
heap
page read and write
1F82FAE2000
heap
page read and write
DAD1000
unkown
page read and write
38251FB000
stack
page read and write
945B000
unkown
page read and write
93F5000
unkown
page read and write
FFE5C000
unkown
page readonly
E1CB000
unkown
page read and write
10175000
unkown
page read and write
1F830379000
heap
page read and write
1C82C3E0000
trusted library section
page readonly
9421000
unkown
page read and write
C2B4FF000
stack
page read and write
101B6000
unkown
page read and write
9445000
unkown
page read and write
10148000
unkown
page read and write
942D000
unkown
page read and write
123B5000
unkown
page read and write
13BE000
unkown
page read and write
1BA378F1000
heap
page read and write
1BA378E0000
heap
page read and write
E1C1000
unkown
page read and write
9327000
unkown
page read and write
92D7000
unkown
page read and write
1BA377B7000
heap
page read and write
9113000
unkown
page read and write
1F82F890000
heap
page read and write
1BA3186F000
heap
page read and write
9105000
unkown
page read and write
141D9000
unkown
page read and write
1BA37831000
heap
page read and write
945F000
unkown
page read and write
1C82B3F3000
trusted library allocation
page read and write
DAD1000
unkown
page read and write
229C4E24000
heap
page read and write
93DB000
unkown
page read and write
A159000
unkown
page read and write
DD60000
unkown
page read and write
9401000
unkown
page read and write
1BA379BA000
heap
page read and write
E1AF000
unkown
page read and write
9363000
unkown
page read and write
1BA37060000
trusted library allocation
page read and write
93C9000
unkown
page read and write
9333000
unkown
page read and write
93AD000
unkown
page read and write
18932CC5000
heap
page read and write
13FE000
unkown
page read and write
932D000
unkown
page read and write
144D0000
unkown
page read and write
C9BC000
unkown
page read and write
1BA323F1000
heap
page read and write
1BA3790B000
heap
page read and write
1BA37626000
heap
page read and write
1BA377EA000
heap
page read and write
1BE61110000
heap
page read and write
D349000
unkown
page read and write
312C000
unkown
page read and write
BDD0000
heap
page read and write
9393000
unkown
page read and write
9115000
unkown
page read and write
942D000
unkown
page read and write
9337000
unkown
page read and write
1BA37074000
trusted library allocation
page read and write
13CB0000
unkown
page read and write
9109000
unkown
page read and write
146E0000
unkown
page read and write
1C82C760000
trusted library allocation
page read and write
141A5000
unkown
page read and write
9473000
unkown
page read and write
936F000
unkown
page read and write
92E9000
unkown
page read and write
9347000
unkown
page read and write
13014000
unkown
page read and write
912B000
unkown
page read and write
D927000
unkown
page read and write
944B000
unkown
page read and write
E10000
unkown
page read and write
65941000
unkown
page execute read
17A7CA02000
heap
page read and write
1450000
unkown
page readonly
93A3000
unkown
page read and write
10B4A000
unkown
page read and write
1BA378E1000
heap
page read and write
F6D000
stack
page read and write
16E88C87000
heap
page read and write
92B1000
unkown
page read and write
93D1000
unkown
page read and write
17A7CA27000
heap
page read and write
CF73DFE000
stack
page read and write
1BA37065000
trusted library allocation
page read and write
1252B000
unkown
page read and write
1BA37743000
heap
page read and write
3150000
heap
page read and write
1BA37825000
heap
page read and write
11A1000
unkown
page read and write
F6F000
stack
page read and write
10189000
unkown
page read and write
1BA37909000
heap
page read and write
93EB000
unkown
page read and write
1BA3762D000
heap
page read and write
1243B000
unkown
page read and write
A20E000
unkown
page read and write
939B000
unkown
page read and write
1BA37600000
heap
page read and write
B0C6000
unkown
page read and write
1BA3220A000
heap
page read and write
D42A000
unkown
page read and write
17A7CA60000
heap
page read and write
B4FB000
unkown
page read and write
935D000
unkown
page read and write
1BA323D3000
heap
page read and write
BDCD000
unkown
page read and write
10F4B000
unkown
page read and write
942F000
unkown
page read and write
93BB000
unkown
page read and write
942B000
unkown
page read and write
25A85C6F000
heap
page read and write
112A000
heap
page read and write
1C82C410000
trusted library section
page readonly
10166000
unkown
page read and write
1BA37742000
heap
page read and write
D7A7000
heap
page read and write
10DB000
heap
page read and write
93F1000
unkown
page read and write
1BA377E8000
heap
page read and write
140D8000
unkown
page read and write
93EF000
unkown
page read and write
1BA3777F000
heap
page read and write
17A7CA64000
heap
page read and write
1BA377F9000
heap
page read and write
F81DD79000
stack
page read and write
1BA378E0000
heap
page read and write
92B5000
unkown
page read and write
2DA155B0000
heap
page read and write
100A3000
unkown
page read and write
10152000
unkown
page read and write
DC20000
unkown
page read and write
18932BE5000
heap
page read and write
B095000
unkown
page read and write
942B000
unkown
page read and write
93B3000
unkown
page read and write
2DA154A0000
heap
page read and write
A159000
unkown
page read and write
1019D000
unkown
page read and write
FFE5D000
unkown
page execute read
DDBC000
unkown
page read and write
1BA323D1000
heap
page read and write
1C830C3C000
heap
page read and write
DCB9000
unkown
page read and write
CB54D7D000
stack
page read and write
93E1000
unkown
page read and write
9111000
unkown
page read and write
17A7CA48000
heap
page read and write
266FF302000
heap
page read and write
9399000
unkown
page read and write
90AB000
unkown
page read and write
93BF000
unkown
page read and write
93FF000
unkown
page read and write
1C8309F0000
trusted library allocation
page read and write
E1C6000
unkown
page read and write
E10000
unkown
page read and write
9405000
unkown
page read and write
911F000
unkown
page read and write
D934000
unkown
page read and write
123F7000
unkown
page read and write
146F0000
unkown
page read and write
9351000
unkown
page read and write
1BA37082000
trusted library allocation
page read and write
1F830120000
remote allocation
page read and write
946F000
unkown
page read and write
92CD000
unkown
page read and write
1BA323C2000
heap
page read and write
E8A000
stack
page read and write
1F82FA4E000
heap
page read and write
A45C000
unkown
page read and write
100E4000
unkown
page read and write
1480000
unkown
page readonly
9405000
unkown
page read and write
911F000
unkown
page read and write
946D000
unkown
page read and write
DD39000
unkown
page read and write
101AC000
unkown
page read and write
938D000
unkown
page read and write
9333000
unkown
page read and write
1490000
unkown
page read and write
1C034859000
heap
page read and write
9353000
unkown
page read and write
F66000
stack
page read and write
A5093FA000
stack
page read and write
CEAD000
unkown
page read and write
1BA377B7000
heap
page read and write
25A85C76000
heap
page read and write
C9BC000
unkown
page read and write
1012F000
unkown
page read and write
B0C4000
unkown
page read and write
1BE6123C000
heap
page read and write
CB5507E000
stack
page read and write
9461000
unkown
page read and write
B4FB000
unkown
page read and write
D69E000
unkown
page read and write
93B1000
unkown
page read and write
B50D000
unkown
page read and write
1C830CF9000
heap
page read and write
1C830A10000
trusted library allocation
page read and write
FFE46000
unkown
page execute read
9393000
unkown
page read and write
12531000
unkown
page read and write
D3E7000
unkown
page read and write
10157000
unkown
page read and write
148CA000
unkown
page read and write
C2B2FF000
stack
page read and write
1BA370EC000
trusted library allocation
page read and write
2DA157B0000
trusted library allocation
page read and write
1BA37070000
trusted library allocation
page read and write
65940000
unkown
page readonly
13D0E000
unkown
page read and write
92B7000
unkown
page read and write
14900000
unkown
page read and write
1AE0A002000
heap
page read and write
912D000
unkown
page read and write
D934000
unkown
page read and write
1BA3762F000
heap
page read and write
940D000
unkown
page read and write
93B1000
unkown
page read and write
93DD000
unkown
page read and write
18932CE4000
heap
page read and write
1311006C000
heap
page read and write
938B000
unkown
page read and write
B83749B000
stack
page read and write
C87E000
unkown
page read and write
9101000
unkown
page read and write
DB91000
unkown
page read and write
FFE58000
unkown
page execute read
E010000
unkown
page read and write
9375000
unkown
page read and write
10C0000
unkown
page readonly
933D000
unkown
page read and write
13D6C000
unkown
page read and write
11C8000
heap
page read and write
13C60000
unkown
page read and write
911D000
unkown
page read and write
CB5457B000
stack
page read and write
B0C6000
unkown
page read and write
D281000
unkown
page read and write
1C82B360000
trusted library allocation
page read and write
1BA379A3000
heap
page read and write
9467000
unkown
page read and write
93BD000
unkown
page read and write
17A7CA6C000
heap
page read and write
2F535FF000
stack
page read and write
9395000
unkown
page read and write
B070000
unkown
page read and write
9475000
unkown
page read and write
93CD000
unkown
page read and write
1BA370AA000
trusted library allocation
page read and write
BD6E000
unkown
page read and write
17A7C950000
trusted library allocation
page read and write
932B000
unkown
page read and write
1BA373F3000
trusted library allocation
page read and write
F66000
stack
page read and write
CC20000
unkown
page read and write
DC27000
unkown
page read and write
1BA3776E000
heap
page read and write
1BA319EB000
heap
page read and write
93C1000
unkown
page read and write
11E0000
heap
page read and write
9415000
unkown
page read and write
11CD000
heap
page read and write
A09B000
unkown
page read and write
1BA378B7000
heap
page read and write
1BA37960000
heap
page read and write
BDD0000
heap
page read and write
25A85C78000
heap
page read and write
1BA37070000
trusted library allocation
page read and write
9421000
unkown
page read and write
9327000
unkown
page read and write
1BA37941000
heap
page read and write
1016B000
unkown
page read and write
2DA16330000
trusted library allocation
page read and write
1158000
unkown
page read and write
14BD0000
unkown
page read and write
14500000
unkown
page read and write
941D000
unkown
page read and write
92BB000
unkown
page read and write
93B5000
unkown
page read and write
92E1000
unkown
page read and write
946D000
unkown
page read and write
9365000
unkown
page read and write
1C830C2C000
heap
page read and write
79F93DB000
stack
page read and write
18932CB6000
heap
page read and write
2DA155C0000
heap
page read and write
D7A0000
heap
page read and write
1BA37070000
trusted library allocation
page read and write
B486000
unkown
page read and write
65B96000
unkown
page write copy
932D000
unkown
page read and write
B420000
unkown
page read and write
1BE61260000
heap
page read and write
BA70000
unkown
page read and write
937F000
unkown
page read and write
93FB000
unkown
page read and write
93B7000
unkown
page read and write
2DA155FE000
heap
page read and write
147E8000
unkown
page read and write
1C831000000
heap
page read and write
A156000
unkown
page read and write
101D9000
unkown
page read and write
1BA37972000
heap
page read and write
B0DE000
unkown
page read and write
312C000
unkown
page read and write
FFE26000
unkown
page readonly
1487E000
unkown
page read and write
13110113000
heap
page read and write
933D000
unkown
page read and write
9057000
unkown
page read and write
93E7000
unkown
page read and write
1BA371C0000
trusted library allocation
page read and write
911F000
unkown
page read and write
1AE0A6A0000
remote allocation
page read and write
9101000
unkown
page read and write
9415000
unkown
page read and write
1BA323FD000
heap
page read and write
9421000
unkown
page read and write
14820000
unkown
page read and write
10072000
unkown
page read and write
A09E000
unkown
page read and write
1BA37230000
trusted library allocation
page read and write
1BA3198E000
heap
page read and write
C2B3FF000
stack
page read and write
1BA37827000
heap
page read and write
92E5000
unkown
page read and write
A508F7E000
stack
page read and write
1BA3773E000
heap
page read and write
DA5C000
unkown
page read and write
945F000
unkown
page read and write
17A7CA00000
heap
page read and write
1430000
unkown
page readonly
1BA323A5000
heap
page read and write
93C3000
unkown
page read and write
14D20000
unkown
page read and write
123A7000
unkown
page read and write
14166000
unkown
page read and write
9375000
unkown
page read and write
E0F1000
unkown
page read and write
1BA37634000
heap
page read and write
1BA3784D000
heap
page read and write
9435000
unkown
page read and write
13D6E000
unkown
page read and write
1190000
heap
page read and write
1BA37626000
heap
page read and write
4BA367F000
stack
page read and write
1F82FAD5000
heap
page read and write
1BA37742000
heap
page read and write
1C8308C0000
trusted library allocation
page read and write
911D000
unkown
page read and write
1BA377FA000
heap
page read and write
1BA37779000
heap
page read and write
928F000
unkown
page read and write
9365000
unkown
page read and write
25A85C02000
heap
page read and write
1F82FAEB000
heap
page read and write
93C9000
unkown
page read and write
1070000
unkown
page read and write
932D000
unkown
page read and write
2E50000
unkown
page readonly
B486000
unkown
page read and write
18932CA0000
heap
page read and write
92C1000
unkown
page read and write
D7A0000
heap
page read and write
1BA37656000
heap
page read and write
3150000
heap
page read and write
9119000
unkown
page read and write
92D9000
unkown
page read and write
10175000
unkown
page read and write
9355000
unkown
page read and write
B5A4000
unkown
page read and write
92B1000
unkown
page read and write
D65E000
unkown
page read and write
928F000
unkown
page read and write
90F9000
unkown
page read and write
368A0000
unkown
page execute read
1BA371D0000
trusted library allocation
page read and write
FB66000
unkown
page read and write
148FB000
unkown
page read and write
101E3000
unkown
page read and write
A45C000
unkown
page read and write
9381000
unkown
page read and write
1BA37076000
trusted library allocation
page read and write
D460000
unkown
page read and write
1BA378B7000
heap
page read and write
10B4A000
unkown
page read and write
CB5527F000
stack
page read and write
1AE0A000000
heap
page read and write
92E9000
unkown
page read and write
FB0000
unkown
page read and write
1C03488A000
heap
page read and write
F6B000
stack
page read and write
93C7000
unkown
page read and write
93A9000
unkown
page read and write
90D7000
unkown
page read and write
1BA32E71000
trusted library allocation
page read and write
65B63000
unkown
page readonly
1460000
unkown
page read and write
3060000
unkown
page write copy
1011B000
unkown
page read and write
1BA32343000
heap
page read and write
12551000
unkown
page execute and read and write
159E000
unkown
page read and write
9363000
unkown
page read and write
933B000
unkown
page read and write
1BA37661000
heap
page read and write
FFE40000
unkown
page execute read
DB7E000
unkown
page read and write
F81DF7F000
stack
page read and write
D94A000
unkown
page read and write
A584000
unkown
page read and write
BC6C000
unkown
page read and write
DCE1000
unkown
page read and write
49903FE000
stack
page read and write
266FFA02000
trusted library allocation
page read and write
9455000
unkown
page read and write
9397000
unkown
page read and write
928F000
unkown
page read and write
1BA3775D000
heap
page read and write
1BE61302000
heap
page read and write
D29C000
unkown
page read and write
90F7000
unkown
page read and write
1BA3778A000
heap
page read and write
93AB000
unkown
page read and write
937F000
unkown
page read and write
9391000
unkown
page read and write
1BA379A0000
heap
page read and write
1BE61262000
heap
page read and write
9415000
unkown
page read and write
1BA323FC000
heap
page read and write
FFE44000
unkown
page execute read
D250000
unkown
page read and write
D93A000
unkown
page read and write
9379000
unkown
page read and write
B0D8000
unkown
page read and write
93D3000
unkown
page read and write
9371000
unkown
page read and write
9471000
unkown
page read and write
1102000
heap
page read and write
A584000
unkown
page read and write
25A85C40000
heap
page read and write
1BA3763C000
heap
page read and write
946B000
unkown
page read and write
10D0000
heap
page read and write
79F9AFF000
stack
page read and write
1BA37995000
heap
page read and write
B074000
unkown
page read and write
1BA37937000
heap
page read and write
9331000
unkown
page read and write
146D0000
unkown
page read and write
1BA315D0000
heap
page read and write
1BA377F9000
heap
page read and write
9443000
unkown
page read and write
1188000
heap
page read and write
11E0000
heap
page read and write
1BA3787B000
heap
page read and write
1455E000
unkown
page read and write
1450000
unkown
page readonly
1BA3706C000
trusted library allocation
page read and write
935F000
unkown
page read and write
9349000
unkown
page read and write
1BA37060000
trusted library allocation
page read and write
1C034829000
heap
page read and write
1410000
unkown
page readonly
1BA371C0000
trusted library allocation
page read and write
D16E000
unkown
page read and write
9365000
unkown
page read and write
DD36000
unkown
page execute and read and write
9461000
unkown
page read and write
D941000
unkown
page read and write
1F830802000
heap
page read and write
DA3F000
unkown
page read and write
BEDC000
unkown
page read and write
1480000
unkown
page readonly
92CD000
unkown
page read and write
1BA3782C000
heap
page read and write
1F8303B7000
heap
page read and write
9295000
unkown
page read and write
65B8C000
unkown
page read and write
CEFE000
unkown
page read and write
18932CE0000
heap
page read and write
9419000
unkown
page read and write
9453000
unkown
page read and write
1BA3799E000
heap
page read and write
D79F000
unkown
page read and write
DCA8000
unkown
page read and write
1430000
unkown
page readonly
946B000
unkown
page read and write
1BA378E0000
heap
page read and write
1F82FAE8000
heap
page read and write
FFE46000
unkown
page execute read
9117000
unkown
page read and write
1400000
unkown
page readonly
92B1000
unkown
page read and write
941B000
unkown
page read and write
9447000
unkown
page read and write
9331000
unkown
page read and write
E1EB000
unkown
page read and write
9401000
unkown
page read and write
38254FB000
stack
page read and write
1F830320000
heap
page read and write
A20E000
unkown
page read and write
9427000
unkown
page read and write
1BA377C5000
heap
page read and write
D14D000
unkown
page read and write
93E1000
unkown
page read and write
1BA37903000
heap
page read and write
1BA31FF3000
heap
page read and write
F6B000
stack
page read and write
16E88C7D000
heap
page read and write
942F000
unkown
page read and write
A09B000
unkown
page read and write
B4CA000
unkown
page read and write
1F830390000
heap
page read and write
1BA37924000
heap
page read and write
1BA3797C000
heap
page read and write
1BA31FE0000
heap
page read and write
9427000
unkown
page read and write
1BA37639000
heap
page read and write
9379000
unkown
page read and write
9291000
unkown
page read and write
D8C0000
unkown
page readonly
93ED000
unkown
page read and write
3150000
unkown
page read and write
1BA370E0000
trusted library allocation
page read and write
944D000
unkown
page read and write
1018E000
unkown
page read and write
11E5000
unkown
page read and write
229C5602000
heap
page read and write
E1E1000
unkown
page read and write
A15E000
unkown
page read and write
1BA3785A000
heap
page read and write
DCF2000
unkown
page read and write
1F830390000
heap
page read and write
9407000
unkown
page read and write
1171000
heap
page read and write
1BA37634000
heap
page read and write
93D3000
unkown
page read and write
9457000
unkown
page read and write
14C9C000
unkown
page execute and read and write
938F000
unkown
page read and write
1AE0A802000
trusted library allocation
page read and write
934B000
unkown
page read and write
3020000
heap
page read and write
1BA37041000
trusted library allocation
page read and write
12385000
unkown
page read and write
1F82FA3C000
heap
page read and write
B9A0000
unkown
page readonly
9469000
unkown
page read and write
D79F000
unkown
page read and write
9343000
unkown
page read and write
1BA371A0000
trusted library allocation
page read and write
1C82B3D1000
trusted library allocation
page read and write
93E5000
unkown
page read and write
1BA37993000
heap
page read and write
11E5000
heap
page read and write
9471000
unkown
page read and write
1C8307B0000
trusted library allocation
page read and write
941D000
unkown
page read and write
D432000
unkown
page read and write
D425000
unkown
page read and write
D436000
unkown
page read and write
14117000
unkown
page read and write
9403000
unkown
page read and write
A20E000
unkown
page read and write
13D0E000
unkown
page read and write
121D0000
unkown
page read and write
1C82B4FA000
heap
page read and write
10C0000
unkown
page readonly
1480000
unkown
page readonly
1BA3762F000
heap
page read and write
9449000
unkown
page read and write
9333000
unkown
page read and write
BDCD000
unkown
page read and write
D69E000
unkown
page read and write
9337000
unkown
page read and write
10FE000
unkown
page read and write
E10000
unkown
page read and write
1BA379DB000
heap
page read and write
F81DEF9000
stack
page read and write
14D00000
remote allocation
page read and write
1BE61100000
heap
page read and write
1BA37825000
heap
page read and write
CDAD000
unkown
page read and write
93E9000
unkown
page read and write
1BA378A0000
heap
page read and write
1C830CAF000
heap
page read and write
17A7CA5F000
heap
page read and write
1496F000
unkown
page execute and read and write
38255FD000
stack
page read and write
1BA3794E000
heap
page read and write
DA37000
unkown
page read and write
1BA3236B000
heap
page read and write
14CB0000
unkown
page read and write
E143000
unkown
page read and write
FCBF000
unkown
page read and write
FBAC000
unkown
page read and write
229C4E13000
heap
page read and write
1BA37827000
heap
page read and write
16E88C65000
heap
page read and write
940F000
unkown
page read and write
9121000
unkown
page read and write
13CFF000
unkown
page read and write
B0EF000
unkown
page read and write
FCC3000
unkown
page read and write
9383000
unkown
page read and write
1BA377BD000
heap
page read and write
1C82B478000
heap
page read and write
B154000
unkown
page read and write
90D5000
unkown
page read and write
9425000
unkown
page read and write
1F830383000
heap
page read and write
9335000
unkown
page read and write
1BA31883000
heap
page read and write
229C4E44000
heap
page read and write
12B40000
unkown
page readonly
92B3000
unkown
page read and write
123F4000
unkown
page read and write
B4C2000
unkown
page read and write
1BA37935000
heap
page read and write
144E0000
unkown
page read and write
FB66000
unkown
page read and write
B165000
unkown
page read and write
F6F000
stack
page read and write
B510000
unkown
page readonly
1418B000
unkown
page read and write
D937000
unkown
page read and write
E147000
unkown
page read and write
1BA37873000
heap
page read and write
17A7CA6E000
heap
page read and write
1F830120000
remote allocation
page read and write
10DB000
unkown
page read and write
9355000
unkown
page read and write
1BA37850000
heap
page read and write
1BA37190000
trusted library allocation
page read and write
93EB000
unkown
page read and write
93D5000
unkown
page read and write
1BA371DC000
trusted library allocation
page read and write
92B7000
unkown
page read and write
BEDC000
unkown
page read and write
B0C8000
unkown
page read and write
9385000
unkown
page read and write
18932CB1000
heap
page read and write
F81DCFF000
stack
page read and write
1A30000
unkown
page readonly
E1AF000
unkown
page read and write
D924000
unkown
page read and write
B0BF000
unkown
page read and write
9441000
unkown
page read and write
A15E000
unkown
page read and write
93A9000
unkown
page read and write
1BA378E3000
heap
page read and write
A15B000
unkown
page read and write
FFE44000
unkown
page execute read
9365000
unkown
page read and write
13CB0000
unkown
page read and write
D3E4000
unkown
page read and write
9471000
unkown
page read and write
3040000
unkown
page read and write
DC1E000
unkown
page read and write
D277000
unkown
page read and write
93A5000
unkown
page read and write
9451000
unkown
page read and write
FFE27000
unkown
page execute read
101D4000
unkown
page read and write
1BA3763F000
heap
page read and write
D16C000
unkown
page read and write
D931000
unkown
page read and write
93F3000
unkown
page read and write
14710000
unkown
page read and write
1BA37948000
heap
page read and write
1C82B513000
heap
page read and write
382567B000
stack
page read and write
1BA37861000
heap
page read and write
E1E8000
unkown
page read and write
10072000
unkown
page read and write
A5089FA000
stack
page read and write
D98F000
unkown
page read and write
1BA3707C000
trusted library allocation
page read and write
9465000
unkown
page read and write
1BA37891000
heap
page read and write
1F83035F000
heap
page read and write
92AF000
unkown
page read and write
B0E1000
unkown
page read and write
B0D4000
unkown
page read and write
A0A1000
unkown
page read and write
25A85D13000
heap
page read and write
1450000
unkown
page readonly
11C8000
heap
page read and write
12399000
unkown
page read and write
13CF0000
unkown
page read and write
1BA37626000
heap
page read and write
1490000
heap
page read and write
9413000
unkown
page read and write
146F0000
unkown
page read and write
93D9000
unkown
page read and write
9345000
unkown
page read and write
1417B000
unkown
page read and write
1BA3706C000
trusted library allocation
page read and write
1455E000
unkown
page read and write
9415000
unkown
page read and write
93AB000
unkown
page read and write
910F000
unkown
page read and write
1BA323D1000
heap
page read and write
93D5000
unkown
page read and write
9293000
unkown
page read and write
9109000
unkown
page read and write
B3EB000
unkown
page read and write
A0B7000
unkown
page read and write
DB91000
unkown
page read and write
1BA377F7000
heap
page read and write
9425000
unkown
page read and write
D250000
unkown
page read and write
93A5000
unkown
page read and write
261D543E000
heap
page read and write
1A30000
unkown
page readonly
1BA323AC000
heap
page read and write
11CD000
heap
page read and write
14680000
unkown
page read and write
B0D6000
unkown
page read and write
938F000
unkown
page read and write
935B000
unkown
page read and write
1BA378BC000
heap
page read and write
10148000
unkown
page read and write
CBFC000
unkown
page read and write
16E89340000
trusted library allocation
page read and write
92DD000
unkown
page read and write
CB54A7D000
stack
page read and write
1BA32352000
heap
page read and write
B074000
unkown
page read and write
FFE5A000
unkown
page execute read
1F830800000
heap
page read and write
9359000
unkown
page read and write
DB7E000
unkown
page read and write
1BA371D4000
trusted library allocation
page read and write
1BA37626000
heap
page read and write
937B000
unkown
page read and write
1C830A20000
remote allocation
page read and write
2DA15530000
trusted library allocation
page read and write
1F82FA00000
heap
page read and write
C2B47E000
stack
page read and write
1188000
unkown
page read and write
1BA37643000
heap
page read and write
90FD000
unkown
page read and write
9387000
unkown
page read and write
123BA000
unkown
page read and write
10D0000
heap
page read and write
1BA37900000
heap
page read and write
17A7CA41000
heap
page read and write
266FF313000
heap
page read and write
A508D7B000
stack
page read and write
116C000
heap
page read and write
A15E000
unkown
page read and write
11C4000
heap
page read and write
DC27000
unkown
page read and write
1410000
unkown
page readonly
101A7000
unkown
page read and write
93D1000
unkown
page read and write
9385000
unkown
page read and write
DAB6000
unkown
page read and write
1BA3707A000
trusted library allocation
page read and write
9433000
unkown
page read and write
1BA3236D000
heap
page read and write
16E88D13000
heap
page read and write
A139000
unkown
page read and write
B45A000
unkown
page read and write
93F7000
unkown
page read and write
B0C4000
unkown
page read and write
8DDE77E000
stack
page read and write
D391000
unkown
page read and write
1BA377F9000
heap
page read and write
938B000
unkown
page read and write
9129000
unkown
page read and write
1BA32E90000
trusted library allocation
page read and write
CC6D000
unkown
page read and write
93A1000
unkown
page read and write
937D000
unkown
page read and write
93F9000
unkown
page read and write
B09C000
unkown
page read and write
1BA37661000
heap
page read and write
11D0000
unkown
page readonly
1F82F900000
heap
page read and write
93E9000
unkown
page read and write
9103000
unkown
page read and write
1BA37951000
heap
page read and write
1BA37638000
heap
page read and write
9367000
unkown
page read and write
1BA378EA000
heap
page read and write
1BA31FC8000
heap
page read and write
1BA3781C000
heap
page read and write
1BA36EA0000
trusted library allocation
page read and write
9441000
unkown
page read and write
1BA37919000
heap
page read and write
93B9000
unkown
page read and write
1BA31F00000
heap
page read and write
1BA379E4000
heap
page read and write
14BF0000
unkown
page execute and read and write
FFE4A000
unkown
page execute read
123F7000
unkown
page read and write
9437000
unkown
page read and write
17A7CA3C000
heap
page read and write
93ED000
unkown
page read and write
B092000
unkown
page read and write
1F83038C000
heap
page read and write
FFE42000
unkown
page execute read
1BE6128E000
heap
page read and write
1BA37070000
trusted library allocation
page read and write
1BA37869000
heap
page read and write
1BA37060000
trusted library allocation
page read and write
943F000
unkown
page read and write
1BA37634000
heap
page read and write
1BA37040000
trusted library allocation
page read and write
D7A7000
heap
page read and write
1BA37626000
heap
page read and write
1F830202000
heap
page read and write
12439000
unkown
page read and write
B165000
unkown
page read and write
13BE000
unkown
page read and write
147B7000
unkown
page read and write
9453000
unkown
page read and write
1BA315C0000
heap
page read and write
261D5413000
heap
page read and write
1BA3783A000
heap
page read and write
93F5000
unkown
page read and write
B097000
unkown
page read and write
1BA323D1000
heap
page read and write
932F000
unkown
page read and write
B45A000
unkown
page read and write
10134000
unkown
page read and write
932B000
unkown
page read and write
17A7CA57000
heap
page read and write
9107000
unkown
page read and write
93A1000
unkown
page read and write
B410000
unkown
page read and write
1F82FAAA000
heap
page read and write
DAD1000
unkown
page read and write
12385000
unkown
page read and write
B095000
unkown
page read and write
10D0000
heap
page read and write
B0E1000
unkown
page read and write
1C830CF0000
heap
page read and write
D04D000
unkown
page read and write
93A7000
unkown
page read and write
D3B5000
unkown
page read and write
17A7CA7C000
heap
page read and write
1BA37991000
heap
page read and write
B420000
unkown
page read and write
92BB000
unkown
page read and write
14151000
unkown
page read and write
17A7C7E0000
heap
page read and write
1C8307A0000
trusted library allocation
page read and write
BDD0000
unkown
page read and write
93EF000
unkown
page read and write
9443000
unkown
page read and write
1BA378B6000
heap
page read and write
101E8000
unkown
page read and write
1BA37130000
remote allocation
page read and write
1BA37648000
heap
page read and write
1BA38010000
heap
page read and write
1BA3785D000
heap
page read and write
1BA37742000
heap
page read and write
13C60000
unkown
page read and write
3040000
unkown
page read and write
1019D000
unkown
page read and write
1BA37883000
heap
page read and write
16E88D00000
heap
page read and write
FFE56000
unkown
page execute read
227E9FE000
stack
page read and write
18932CCE000
heap
page read and write
1BA37876000
heap
page read and write
1AE09F10000
heap
page read and write
9459000
unkown
page read and write
92D7000
unkown
page read and write
79F99F7000
stack
page read and write
1102000
heap
page read and write
1AE0A6A0000
remote allocation
page read and write
938F000
unkown
page read and write
D960000
unkown
page read and write
1BA37978000
heap
page read and write
9387000
unkown
page read and write
D407000
unkown
page read and write
A5099FD000
stack
page read and write
16E88C5D000
heap
page read and write
1BA37078000
trusted library allocation
page read and write
9357000
unkown
page read and write
1BA371D4000
trusted library allocation
page read and write
C2AF7A000
stack
page read and write
1BA31857000
heap
page read and write
9391000
unkown
page read and write
B0CD000
unkown
page read and write
93D3000
unkown
page read and write
D268000
unkown
page read and write
140DD000
unkown
page read and write
10BE000
unkown
page read and write
10152000
unkown
page read and write
12552000
unkown
page read and write
93D5000
unkown
page read and write
13BC7000
unkown
page read and write
1BA378F5000
heap
page read and write
A09E000
unkown
page read and write
9423000
unkown
page read and write
1BA379D4000
heap
page read and write
1C8308F0000
trusted library allocation
page read and write
D3B5000
unkown
page read and write
1460000
unkown
page read and write
18932CCE000
heap
page read and write
12397000
unkown
page read and write
1BA37130000
remote allocation
page read and write
93A5000
unkown
page read and write
1BA37979000
heap
page read and write
FC80000
unkown
page read and write
1C82BBC0000
trusted library allocation
page read and write
946F000
unkown
page read and write
9343000
unkown
page read and write
9431000
unkown
page read and write
1BA32E50000
trusted library section
page readonly
9393000
unkown
page read and write
DCB2000
unkown
page read and write
100DF000
unkown
page read and write
2DA154C0000
heap
page read and write
1BA37669000
heap
page read and write
A212000
unkown
page read and write
9357000
unkown
page read and write
1BA32EA0000
trusted library allocation
page read and write
934D000
unkown
page read and write
B44B000
unkown
page read and write
B50D000
unkown
page read and write
C73D000
unkown
page read and write
934B000
unkown
page read and write
1BA37662000
heap
page read and write
B510000
unkown
page readonly
1BA37865000
heap
page read and write
1BE6128D000
heap
page read and write
1F8303B4000
heap
page read and write
11D0000
unkown
page readonly
10161000
unkown
page read and write
3040000
unkown
page read and write
910B000
unkown
page read and write
1BA3763A000
heap
page read and write
1BA377F2000
heap
page read and write
93DD000
unkown
page read and write
9429000
unkown
page read and write
12435000
unkown
page read and write
1C82C2E0000
trusted library allocation
page read and write
9395000
unkown
page read and write
1BA3762D000
heap
page read and write
C83C000
unkown
page read and write
B0C8000
unkown
page read and write
1BA31871000
heap
page read and write
1BA3221B000
heap
page read and write
912B000
unkown
page read and write
1BA37853000
heap
page read and write
1BA377B7000
heap
page read and write
E1FB000
unkown
page read and write
E1E6000
unkown
page read and write
933D000
unkown
page read and write
1BE6122A000
heap
page read and write
942F000
unkown
page read and write
93CD000
unkown
page read and write
1BA379E3000
heap
page read and write
10143000
unkown
page read and write
1BA37743000
heap
page read and write
1060000
unkown
page read and write
1BA377E9000
heap
page read and write
A584000
unkown
page read and write
B0A0000
unkown
page read and write
1BA3788C000
heap
page read and write
D960000
unkown
page read and write
1BA37875000
heap
page read and write
936D000
unkown
page read and write
10120000
unkown
page read and write
1C8308CE000
trusted library allocation
page read and write
1BA377B6000
heap
page read and write
93F7000
unkown
page read and write
93BB000
unkown
page read and write
FFE53000
unkown
page execute read
E077000
unkown
page read and write
1BA323D5000
heap
page read and write
B074000
unkown
page read and write
2DA155F6000
heap
page read and write
CF73B7B000
stack
page read and write
9409000
unkown
page read and write
1F83032C000
heap
page read and write
FFE5C000
unkown
page readonly
FB74000
unkown
page read and write
9391000
unkown
page read and write
E1CB000
unkown
page read and write
9359000
unkown
page read and write
1C82B200000
heap
page read and write
9465000
unkown
page read and write
10193000
unkown
page read and write
A15B000
unkown
page read and write
9431000
unkown
page read and write
1460000
unkown
page read and write
9473000
unkown
page read and write
1BA323A6000
heap
page read and write
A0A1000
unkown
page read and write
16A0000
unkown
page readonly
940F000
unkown
page read and write
9465000
unkown
page read and write
9431000
unkown
page read and write
A20E000
unkown
page read and write
92BF000
unkown
page read and write
92CB000
unkown
page read and write
CF7397E000
stack
page read and write
368A0000
unkown
page execute read
1BA37669000
heap
page read and write
1412C000
unkown
page read and write
9449000
unkown
page read and write
14190000
unkown
page read and write
1430000
unkown
page readonly
93BF000
unkown
page read and write
9325000
unkown
page read and write
2E40000
unkown
page read and write
9439000
unkown
page read and write
2E50000
unkown
page readonly
DB7E000
unkown
page read and write
1C82B400000
heap
page read and write
1BA3776C000
heap
page read and write
17A7CA67000
heap
page read and write
1BA3774F000
heap
page read and write
12CF0000
unkown
page readonly
92E3000
unkown
page read and write
13C20000
unkown
page read and write
B4CA000
unkown
page read and write
B086000
unkown
page read and write
1C82C3D0000
trusted library section
page readonly
14075000
unkown
page read and write
E1DB000
unkown
page read and write
1BA37902000
heap
page read and write
13C50000
unkown
page read and write
13CC0000
unkown
page read and write
938D000
unkown
page read and write
1BA378B8000
heap
page read and write
BA60000
unkown
page readonly
945D000
unkown
page read and write
1BA37907000
heap
page read and write
266FF1D0000
trusted library allocation
page read and write
1009E000
unkown
page read and write
1BA3782C000
heap
page read and write
498FEFE000
stack
page read and write
CB5517E000
stack
page read and write
11E0000
unkown
page read and write
FFE21000
unkown
page execute read
9395000
unkown
page read and write
9341000
unkown
page read and write
B095000
unkown
page read and write
1BA37655000
heap
page read and write
DD3F000
unkown
page read and write
FB83000
unkown
page read and write
B154000
unkown
page read and write
17A7C850000
heap
page read and write
90D9000
unkown
page read and write
8DDEA7F000
stack
page read and write
1BA31F25000
heap
page read and write
1BA32223000
heap
page read and write
1C82B43D000
heap
page read and write
141A5000
unkown
page read and write
3060000
unkown
page write copy
1C034800000
heap
page read and write
A50907E000
stack
page read and write
DAB6000
unkown
page read and write
93FB000
unkown
page read and write
1BA31843000
heap
page read and write
1BA37662000
heap
page read and write
FB7E000
unkown
page read and write
1450000
unkown
page readonly
9435000
unkown
page read and write
10139000
unkown
page read and write
F81DC7F000
stack
page read and write
93C3000
unkown
page read and write
9473000
unkown
page read and write
133E0000
unkown
page read and write
1BA37872000
heap
page read and write
9443000
unkown
page read and write
1310FE00000
heap
page read and write
16E89402000
trusted library allocation
page read and write
266FF23C000
heap
page read and write
935F000
unkown
page read and write
1BA37825000
heap
page read and write
937B000
unkown
page read and write
93DF000
unkown
page read and write
1BA3762D000
heap
page read and write
D13D000
unkown
page read and write
169E000
unkown
page read and write
3060000
unkown
page write copy
18932B90000
heap
page read and write
101C5000
unkown
page read and write
16E88C00000
heap
page read and write
939D000
unkown
page read and write
93CF000
unkown
page read and write
912D000
unkown
page read and write
1BA377DD000
heap
page read and write
10C0000
unkown
page readonly
D349000
unkown
page read and write
1BE61308000
heap
page read and write
1BA37040000
trusted library allocation
page read and write
14BE0000
unkown
page read and write
F81DDFA000
stack
page read and write
1BA3706E000
trusted library allocation
page read and write
10134000
unkown
page read and write
9373000
unkown
page read and write
FCAB000
unkown
page read and write
9471000
unkown
page read and write
9347000
unkown
page read and write
1102000
heap
page read and write
14560000
unkown
page read and write
1BA37856000
heap
page read and write
1BA3777F000
heap
page read and write
100C6000
unkown
page read and write
1BA37867000
heap
page read and write
93DD000
unkown
page read and write
E1F0000
unkown
page read and write
9375000
unkown
page read and write
9335000
unkown
page read and write
DA3F000
unkown
page read and write
1BA37060000
trusted library allocation
page read and write
934B000
unkown
page read and write
9461000
unkown
page read and write
92BD000
unkown
page read and write
9435000
unkown
page read and write
E1C1000
unkown
page read and write
13CE0000
unkown
page read and write
1C82B473000
heap
page read and write
1C8308C8000
trusted library allocation
page read and write
D8C0000
unkown
page readonly
1BA378E0000
heap
page read and write
92E1000
unkown
page read and write
9109000
unkown
page read and write
1BA37825000
heap
page read and write
1F82FB08000
heap
page read and write
16E88BE0000
heap
page read and write
1BA31FC4000
heap
page read and write
9351000
unkown
page read and write
1BA3784D000
heap
page read and write
941B000
unkown
page read and write
CC10000
unkown
page read and write
935B000
unkown
page read and write
92D9000
unkown
page read and write
1060000
unkown
page read and write
93C7000
unkown
page read and write
D31E000
unkown
page read and write
1BA3792A000
heap
page read and write
911B000
unkown
page read and write
93A9000
unkown
page read and write
93CB000
unkown
page read and write
FFE25000
unkown
page execute read
49902FE000
stack
page read and write
90F9000
unkown
page read and write
D42A000
unkown
page read and write
92B5000
unkown
page read and write
1BA371D0000
trusted library allocation
page read and write
112A000
heap
page read and write
9103000
unkown
page read and write
D268000
unkown
page read and write
312C000
unkown
page read and write
1F830392000
heap
page read and write
1F8303B5000
heap
page read and write
1BA3795B000
heap
page read and write
A5095FE000
stack
page read and write
10189000
unkown
page read and write
16E88C13000
heap
page read and write
1BA371D0000
trusted library allocation
page read and write
14117000
unkown
page read and write
1C830C2A000
heap
page read and write
945D000
unkown
page read and write
9115000
unkown
page read and write
932F000
unkown
page read and write
90FF000
unkown
page read and write
1BA371B0000
trusted library allocation
page read and write
1BA37669000
heap
page read and write
1F830380000
heap
page read and write
1BA31843000
heap
page read and write
1BA377FF000
heap
page read and write
1C830904000
trusted library allocation
page read and write
1C034720000
heap
page read and write
1BA323D5000
heap
page read and write
9427000
unkown
page read and write
9455000
unkown
page read and write
D8B0000
unkown
page read and write
93F7000
unkown
page read and write
1C034864000
heap
page read and write
3020000
unkown
page read and write
92EB000
unkown
page read and write
100CB000
unkown
page read and write
A366000
unkown
page read and write
1BA323D1000
heap
page read and write
13110028000
heap
page read and write
1C8308C0000
trusted library allocation
page read and write
93DF000
unkown
page read and write
9127000
unkown
page read and write
B090000
unkown
page read and write
1BA3785D000
heap
page read and write
13C10000
unkown
page read and write
DAC7000
unkown
page read and write
D31E000
unkown
page read and write
9389000
unkown
page read and write
1BA37655000
heap
page read and write
11E5000
heap
page read and write
105E000
unkown
page read and write
1BA323D1000
heap
page read and write
A0B7000
unkown
page read and write
1BA377FB000
heap
page read and write
266FF213000
heap
page read and write
9369000
unkown
page read and write
910D000
unkown
page read and write
943F000
unkown
page read and write
1BA3788C000
heap
page read and write
1C830C62000
heap
page read and write
B1AD000
unkown
page read and write
D947000
unkown
page read and write
1BA37877000
heap
page read and write
1009E000
unkown
page read and write
910B000
unkown
page read and write
92AD000
unkown
page read and write
13D83000
unkown
page read and write
93DB000
unkown
page read and write
BA60000
unkown
page readonly
25A859D0000
heap
page read and write
13D72000
unkown
page read and write
1015C000
unkown
page read and write
943D000
unkown
page read and write
93E9000
unkown
page read and write
1BA37669000
heap
page read and write
1012F000
unkown
page read and write
F66000
stack
page read and write
93E3000
unkown
page read and write
14725000
unkown
page read and write
1F82FB13000
heap
page read and write
2F534FB000
stack
page read and write
2DA155FE000
heap
page read and write
4F30EFF000
stack
page read and write
1C034857000
heap
page read and write
92DD000
unkown
page read and write
9453000
unkown
page read and write
121D0000
unkown
page read and write
1BA31E15000
heap
page read and write
9465000
unkown
page read and write
13C90000
unkown
page readonly
935D000
unkown
page read and write
C9BC000
unkown
page read and write
9129000
unkown
page read and write
12418000
unkown
page read and write
FFE59000
unkown
page readonly
4F30CF7000
stack
page read and write
90F7000
unkown
page read and write
E1DB000
unkown
page read and write
1BA37068000
trusted library allocation
page read and write
1BA37210000
trusted library allocation
page read and write
1BA37779000
heap
page read and write
1BA377AD000
heap
page read and write
9295000
unkown
page read and write
B0B5000
unkown
page read and write
8DDEB7E000
stack
page read and write
9391000
unkown
page read and write
B5A4000
unkown
page read and write
F6F000
stack
page read and write
93E5000
unkown
page read and write
F90000
unkown
page readonly
1BA3707E000
trusted library allocation
page read and write
1BA32200000
heap
page read and write
911D000
unkown
page read and write
93BB000
unkown
page read and write
1BA37863000
heap
page read and write
935D000
unkown
page read and write
1BA37100000
trusted library allocation
page read and write
D65E000
unkown
page read and write
14700000
unkown
page read and write
17A7CA42000
heap
page read and write
1AE0A102000
heap
page read and write
14680000
unkown
page read and write
1F8303D8000
heap
page read and write
1BA372A0000
trusted library allocation
page read and write
A156000
unkown
page read and write
1440000
unkown
page readonly
944F000
unkown
page read and write
9429000
unkown
page read and write
1F82FAEC000
heap
page read and write
9469000
unkown
page read and write
939B000
unkown
page read and write
14D20000
unkown
page read and write
941B000
unkown
page read and write
93CB000
unkown
page read and write
1C034852000
heap
page read and write
227ECF7000
stack
page read and write
93F1000
unkown
page read and write
105E000
unkown
page read and write
9353000
unkown
page read and write
101CA000
unkown
page read and write
1014D000
unkown
page read and write
1BA31F1D000
heap
page read and write
9347000
unkown
page read and write
92AD000
unkown
page read and write
D311000
unkown
page read and write
B464000
unkown
page read and write
1BA3784D000
heap
page read and write
1BA3225A000
heap
page read and write
1BA31F90000
heap
page read and write
92DB000
unkown
page read and write
B47C000
unkown
page read and write
1BA3762C000
heap
page read and write
14BCE000
unkown
page read and write
1BA371E0000
trusted library allocation
page read and write
9383000
unkown
page read and write
E077000
unkown
page read and write
9467000
unkown
page read and write
A15B000
unkown
page read and write
93DD000
unkown
page read and write
93A7000
unkown
page read and write
13D6E000
unkown
page read and write
A50927F000
stack
page read and write
938F000
unkown
page read and write
9413000
unkown
page read and write
11C4000
heap
page read and write
1BA371C0000
trusted library allocation
page read and write
93F1000
unkown
page read and write
9105000
unkown
page read and write
93F5000
unkown
page read and write
92D9000
unkown
page read and write
1BA323AC000
heap
page read and write
146B0000
unkown
page read and write
261D5C02000
trusted library allocation
page read and write
9371000
unkown
page read and write
FCBF000
unkown
page read and write
B0B5000
unkown
page read and write
93F9000
unkown
page read and write
943B000
unkown
page read and write
93F3000
unkown
page read and write
1BA3774F000
heap
page read and write
93E1000
unkown
page read and write
1C03484C000
heap
page read and write
9351000
unkown
page read and write
13C10000
unkown
page read and write
CABC000
unkown
page read and write
D16C000
unkown
page read and write
1C82B260000
heap
page read and write
936D000
unkown
page read and write
1C82B502000
heap
page read and write
141A0000
unkown
page read and write
934B000
unkown
page read and write
1C034902000
heap
page read and write
1BA37742000
heap
page read and write
D921000
unkown
page read and write
1BA37869000
heap
page read and write
B4CA000
unkown
page read and write
1BA31800000
heap
page read and write
1F82FA52000
heap
page read and write
18932CC2000
heap
page read and write
17A7CA13000
heap
page read and write
1BA370AE000
trusted library allocation
page read and write
9373000
unkown
page read and write
9385000
unkown
page read and write
1BA37602000
heap
page read and write
382587E000
stack
page read and write
17A7CA58000
heap
page read and write
FFE4C000
unkown
page execute read
79F97FB000
stack
page read and write
DBAB000
unkown
page read and write
1F82FB02000
heap
page read and write
CFFE000
unkown
page read and write
261D5458000
heap
page read and write
FFE58000
unkown
page execute read
1BA3795D000
heap
page read and write
1BA323A6000
heap
page read and write
1BA37072000
trusted library allocation
page read and write
124C0000
unkown
page read and write
9443000
unkown
page read and write
13C80000
unkown
page read and write
9109000
unkown
page read and write
93AD000
unkown
page read and write
10170000
unkown
page read and write
1F83038E000
heap
page read and write
9323000
unkown
page read and write
10170000
unkown
page read and write
1BA3792B000
heap
page read and write
D277000
unkown
page read and write
B092000
unkown
page read and write
9327000
unkown
page read and write
9341000
unkown
page read and write
16E88B80000
heap
page read and write
14BD0000
unkown
page read and write
17A7CA31000
heap
page read and write
DA4E000
unkown
page read and write
144E0000
unkown
page read and write
14510000
unkown
page readonly
1BA32389000
heap
page read and write
147F0000
unkown
page read and write
1BA377B9000
heap
page read and write
9473000
unkown
page read and write
1C830A20000
trusted library allocation
page read and write
1BA37873000
heap
page read and write
93AB000
unkown
page read and write
93E3000
unkown
page read and write
10BE000
unkown
page read and write
1BE6125C000
heap
page read and write
1440000
unkown
page readonly
946B000
unkown
page read and write
9341000
unkown
page read and write
261D5400000
heap
page read and write
9467000
unkown
page read and write
DCF2000
unkown
page read and write
A5091FF000
stack
page read and write
1171000
unkown
page read and write
935D000
unkown
page read and write
93BD000
unkown
page read and write
B435000
unkown
page read and write
9293000
unkown
page read and write
92BB000
unkown
page read and write
10139000
unkown
page read and write
92EB000
unkown
page read and write
1C8308E4000
trusted library allocation
page read and write
1BA31891000
heap
page read and write
E8A000
stack
page read and write
101C0000
unkown
page read and write
140C8000
unkown
page read and write
DABC000
unkown
page read and write
1BA37669000
heap
page read and write
4F3097E000
stack
page read and write
1BA37669000
heap
page read and write
229C4D40000
heap
page read and write
A5090FF000
stack
page read and write
1470000
unkown
page readonly
DCB2000
unkown
page read and write
D31E000
unkown
page read and write
F66000
stack
page read and write
1BA37744000
heap
page read and write
1BA323D9000
heap
page read and write
B0CF000
unkown
page read and write
4F30BFB000
stack
page read and write
14910000
unkown
page read and write
B496000
unkown
page read and write
9401000
unkown
page read and write
9459000
unkown
page read and write
1310FDF0000
heap
page read and write
D944000
unkown
page read and write
9119000
unkown
page read and write
939D000
unkown
page read and write
3153000
heap
page read and write
1158000
heap
page read and write
D7A3000
heap
page read and write
D311000
unkown
page read and write
14900000
unkown
page read and write
1BA371D0000
trusted library allocation
page read and write
942F000
unkown
page read and write
1F82FA4A000
heap
page read and write
939F000
unkown
page read and write
9127000
unkown
page read and write
D8B0000
unkown
page read and write
9427000
unkown
page read and write
1BA3791B000
heap
page read and write
A0B7000
unkown
page read and write
92B7000
unkown
page read and write
229C4EBB000
heap
page read and write
1BA3788E000
heap
page read and write
90FF000
unkown
page read and write
B092000
unkown
page read and write
B489000
unkown
page read and write
9107000
unkown
page read and write
9411000
unkown
page read and write
1BA37662000
heap
page read and write
9351000
unkown
page read and write
266FF060000
heap
page read and write
F6B000
stack
page read and write
1BA378E0000
heap
page read and write
90FD000
unkown
page read and write
1C830990000
trusted library allocation
page read and write
9339000
unkown
page read and write
FFE26000
unkown
page readonly
9385000
unkown
page read and write
1BA37964000
heap
page read and write
1BA3783B000
heap
page read and write
9383000
unkown
page read and write
65B96000
unkown
page write copy
146C0000
unkown
page read and write
9457000
unkown
page read and write
CAFE000
unkown
page read and write
1BA323D5000
heap
page read and write
140C8000
unkown
page read and write
229C4DA0000
heap
page read and write
1BA31F2E000
heap
page read and write
16E88C8F000
heap
page read and write
910B000
unkown
page read and write
1F82FAC2000
heap
page read and write
13FE000
unkown
page read and write
261D5429000
heap
page read and write
1BA377FF000
heap
page read and write
E1FB000
unkown
page read and write
9449000
unkown
page read and write
1BA379DB000
heap
page read and write
1BA37638000
heap
page read and write
9103000
unkown
page read and write
229C4DD0000
trusted library allocation
page read and write
939B000
unkown
page read and write
1BA37869000
heap
page read and write
65940000
unkown
page readonly
17A7CA4E000
heap
page read and write
1460000
unkown
page read and write
9121000
unkown
page read and write
9355000
unkown
page read and write
9119000
unkown
page read and write
93C3000
unkown
page read and write
11C6000
heap
page read and write
92CB000
unkown
page read and write
16E88D02000
heap
page read and write
9445000
unkown
page read and write
1BA3780F000
heap
page read and write
9395000
unkown
page read and write
16E88D08000
heap
page read and write
E1E8000
unkown
page read and write
2DA15819000
heap
page read and write
140CD000
unkown
page read and write
1F8303B2000
heap
page read and write
1BE61200000
heap
page read and write
8DDE97A000
stack
page read and write
1BA3782C000
heap
page read and write
9463000
unkown
page read and write
1BA37074000
trusted library allocation
page read and write
D460000
unkown
page read and write
9361000
unkown
page read and write
1BA378E0000
heap
page read and write
18932CE1000
heap
page read and write
56ABDCA000
stack
page read and write
4BA33FE000
stack
page read and write
B837DFF000
stack
page read and write
12397000
unkown
page read and write
1243B000
unkown
page read and write
17A7CA59000
heap
page read and write
943D000
unkown
page read and write
1C0346C0000
heap
page read and write
1BA3762F000
heap
page read and write
CF73FFE000
stack
page read and write
9453000
unkown
page read and write
B0D8000
unkown
page read and write
9399000
unkown
page read and write
B410000
unkown
page read and write
2E50000
unkown
page readonly
1BA3763D000
heap
page read and write
13C20000
unkown
page read and write
DBAB000
unkown
page read and write
CC20000
unkown
page read and write
941D000
unkown
page read and write
1BA37040000
trusted library allocation
page read and write
B5C2000
unkown
page read and write
1BA3790E000
heap
page read and write
1BA37637000
heap
page read and write
1BA37742000
heap
page read and write
93A5000
unkown
page read and write
A09E000
unkown
page read and write
14C9C000
unkown
page execute and read and write
D3E4000
unkown
page read and write
1BA37658000
heap
page read and write
17A7D202000
trusted library allocation
page read and write
B0BF000
unkown
page read and write
1BA37939000
heap
page read and write
B3EB000
unkown
page read and write
FFE20000
unkown
page readonly
16E88C54000
heap
page read and write
FBB0000
unkown
page read and write
100C6000
unkown
page read and write
1BA37070000
trusted library allocation
page read and write
945F000
unkown
page read and write
93C5000
unkown
page read and write
1BA37854000
heap
page read and write
93A7000
unkown
page read and write
1BA37626000
heap
page read and write
227EE7A000
stack
page read and write
16E88B70000
heap
page read and write
B4E2000
unkown
page read and write
1467E000
unkown
page read and write
229C4E89000
heap
page read and write
1311003C000
heap
page read and write
D944000
unkown
page read and write
B090000
unkown
page read and write
DAF0000
unkown
page read and write
100DF000
unkown
page read and write
DAF0000
unkown
page read and write
9363000
unkown
page read and write
1BA37825000
heap
page read and write
1BA377E5000
heap
page read and write
1BA31913000
heap
page read and write
17A7CA7A000
heap
page read and write
D94A000
unkown
page read and write
3825A7F000
stack
page read and write
B2AD000
unkown
page read and write
25A85D02000
heap
page read and write
A09B000
unkown
page read and write
FBAC000
unkown
page read and write
1C82BC00000
heap
page read and write
1C82B429000
heap
page read and write
A15E000
unkown
page read and write
9117000
unkown
page read and write
1BA37626000
heap
page read and write
93D1000
unkown
page read and write
1F82FA13000
heap
page read and write
D3BB000
unkown
page read and write
1AE0A6A0000
remote allocation
page read and write
B0CD000
unkown
page read and write
B2AD000
unkown
page read and write
9115000
unkown
page read and write
25A85C66000
heap
page read and write
9363000
unkown
page read and write
9325000
unkown
page read and write
D927000
unkown
page read and write
CAFE000
unkown
page read and write
123BF000
unkown
page read and write
1013E000
unkown
page read and write
1BA378E0000
heap
page read and write
1014D000
unkown
page read and write
92B9000
unkown
page read and write
1BA323BF000
heap
page read and write
937D000
unkown
page read and write
FFE56000
unkown
page execute read
1252E000
unkown
page read and write
937B000
unkown
page read and write
A366000
unkown
page read and write
1BA3799B000
heap
page read and write
382547E000
stack
page read and write
934F000
unkown
page read and write
93A1000
unkown
page read and write
D973000
unkown
page read and write
16E88C63000
heap
page read and write
FB79000
unkown
page read and write
A09E000
unkown
page read and write
936B000
unkown
page read and write
A366000
unkown
page read and write
A14D000
unkown
page read and write
1BA37653000
heap
page read and write
1BA3786F000
heap
page read and write
A14D000
unkown
page read and write
1497000
unkown
page read and write
1BA37999000
heap
page read and write
B0CF000
unkown
page read and write
17A7CA74000
heap
page read and write
DC41000
unkown
page read and write
1F82FA4B000
heap
page read and write
17A7CA83000
heap
page read and write
1BA3784E000
heap
page read and write
945D000
unkown
page read and write
1BA3762D000
heap
page read and write
BD6E000
unkown
page read and write
13C50000
unkown
page read and write
A562000
unkown
page read and write
1060000
unkown
page read and write
9403000
unkown
page read and write
93BD000
unkown
page read and write
129D0000
unkown
page read and write
D937000
unkown
page read and write
4BA34FE000
stack
page read and write
17A7CA5A000
heap
page read and write
1C0346B0000
heap
page read and write
DAF0000
unkown
page read and write
CB54F7F000
stack
page read and write
3824D9B000
stack
page read and write
E1E6000
unkown
page read and write
1A30000
unkown
page readonly
9375000
unkown
page read and write
1BA377FA000
heap
page read and write
9057000
unkown
page read and write
944B000
unkown
page read and write
CF73A7C000
stack
page read and write
E0F1000
unkown
page read and write
935F000
unkown
page read and write
2DA15540000
trusted library allocation
page read and write
940F000
unkown
page read and write
1BA377FF000
heap
page read and write
B0C4000
unkown
page read and write
B5A4000
unkown
page read and write
DBFB000
unkown
page read and write
14910000
unkown
page read and write
9389000
unkown
page read and write
9475000
unkown
page read and write
D55E000
unkown
page read and write
1252E000
unkown
page read and write
92BF000
unkown
page read and write
9371000
unkown
page read and write
CDAD000
unkown
page read and write
A562000
unkown
page read and write
9361000
unkown
page read and write
18932BE0000
heap
page read and write
B9A0000
unkown
page readonly
CC10000
unkown
page read and write
1BA31FCA000
heap
page read and write
936D000
unkown
page read and write
D30B000
unkown
page read and write
65B63000
unkown
page readonly
1BA31867000
heap
page read and write
FFE5A000
unkown
page execute read
A212000
unkown
page read and write
92CD000
unkown
page read and write
123B5000
unkown
page read and write
56AC1F9000
stack
page read and write
E1D0000
unkown
page read and write
266FF308000
heap
page read and write
FFE21000
unkown
page execute read
11A1000
heap
page read and write
911B000
unkown
page read and write
12430000
unkown
page read and write
DD60000
unkown
page read and write
941B000
unkown
page read and write
92AB000
unkown
page read and write
13110079000
heap
page read and write
1BA377F1000
heap
page read and write
1BA31888000
heap
page read and write
D16E000
unkown
page read and write
D3E7000
unkown
page read and write
93A3000
unkown
page read and write
25A85C00000
heap
page read and write
9405000
unkown
page read and write
90FB000
unkown
page read and write
92BD000
unkown
page read and write
945B000
unkown
page read and write
93D9000
unkown
page read and write
1F830802000
heap
page read and write
65B99000
unkown
page readonly
E1E1000
unkown
page read and write
93DF000
unkown
page read and write
1C830CE2000
heap
page read and write
926C000
unkown
page read and write
A5085EB000
stack
page read and write
1BA37944000
heap
page read and write
1C034864000
heap
page read and write
933F000
unkown
page read and write
9447000
unkown
page read and write
1495C000
unkown
page read and write
2E40000
unkown
page read and write
13110002000
heap
page read and write
B4C2000
unkown
page read and write
9119000
unkown
page read and write
E1EB000
unkown
page read and write
13110100000
heap
page read and write
1BA379E4000
heap
page read and write
9417000
unkown
page read and write
9411000
unkown
page read and write
17A7CA5E000
heap
page read and write
943B000
unkown
page read and write
A14D000
unkown
page read and write
9433000
unkown
page read and write
1BA377F9000
heap
page read and write
92AF000
unkown
page read and write
1BA3784E000
heap
page read and write
942B000
unkown
page read and write
1BA37072000
trusted library allocation
page read and write
93F5000
unkown
page read and write
1BA3234B000
heap
page read and write
1F83038C000
heap
page read and write
1BA3774F000
heap
page read and write
1BA32300000
heap
page read and write
261D544F000
heap
page read and write
9429000
unkown
page read and write
1BA3762F000
heap
page read and write
1BA37865000
heap
page read and write
17A7CA56000
heap
page read and write
93CB000
unkown
page read and write
1C034813000
heap
page read and write
1BA36F20000
trusted library allocation
page read and write
148CA000
unkown
page read and write
9369000
unkown
page read and write
140F2000
unkown
page read and write
1BA37865000
heap
page read and write
D30B000
unkown
page read and write
1C830CB9000
heap
page read and write
939D000
unkown
page read and write
9111000
unkown
page read and write
13FE000
unkown
page read and write
17A7CA61000
heap
page read and write
261D5445000
heap
page read and write
9455000
unkown
page read and write
227E77E000
stack
page read and write
933B000
unkown
page read and write
942D000
unkown
page read and write
1BA379E4000
heap
page read and write
92BF000
unkown
page read and write
9361000
unkown
page read and write
C87E000
unkown
page read and write
9331000
unkown
page read and write
93A3000
unkown
page read and write
14690000
unkown
page read and write
17A7CA66000
heap
page read and write
93B5000
unkown
page read and write
1BA37300000
trusted library allocation
page read and write
1BA377C1000
heap
page read and write
E075000
unkown
page read and write
2DA157D0000
trusted library allocation
page read and write
943F000
unkown
page read and write
12362000
unkown
page read and write
1BA37827000
heap
page read and write
1BA377CC000
heap
page read and write
939F000
unkown
page read and write
A5094FD000
stack
page read and write
1BA37742000
heap
page read and write
B070000
unkown
page read and write
A508E7A000
stack
page read and write
1070000
unkown
page read and write
2DA15820000
trusted library allocation
page read and write
C2A9EB000
stack
page read and write
92C1000
unkown
page read and write
1BA378C4000
heap
page read and write
101B6000
unkown
page read and write
1BA37068000
trusted library allocation
page read and write
13C30000
unkown
page read and write
B0CB000
unkown
page read and write
2F52DFC000
stack
page read and write
DB87000
unkown
page read and write
1F82F8A0000
heap
page read and write
933B000
unkown
page read and write
1F830390000
heap
page read and write
933F000
unkown
page read and write
D436000
unkown
page read and write
146B0000
unkown
page read and write
1497000
heap
page read and write
1C03484B000
heap
page read and write
1BA3794F000
heap
page read and write
1BA31890000
heap
page read and write
92B9000
unkown
page read and write
18932CAB000
heap
page read and write
9107000
unkown
page read and write
90D5000
unkown
page read and write
1BA32E40000
trusted library section
page readonly
101D4000
unkown
page read and write
266FF251000
heap
page read and write
9461000
unkown
page read and write
1BA378E0000
heap
page read and write
9367000
unkown
page read and write
266FF070000
heap
page read and write
1BA37905000
heap
page read and write
D3E0000
unkown
page read and write
10184000
unkown
page read and write
4F3087C000
stack
page read and write
1BA3782C000
heap
page read and write
1190000
heap
page read and write
90F9000
unkown
page read and write
14710000
unkown
page read and write
93E7000
unkown
page read and write
B42B000
unkown
page read and write
BA70000
unkown
page read and write
9329000
unkown
page read and write
D94A000
unkown
page read and write
A508AFE000
stack
page read and write
E0CF000
unkown
page read and write
92CD000
unkown
page read and write
90D7000
unkown
page read and write
93D3000
unkown
page read and write
940D000
unkown
page read and write
93D7000
unkown
page read and write
938D000
unkown
page read and write
9469000
unkown
page read and write
169E000
unkown
page read and write
DCE9000
unkown
page read and write
9387000
unkown
page read and write
941F000
unkown
page read and write
1188000
heap
page read and write
123BA000
unkown
page read and write
FFE4C000
unkown
page execute read
266FF260000
heap
page read and write
D04D000
unkown
page read and write
1C82B46E000
heap
page read and write
1495C000
unkown
page read and write
939F000
unkown
page read and write
90AB000
unkown
page read and write
1BA37669000
heap
page read and write
1BA3785D000
heap
page read and write
D178000
unkown
page read and write
92BB000
unkown
page read and write
943D000
unkown
page read and write
1013E000
unkown
page read and write
938D000
unkown
page read and write
13BC7000
unkown
page read and write
1BA37858000
heap
page read and write
382577F000
stack
page read and write
9125000
unkown
page read and write
92DF000
unkown
page read and write
DCE9000
unkown
page read and write
261D5452000
heap
page read and write
CB54B7C000
stack
page read and write
1BA37634000
heap
page read and write
1BA37060000
trusted library allocation
page read and write
9349000
unkown
page read and write
943B000
unkown
page read and write
1BA378F5000
heap
page read and write
1C034913000
heap
page read and write
D927000
unkown
page read and write
9439000
unkown
page read and write
1BA37813000
heap
page read and write
93B3000
unkown
page read and write
932D000
unkown
page read and write
90AB000
unkown
page read and write
944B000
unkown
page read and write
1BA31E02000
heap
page read and write
937D000
unkown
page read and write
1F830392000
heap
page read and write
B4B0000
unkown
page read and write
1F83037F000
heap
page read and write
2E40000
unkown
page read and write
229C4F02000
heap
page read and write
1BA371DC000
trusted library allocation
page read and write
1BA377AD000
heap
page read and write
17A7CA29000
heap
page read and write
1BA371D0000
trusted library allocation
page read and write
2E40000
unkown
page read and write
1BA377D3000
heap
page read and write
B5C2000
unkown
page read and write
CC6D000
unkown
page read and write
940B000
unkown
page read and write
1BA37220000
trusted library allocation
page read and write
D7A3000
heap
page read and write
B0BF000
unkown
page read and write
10143000
unkown
page read and write
9379000
unkown
page read and write
1BA3798B000
heap
page read and write
910F000
unkown
page read and write
B4C2000
unkown
page read and write
1BE61258000
heap
page read and write
92AF000
unkown
page read and write
1BA3705C000
trusted library allocation
page read and write
1BA3762F000
heap
page read and write
498FE7B000
stack
page read and write
13110013000
heap
page read and write
1BA371DC000
trusted library allocation
page read and write
1BA371DC000
trusted library allocation
page read and write
65941000
unkown
page execute read
946F000
unkown
page read and write
12368000
unkown
page read and write
9103000
unkown
page read and write
D14D000
unkown
page read and write
13014000
unkown
page read and write
9291000
unkown
page read and write
9445000
unkown
page read and write
93BB000
unkown
page read and write
1BA37082000
trusted library allocation
page read and write
14102000
unkown
page read and write
B0D6000
unkown
page read and write
1BA378A4000
heap
page read and write
D92A000
unkown
page read and write
9387000
unkown
page read and write
D55E000
unkown
page read and write
926C000
unkown
page read and write
D7A7000
unkown
page read and write
1171000
heap
page read and write
3153000
heap
page read and write
1BA32840000
trusted library allocation
page read and write
101CA000
unkown
page read and write
BA70000
unkown
page read and write
1BE61A02000
trusted library allocation
page read and write
9361000
unkown
page read and write
D178000
unkown
page read and write
93F1000
unkown
page read and write
1BA32258000
heap
page read and write
1060000
unkown
page read and write
1F82FA29000
heap
page read and write
9353000
unkown
page read and write
1BA3707C000
trusted library allocation
page read and write
1158000
heap
page read and write
B0DE000
unkown
page read and write
2E50000
unkown
page readonly
1C034855000
heap
page read and write
92AB000
unkown
page read and write
D8B0000
unkown
page read and write
229C4E6D000
heap
page read and write
140ED000
unkown
page read and write
1AE09EA0000
heap
page read and write
C97F000
unkown
page read and write
E021000
unkown
page read and write
90FF000
unkown
page read and write
93C7000
unkown
page read and write
D425000
unkown
page read and write
D30B000
unkown
page read and write
9457000
unkown
page read and write
BD80000
unkown
page read and write
112A000
heap
page read and write
1BA37626000
heap
page read and write
932F000
unkown
page read and write
E19F000
unkown
page read and write
B449000
unkown
page read and write
A212000
unkown
page read and write
B4B0000
unkown
page read and write
E1C6000
unkown
page read and write
9357000
unkown
page read and write
912B000
unkown
page read and write
1190000
heap
page read and write
1BA323D6000
heap
page read and write
92EB000
unkown
page read and write
D947000
unkown
page read and write
169E000
unkown
page read and write
B44B000
unkown
page read and write
1BA378DC000
heap
page read and write
B0CF000
unkown
page read and write
1BA31E00000
heap
page read and write
944D000
unkown
page read and write
266FF266000
heap
page read and write
92B7000
unkown
page read and write
9407000
unkown
page read and write
911D000
unkown
page read and write
146C0000
unkown
page read and write
1BA378A7000
heap
page read and write
D391000
unkown
page read and write
1F82FB16000
heap
page read and write
1BA377EA000
heap
page read and write
C83C000
unkown
page read and write
18932BB0000
heap
page read and write
1BA32396000
heap
page read and write
D27F000
unkown
page read and write
16E88C5B000
heap
page read and write
11C4000
heap
page read and write
93DB000
unkown
page read and write
10125000
unkown
page read and write
9425000
unkown
page read and write
9463000
unkown
page read and write
938B000
unkown
page read and write
D425000
unkown
page read and write
1BA37865000
heap
page read and write
1BA37984000
heap
page read and write
2DA15370000
trusted library allocation
page read and write
DFB0000
unkown
page readonly
18932A60000
heap
page read and write
1BA37926000
heap
page read and write
1C82B413000
heap
page read and write
1BA3762D000
heap
page read and write
1BA31F02000
heap
page read and write
4BA2ECC000
stack
page read and write
116C000
heap
page read and write
1C830A00000
trusted library allocation
page read and write
E8A000
stack
page read and write
14820000
unkown
page read and write
65B97000
unkown
page read and write
1BA323D1000
heap
page read and write
1BA32360000
heap
page read and write
1AE0A013000
heap
page read and write
FB7E000
unkown
page read and write
1BA3762D000
heap
page read and write
25A86190000
trusted library allocation
page read and write
D460000
unkown
page read and write
93DB000
unkown
page read and write
1410000
unkown
page readonly
1BA37815000
heap
page read and write
D281000
unkown
page read and write
D150000
unkown
page read and write
E075000
unkown
page read and write
93C1000
unkown
page read and write
92AB000
unkown
page read and write
E143000
unkown
page read and write
B0C6000
unkown
page read and write
11CD000
heap
page read and write
9389000
unkown
page read and write
1C830D00000
heap
page read and write
4F308FD000
stack
page read and write
56AC27E000
stack
page read and write
932F000
unkown
page read and write
266FF28D000
heap
page read and write
101ED000
unkown
page read and write
92B3000
unkown
page read and write
C87E000
unkown
page read and write
DABC000
unkown
page read and write
DA37000
unkown
page read and write
1BA37260000
trusted library allocation
page read and write
1BA379D4000
heap
page read and write
CBFC000
unkown
page read and write
12552000
unkown
page read and write
1F830379000
heap
page read and write
12418000
unkown
page read and write
140CD000
unkown
page read and write
FCAB000
unkown
page read and write
1012A000
unkown
page read and write
101BB000
unkown
page read and write
9339000
unkown
page read and write
1BA377E5000
heap
page read and write
944F000
unkown
page read and write
92DF000
unkown
page read and write
CB5497B000
stack
page read and write
13BE000
unkown
page read and write
93D7000
unkown
page read and write
1BA37981000
heap
page read and write
101DE000
unkown
page read and write
1BA37080000
trusted library allocation
page read and write
1400000
unkown
page readonly
1BA3774F000
heap
page read and write
DB87000
unkown
page read and write
1BA323D7000
heap
page read and write
14725000
unkown
page read and write
10157000
unkown
page read and write
1BE61213000
heap
page read and write
1C8309D0000
trusted library allocation
page read and write
1BA3784D000
heap
page read and write
12362000
unkown
page read and write
9389000
unkown
page read and write
D13D000
unkown
page read and write
1BA32354000
heap
page read and write
1BA37749000
heap
page read and write
12D10000
unkown
page readonly
93FF000
unkown
page read and write
934D000
unkown
page read and write
4F30AFE000
stack
page read and write
10184000
unkown
page read and write
1BA370AE000
trusted library allocation
page read and write
13D6C000
unkown
page read and write
FB6A000
unkown
page read and write
DA4E000
unkown
page read and write
93CF000
unkown
page read and write
9421000
unkown
page read and write
1BA31FB0000
heap
page read and write
4F30DFE000
stack
page read and write
1C82BD02000
heap
page read and write
C2B57E000
stack
page read and write
9357000
unkown
page read and write
1F830060000
trusted library allocation
page read and write
10579000
unkown
page read and write
1BA37080000
trusted library allocation
page read and write
D14D000
unkown
page read and write
D281000
unkown
page read and write
CC20000
unkown
page read and write
D29C000
unkown
page read and write
CEFE000
unkown
page read and write
FB6F000
unkown
page read and write
1BA371D0000
trusted library allocation
page read and write
A50917F000
stack
page read and write
910D000
unkown
page read and write
1BA37661000
heap
page read and write
1BA3784D000
heap
page read and write
123AA000
unkown
page read and write
14500000
unkown
page read and write
F6B000
stack
page read and write
1BA371D4000
trusted library allocation
page read and write
93ED000
unkown
page read and write
2DA16100000
trusted library allocation
page read and write
116C000
heap
page read and write
123D4000
unkown
page read and write
9447000
unkown
page read and write
B449000
unkown
page read and write
9111000
unkown
page read and write
D7A0000
unkown
page read and write
1C035002000
trusted library allocation
page read and write
1BA377E5000
heap
page read and write
49900FF000
stack
page read and write
A139000
unkown
page read and write
1BA3779A000
heap
page read and write
BA60000
unkown
page readonly
C2B67A000
stack
page read and write
1BA3777D000
heap
page read and write
1C82B3F0000
trusted library allocation
page read and write
D973000
unkown
page read and write
101DE000
unkown
page read and write
92DB000
unkown
page read and write
101C0000
unkown
page read and write
CAFE000
unkown
page read and write
92AD000
unkown
page read and write
1AE0A029000
heap
page read and write
B09C000
unkown
page read and write
C73D000
unkown
page read and write
1BA37613000
heap
page read and write
DA5C000
unkown
page read and write
101B1000
unkown
page read and write
9407000
unkown
page read and write
B464000
unkown
page read and write
9463000
unkown
page read and write
12399000
unkown
page read and write
3150000
heap
page read and write
1BA377B6000
heap
page read and write
92CB000
unkown
page read and write
9355000
unkown
page read and write
13CD0000
unkown
page read and write
1BA37913000
heap
page read and write
BD80000
heap
page read and write
DD3F000
unkown
page read and write
1BA31FD8000
heap
page read and write
1BA379E2000
heap
page read and write
B4B0000
unkown
page read and write
1BA3785C000
heap
page read and write
92DD000
unkown
page read and write
CEAD000
unkown
page read and write
1BA31F1D000
heap
page read and write
1BA37917000
heap
page read and write
D937000
unkown
page read and write
1BA37856000
heap
page read and write
14BF0000
unkown
page execute and read and write
B837BFF000
stack
page read and write
9339000
unkown
page read and write
9475000
unkown
page read and write
266FF0D0000
heap
page read and write
FFE25000
unkown
page execute read
1BE611A0000
trusted library allocation
page read and write
1F830389000
heap
page read and write
936B000
unkown
page read and write
1253A000
unkown
page read and write
93E9000
unkown
page read and write
93B9000
unkown
page read and write
9323000
unkown
page read and write
1C034881000
heap
page read and write
1476B000
unkown
page read and write
93E7000
unkown
page read and write
9105000
unkown
page read and write
2F532FB000
stack
page read and write
25A85C29000
heap
page read and write
1BA371B0000
trusted library allocation
page read and write
17A7CA3A000
heap
page read and write
1C82BC15000
heap
page read and write
1BA371DC000
trusted library allocation
page read and write
B4FB000
unkown
page read and write
BEDC000
unkown
page read and write
DA3F000
unkown
page read and write
1BA3785E000
heap
page read and write
11E0000
heap
page read and write
BD80000
heap
page read and write
1BA3782C000
heap
page read and write
1F830374000
heap
page read and write
261D542F000
heap
page read and write
9337000
unkown
page read and write
D16E000
unkown
page read and write
92E5000
unkown
page read and write
9295000
unkown
page read and write
101AC000
unkown
page read and write
DA5C000
unkown
page read and write
1188000
heap
page read and write
910F000
unkown
page read and write
B486000
unkown
page read and write
9413000
unkown
page read and write
18932CB6000
heap
page read and write
937F000
unkown
page read and write
101E3000
unkown
page read and write
1BA371D4000
trusted library allocation
page read and write
1BA323D5000
heap
page read and write
13110802000
trusted library allocation
page read and write
1467E000
unkown
page read and write
92E5000
unkown
page read and write
933B000
unkown
page read and write
D349000
unkown
page read and write
1015C000
unkown
page read and write
1BA3707A000
trusted library allocation
page read and write
123F2000
unkown
page read and write
A508FFF000
stack
page read and write
100CB000
unkown
page read and write
DB91000
unkown
page read and write
B489000
unkown
page read and write
10FE000
heap
page read and write
B0CB000
unkown
page read and write
9447000
unkown
page read and write
B2EC000
unkown
page read and write
E8A000
stack
page read and write
1F82FAFB000
heap
page read and write
3040000
unkown
page read and write
D3BB000
unkown
page read and write
FFE4E000
unkown
page execute read
9417000
unkown
page read and write
93EF000
unkown
page read and write
25A859C0000
heap
page read and write
92B9000
unkown
page read and write
17A7CA45000
heap
page read and write
D947000
unkown
page read and write
261D5454000
heap
page read and write
12439000
unkown
page read and write
DCB9000
unkown
page read and write
9459000
unkown
page read and write
D79F000
unkown
page read and write
1C830CDC000
heap
page read and write
9451000
unkown
page read and write
227EAF7000
stack
page read and write
1BA37065000
trusted library allocation
page read and write
14102000
unkown
page read and write
E073000
unkown
page read and write
93CD000
unkown
page read and write
940D000
unkown
page read and write
49901FE000
stack
page read and write
1BA31FCE000
heap
page read and write
1F830802000
heap
page read and write
90FF000
unkown
page read and write
1C830C00000
heap
page read and write
928F000
unkown
page read and write
B086000
unkown
page read and write
D3A5000
unkown
page read and write
1BA3705C000
trusted library allocation
page read and write
D32A000
unkown
page read and write
1C82BBD0000
trusted library allocation
page read and write
1BA31F6D000
heap
page read and write
1476B000
unkown
page read and write
112A000
unkown
page read and write
101C5000
unkown
page read and write
1BA3796E000
heap
page read and write
B83759E000
stack
page read and write
10BE000
unkown
page read and write
92B1000
unkown
page read and write
17A7CA7D000
heap
page read and write
1BA3764F000
heap
page read and write
912B000
unkown
page read and write
932B000
unkown
page read and write
1BA379DB000
heap
page read and write
3020000
heap
page read and write
D97B000
unkown
page read and write
1C82C3F0000
trusted library section
page readonly
30D0000
unkown
page read and write
261D53D0000
heap
page read and write
1BA37738000
heap
page read and write
1BA377B6000
heap
page read and write
FFE20000
unkown
page readonly
FFE4E000
unkown
page execute read
9129000
unkown
page read and write
1C034900000
heap
page read and write
DA4E000
unkown
page read and write
D250000
unkown
page read and write
1BE61267000
heap
page read and write
A15B000
unkown
page read and write
14800000
unkown
page read and write
D3B5000
unkown
page read and write
E1C8000
unkown
page read and write
1BA3762D000
heap
page read and write
90D9000
unkown
page read and write
1BA323D1000
heap
page read and write
940F000
unkown
page read and write
10DB000
heap
page read and write
D97B000
unkown
page read and write
E010000
unkown
page read and write
9347000
unkown
page read and write
FB74000
unkown
page read and write
140F2000
unkown
page read and write
D92A000
unkown
page read and write
1310FE60000
heap
page read and write
B8379FB000
stack
page read and write
1BA32E10000
trusted library section
page readonly
1C82BC02000
heap
page read and write
1418B000
unkown
page read and write
65B97000
unkown
page read and write
F6F000
stack
page read and write
946D000
unkown
page read and write
9475000
unkown
page read and write
92CB000
unkown
page read and write
10FE000
heap
page read and write
1BA3185A000
heap
page read and write
B090000
unkown
page read and write
140D8000
unkown
page read and write
140DD000
unkown
page read and write
1BA3762F000
heap
page read and write
498FF7E000
stack
page read and write
936B000
unkown
page read and write
92EB000
unkown
page read and write
90D9000
unkown
page read and write
9439000
unkown
page read and write
11B1000
heap
page read and write
14156000
unkown
page read and write
1C82B370000
trusted library section
page read and write
1BA36F30000
trusted library allocation
page read and write
D960000
unkown
page read and write
11C6000
unkown
page read and write
9291000
unkown
page read and write
9129000
unkown
page read and write
B47C000
unkown
page read and write
B2EC000
unkown
page read and write
105E000
unkown
page read and write
2DA157C0000
heap
page readonly
17A7C7F0000
heap
page read and write
9123000
unkown
page read and write
93D1000
unkown
page read and write
1487E000
unkown
page read and write
1BA3782C000
heap
page read and write
12430000
unkown
page read and write
12350000
unkown
page read and write
101CF000
unkown
page read and write
10D0000
unkown
page read and write
92D9000
unkown
page read and write
938B000
unkown
page read and write
1BA32202000
heap
page read and write
DB87000
unkown
page read and write
1018E000
unkown
page read and write
17A7CA73000
heap
page read and write
1BA37894000
heap
page read and write
1BA37893000
heap
page read and write
912D000
unkown
page read and write
911F000
unkown
page read and write
940B000
unkown
page read and write
1BA31630000
heap
page read and write
1BA3799A000
heap
page read and write
1C8309E0000
trusted library allocation
page read and write
9397000
unkown
page read and write
9425000
unkown
page read and write
9397000
unkown
page read and write
3020000
heap
page read and write
E1F0000
unkown
page read and write
B435000
unkown
page read and write
11C6000
heap
page read and write
1400000
unkown
page readonly
229C5732000
heap
page read and write
100DD000
unkown
page read and write
1BE61313000
heap
page read and write
B2AD000
unkown
page read and write
93AD000
unkown
page read and write
1BA37076000
trusted library allocation
page read and write
56AC179000
stack
page read and write
93E3000
unkown
page read and write
934F000
unkown
page read and write
123BF000
unkown
page read and write
1F830120000
remote allocation
page read and write
1BA3774F000
heap
page read and write
1497000
heap
page read and write
1F82FAC9000
heap
page read and write
93BD000
unkown
page read and write
11B1000
unkown
page read and write
D32A000
unkown
page read and write
13110077000
heap
page read and write
941F000
unkown
page read and write
92AB000
unkown
page read and write
93D7000
unkown
page read and write
93F9000
unkown
page read and write
B464000
unkown
page read and write
93B1000
unkown
page read and write
9401000
unkown
page read and write
2DA155B8000
heap
page read and write
1C82B476000
heap
page read and write
D973000
unkown
page read and write
9343000
unkown
page read and write
E1D0000
unkown
page read and write
F81D9FC000
stack
page read and write
926C000
unkown
page read and write
1497000
heap
page read and write
93C7000
unkown
page read and write
16E88C58000
heap
page read and write
9367000
unkown
page read and write
B496000
unkown
page read and write
14510000
unkown
page readonly
10125000
unkown
page read and write
229C4D30000
heap
page read and write
140ED000
unkown
page read and write
B0EF000
unkown
page read and write
B0D4000
unkown
page read and write
9293000
unkown
page read and write
25A85C5B000
heap
page read and write
18932CCE000
heap
page read and write
123F4000
unkown
page read and write
1BA3785D000
heap
page read and write
1BA323C7000
heap
page read and write
1F830399000
heap
page read and write
D27F000
unkown
page read and write
1F830382000
heap
page read and write
100DD000
unkown
page read and write
D32A000
unkown
page read and write
1BA37713000
heap
page read and write
147F0000
unkown
page read and write
12368000
unkown
page read and write
261D5448000
heap
page read and write
79F9BFF000
stack
page read and write
93E7000
unkown
page read and write
93B3000
unkown
page read and write
129D0000
unkown
page read and write
90F7000
unkown
page read and write
17A7CA40000
heap
page read and write
9101000
unkown
page read and write
A212000
unkown
page read and write
1C830D02000
heap
page read and write
93F3000
unkown
page read and write
13CF0000
unkown
page read and write
90D7000
unkown
page read and write
10DB000
heap
page read and write
A156000
unkown
page read and write
1BA37653000
heap
page read and write
9437000
unkown
page read and write
C97F000
unkown
page read and write
1C034870000
heap
page read and write
1BA378E0000
heap
page read and write
1AE0A058000
heap
page read and write
13CC0000
unkown
page read and write
939D000
unkown
page read and write
1F82FAB4000
heap
page read and write
933F000
unkown
page read and write
10161000
unkown
page read and write
92C1000
unkown
page read and write
1BA37240000
trusted library allocation
page read and write
1BA37070000
trusted library allocation
page read and write
93B9000
unkown
page read and write
C2B37F000
stack
page read and write
93C5000
unkown
page read and write
13110059000
heap
page read and write
FFE4A000
unkown
page execute read
124C0000
unkown
page read and write
93F9000
unkown
page read and write
1C03484D000
heap
page read and write
159E000
unkown
page read and write
1BA37980000
heap
page read and write
1BA323DB000
heap
page read and write
9329000
unkown
page read and write
9377000
unkown
page read and write
14107000
unkown
page read and write
1F830359000
heap
page read and write
CF73EFD000
stack
page read and write
1BA3777D000
heap
page read and write
1BA323D9000
heap
page read and write
1BA37902000
heap
page read and write
116C000
unkown
page read and write
382537E000
stack
page read and write
9337000
unkown
page read and write
D268000
unkown
page read and write
1F830844000
heap
page read and write
E19F000
unkown
page read and write
939F000
unkown
page read and write
937D000
unkown
page read and write
945B000
unkown
page read and write
1490000
heap
page read and write
1C82BD18000
heap
page read and write
1BA31F2C000
heap
page read and write
9353000
unkown
page read and write
1BA37330000
trusted library allocation
page read and write
BC6C000
unkown
page read and write
1496F000
unkown
page execute and read and write
1BA378DB000
heap
page read and write
1BA3707C000
trusted library allocation
page read and write
1BA3779B000
heap
page read and write
93AF000
unkown
page read and write
9057000
unkown
page read and write
90FB000
unkown
page read and write
1BA379E2000
heap
page read and write
11B1000
heap
page read and write
1BA3764D000
heap
page read and write
93CF000
unkown
page read and write
1AE0A670000
trusted library allocation
page read and write
9381000
unkown
page read and write
261D5502000
heap
page read and write
D29C000
unkown
page read and write
266FF200000
heap
page read and write
12521000
unkown
page read and write
936F000
unkown
page read and write
12CF0000
unkown
page readonly
DBFB000
unkown
page read and write
9349000
unkown
page read and write
1BA37866000
heap
page read and write
93B1000
unkown
page read and write
FA0000
unkown
page readonly
92E9000
unkown
page read and write
1BA37638000
heap
page read and write
1C830A20000
remote allocation
page read and write
9437000
unkown
page read and write
123AA000
unkown
page read and write
1BE61170000
heap
page read and write
9107000
unkown
page read and write
1BA3707E000
trusted library allocation
page read and write
B510000
unkown
page readonly
92C1000
unkown
page read and write
1BA370C5000
trusted library allocation
page read and write
93A7000
unkown
page read and write
266FF25B000
heap
page read and write
1F830377000
heap
page read and write
11CD000
unkown
page read and write
9125000
unkown
page read and write
16E88C5F000
heap
page read and write
2F533FB000
stack
page read and write
1BA37260000
trusted library allocation
page read and write
9417000
unkown
page read and write
93D5000
unkown
page read and write
123A7000
unkown
page read and write
1BA3786E000
heap
page read and write
1BA3774F000
heap
page read and write
B4E2000
unkown
page read and write
13C30000
unkown
page read and write
FFE59000
unkown
page readonly
1BA371C0000
trusted library allocation
page read and write
3060000
unkown
page write copy
910F000
unkown
page read and write
90D5000
unkown
page read and write
A45C000
unkown
page read and write
B0E1000
unkown
page read and write
1F82FAAA000
heap
page read and write
B449000
unkown
page read and write
93E1000
unkown
page read and write
9377000
unkown
page read and write
14BCE000
unkown
page read and write
944D000
unkown
page read and write
9333000
unkown
page read and write
1BA31829000
heap
page read and write
4BA337E000
stack
page read and write
945F000
unkown
page read and write
1BA370C5000
trusted library allocation
page read and write
9423000
unkown
page read and write
DC30000
unkown
page read and write
9367000
unkown
page read and write
D407000
unkown
page read and write
93FF000
unkown
page read and write
937B000
unkown
page read and write
261D5370000
heap
page read and write
1BA37865000
heap
page read and write
93F7000
unkown
page read and write
1BA378E0000
heap
page read and write
D3E0000
unkown
page read and write
1BA3774F000
heap
page read and write
D931000
unkown
page read and write
D98F000
unkown
page read and write
1BA3765F000
heap
page read and write
92D7000
unkown
page read and write
D150000
unkown
page read and write
BC6C000
unkown
page read and write
B435000
unkown
page read and write
1F82FA4D000
heap
page read and write
1BA373F0000
trusted library allocation
page read and write
1BA378BF000
heap
page read and write
1C03483C000
heap
page read and write
14810000
unkown
page read and write
1BA37270000
trusted library allocation
page read and write
1BA377F1000
heap
page read and write
8DDE879000
stack
page read and write
17A7CA6A000
heap
page read and write
9373000
unkown
page read and write
1BA31DB0000
trusted library allocation
page read and write
1BA31F54000
heap
page read and write
2DA15810000
heap
page read and write
93F3000
unkown
page read and write
B42B000
unkown
page read and write
1BA378B3000
heap
page read and write
13CD0000
unkown
page read and write
1C82B49D000
heap
page read and write
1BA37743000
heap
page read and write
93C1000
unkown
page read and write
1017F000
unkown
page read and write
9111000
unkown
page read and write
169E000
unkown
page read and write
1BA37661000
heap
page read and write
FFE42000
unkown
page execute read
1F82FA49000
heap
page read and write
79F96FE000
stack
page read and write
9381000
unkown
page read and write
DCA8000
unkown
page read and write
18932CC4000
heap
page read and write
14690000
unkown
page read and write
9125000
unkown
page read and write
939B000
unkown
page read and write
93B7000
unkown
page read and write
1C830C0D000
heap
page read and write
941F000
unkown
page read and write
9369000
unkown
page read and write
93FF000
unkown
page read and write
9113000
unkown
page read and write
92BF000
unkown
page read and write
D69E000
unkown
page read and write
266FF284000
heap
page read and write
16E88C64000
heap
page read and write
D7A3000
unkown
page read and write
936F000
unkown
page read and write
1BA37946000
heap
page read and write
1400000
unkown
page readonly
93C9000
unkown
page read and write
9411000
unkown
page read and write
9101000
unkown
page read and write
9349000
unkown
page read and write
1158000
heap
page read and write
D55E000
unkown
page read and write
B5C2000
unkown
page read and write
941F000
unkown
page read and write
9331000
unkown
page read and write
D924000
unkown
page read and write
D3BB000
unkown
page read and write
9327000
unkown
page read and write
25A85A30000
heap
page read and write
D04D000
unkown
page read and write
1BA371D0000
trusted library allocation
page read and write
1BA377E5000
heap
page read and write
147B7000
unkown
page read and write
93C5000
unkown
page read and write
9381000
unkown
page read and write
1C82BD00000
heap
page read and write
92E3000
unkown
page read and write
1070000
unkown
page read and write
90D9000
unkown
page read and write
133E0000
unkown
page read and write
DFB0000
unkown
page readonly
B09C000
unkown
page read and write
92E1000
unkown
page read and write
4F30A7B000
stack
page read and write
90D7000
unkown
page read and write
9419000
unkown
page read and write
1BA31855000
heap
page read and write
CD69000
unkown
page read and write
B83751E000
stack
page read and write
1C830CE4000
heap
page read and write
9455000
unkown
page read and write
1BA323B2000
heap
page read and write
1BA379D4000
heap
page read and write
9341000
unkown
page read and write
DAC7000
unkown
page read and write
93DF000
unkown
page read and write
B154000
unkown
page read and write
9329000
unkown
page read and write
90FB000
unkown
page read and write
B097000
unkown
page read and write
1F82FA55000
heap
page read and write
30D0000
unkown
page read and write
D934000
unkown
page read and write
1BA37634000
heap
page read and write
146D0000
unkown
page read and write
1BA3782C000
heap
page read and write
1BA3774F000
heap
page read and write
CABC000
unkown
page read and write
9435000
unkown
page read and write
E145000
unkown
page read and write
9441000
unkown
page read and write
1C82B1F0000
heap
page read and write
1BA3765B000
heap
page read and write
90F9000
unkown
page read and write
1F830377000
heap
page read and write
9403000
unkown
page read and write
10F4B000
unkown
page read and write
B9A0000
unkown
page readonly
E021000
unkown
page read and write
D921000
unkown
page read and write
1BA3786B000
heap
page read and write
9399000
unkown
page read and write
65B8C000
unkown
page read and write
227E97A000
stack
page read and write
1BA37610000
heap
page read and write
A09B000
unkown
page read and write
14166000
unkown
page read and write
1BA3785D000
heap
page read and write
B4E2000
unkown
page read and write
13110102000
heap
page read and write
1F82FA8A000
heap
page read and write
942B000
unkown
page read and write
93D9000
unkown
page read and write
12D4D000
unkown
page read and write
227EBFF000
stack
page read and write
9377000
unkown
page read and write
1C82BD13000
heap
page read and write
A156000
unkown
page read and write
B47C000
unkown
page read and write
1BA37856000
heap
page read and write
1BA32379000
heap
page read and write
2DA1561D000
heap
page read and write
E145000
unkown
page read and write
944F000
unkown
page read and write
CF738FE000
stack
page read and write
941D000
unkown
page read and write
1F8303B5000
heap
page read and write
10BE000
unkown
page read and write
92B3000
unkown
page read and write
1016B000
unkown
page read and write
93AF000
unkown
page read and write
56AC0FE000
stack
page read and write
946B000
unkown
page read and write
934F000
unkown
page read and write
1480000
unkown
page readonly
13C80000
unkown
page read and write
1BA3789B000
heap
page read and write
1BA32B40000
trusted library allocation
page read and write
1BA37170000
remote allocation
page read and write
18A0000
unkown
page readonly
A0A1000
unkown
page read and write
1BA37872000
heap
page read and write
1070000
unkown
page read and write
D3E4000
unkown
page read and write
1BA323A6000
heap
page read and write
9373000
unkown
page read and write
D92A000
unkown
page read and write
1440000
unkown
page readonly
93D9000
unkown
page read and write
1190000
unkown
page read and write
CC6D000
unkown
page read and write
B489000
unkown
page read and write
945B000
unkown
page read and write
4BA327C000
stack
page read and write
1BE61300000
heap
page read and write
1BA32E30000
trusted library section
page readonly
312C000
unkown
page read and write
123D4000
unkown
page read and write
1BA3773C000
heap
page read and write
14075000
unkown
page read and write
90FD000
unkown
page read and write
926C000
unkown
page read and write
1BA377C4000
heap
page read and write
133E5000
unkown
page read and write
1BA378E0000
heap
page read and write
93B5000
unkown
page read and write
11B1000
heap
page read and write
9403000
unkown
page read and write
B2EC000
unkown
page read and write
B0DE000
unkown
page read and write
1BA3762D000
heap
page read and write
93EF000
unkown
page read and write
912D000
unkown
page read and write
BD6E000
unkown
page read and write
227E6FE000
stack
page read and write
D436000
unkown
page read and write
14810000
unkown
page read and write
1BA32E20000
trusted library section
page readonly
1F83037B000
heap
page read and write
1BA377D5000
heap
page read and write
17A7CA5C000
heap
page read and write
937F000
unkown
page read and write
92D7000
unkown
page read and write
2DA15815000
heap
page read and write
1BA374B0000
trusted library allocation
page read and write
1C82B456000
heap
page read and write
93FD000
unkown
page read and write
9445000
unkown
page read and write
D42A000
unkown
page read and write
1C830CD7000
heap
page read and write
DD39000
unkown
page read and write
10198000
unkown
page read and write
9325000
unkown
page read and write
92AF000
unkown
page read and write
946D000
unkown
page read and write
229C4E00000
heap
page read and write
B0CD000
unkown
page read and write
A562000
unkown
page read and write
DC2A000
unkown
page read and write
1A20000
unkown
page readonly
12D4D000
unkown
page read and write
229C4ECC000
heap
page read and write
934D000
unkown
page read and write
14570000
heap
page read and write
14800000
unkown
page read and write
93FB000
unkown
page read and write
1BA37893000
heap
page read and write
D432000
unkown
page read and write
1470000
unkown
page readonly
C73D000
unkown
page read and write
261D5402000
heap
page read and write
A139000
unkown
page read and write
25A85C13000
heap
page read and write
1BA37634000
heap
page read and write
13BE000
unkown
page read and write
CBFC000
unkown
page read and write
9125000
unkown
page read and write
14CB0000
unkown
page read and write
911B000
unkown
page read and write
C2B87F000
stack
page read and write
9411000
unkown
page read and write
9397000
unkown
page read and write
266FF229000
heap
page read and write
933F000
unkown
page read and write
92BD000
unkown
page read and write
1BA3762F000
heap
page read and write
93CD000
unkown
page read and write
93C5000
unkown
page read and write
1BA378CF000
heap
page read and write
A5096FE000
stack
page read and write
D16C000
unkown
page read and write
11E5000
heap
page read and write
A508BFB000
stack
page read and write
3153000
heap
page read and write
9457000
unkown
page read and write
E1C8000
unkown
page read and write
1470000
unkown
page readonly
CC10000
unkown
page read and write
934F000
unkown
page read and write
1BA37957000
heap
page read and write
1BA37042000
trusted library allocation
page read and write
D432000
unkown
page read and write
133E5000
unkown
page read and write
1C830CF0000
heap
page read and write
1171000
heap
page read and write
1F830802000
heap
page read and write
14570000
heap
page read and write
93B7000
unkown
page read and write
FB83000
unkown
page read and write
9371000
unkown
page read and write
159E000
unkown
page read and write
B0D4000
unkown
page read and write
A5088FA000
stack
page read and write
FBB0000
unkown
page read and write
A159000
unkown
page read and write
E147000
unkown
page read and write
92DD000
unkown
page read and write
1253A000
unkown
page read and write
9399000
unkown
page read and write
9451000
unkown
page read and write
B165000
unkown
page read and write
C97F000
unkown
page read and write
17A7CB02000
heap
page read and write
1490000
heap
page read and write
B410000
unkown
page read and write
9409000
unkown
page read and write
1BA3779C000
heap
page read and write
101BB000
unkown
page read and write
9335000
unkown
page read and write
FFE48000
unkown
page execute read
A159000
unkown
page read and write
9405000
unkown
page read and write
D924000
unkown
page read and write
D944000
unkown
page read and write
1BA37852000
heap
page read and write
17A7CA63000
heap
page read and write
9121000
unkown
page read and write
93BF000
unkown
page read and write
CB54E7E000
stack
page read and write
DAC7000
unkown
page read and write
FFE48000
unkown
page execute read
FB6F000
unkown
page read and write
93E3000
unkown
page read and write
D941000
unkown
page read and write
11A1000
heap
page read and write
1AE0A040000
heap
page read and write
1C034E80000
trusted library allocation
page read and write
DEBC000
unkown
page read and write
9379000
unkown
page read and write
148FB000
unkown
page read and write
A14D000
unkown
page read and write
DC1E000
unkown
page read and write
93BF000
unkown
page read and write
146A0000
unkown
page read and write
1BA377F0000
heap
page read and write
9437000
unkown
page read and write
9329000
unkown
page read and write
101D9000
unkown
page read and write
CDAD000
unkown
page read and write
1102000
unkown
page read and write
1240A000
unkown
page read and write
2DA157E0000
trusted library allocation
page read and write
910D000
unkown
page read and write
C83C000
unkown
page read and write
1BA377F9000
heap
page read and write
16E88C5C000
heap
page read and write
1C8308F0000
trusted library allocation
page read and write
93FD000
unkown
page read and write
13D72000
unkown
page read and write
1C8308E0000
trusted library allocation
page read and write
105E000
unkown
page read and write
F81DE7F000
stack
page read and write
DAB6000
unkown
page read and write
13D83000
unkown
page read and write
E0CF000
unkown
page read and write
DC41000
unkown
page read and write
1BA378E0000
heap
page read and write
9117000
unkown
page read and write
9377000
unkown
page read and write
93A3000
unkown
page read and write
9451000
unkown
page read and write
9123000
unkown
page read and write
FFE31000
unkown
page execute read
16E88C2A000
heap
page read and write
1412C000
unkown
page read and write
B837CFD000
stack
page read and write
93A1000
unkown
page read and write
B0D6000
unkown
page read and write
FB6A000
unkown
page read and write
4BA35FD000
stack
page read and write
1252B000
unkown
page read and write
1BA3188D000
heap
page read and write
1BA37655000
heap
page read and write
93E5000
unkown
page read and write
1BA372E0000
trusted library allocation
page read and write
B0CB000
unkown
page read and write
1F830390000
heap
page read and write
93C3000
unkown
page read and write
CD69000
unkown
page read and write
1BA3778D000
heap
page read and write
DBAB000
unkown
page read and write
1BA323D2000
heap
page read and write
229C4EE3000
heap
page read and write
1F8303A1000
heap
page read and write
14D00000
remote allocation
page read and write
1BA37869000
heap
page read and write
943B000
unkown
page read and write
13CFB000
unkown
page read and write
1BA323D1000
heap
page read and write
9419000
unkown
page read and write
9459000
unkown
page read and write
9441000
unkown
page read and write
100A3000
unkown
page read and write
1BA37669000
heap
page read and write
9449000
unkown
page read and write
1440000
unkown
page readonly
B45A000
unkown
page read and write
D150000
unkown
page read and write
12531000
unkown
page read and write
9293000
unkown
page read and write
D941000
unkown
page read and write
9123000
unkown
page read and write
101CF000
unkown
page read and write
E073000
unkown
page read and write
56AC2FC000
stack
page read and write
940D000
unkown
page read and write
13C90000
unkown
page readonly
9123000
unkown
page read and write
1BA323D5000
heap
page read and write
1BA377BC000
heap
page read and write
11C6000
heap
page read and write
B0B5000
unkown
page read and write
92B3000
unkown
page read and write
DC20000
unkown
page read and write
1BA379E4000
heap
page read and write
1BA37743000
heap
page read and write
9393000
unkown
page read and write
9345000
unkown
page read and write
935B000
unkown
page read and write
30D0000
unkown
page read and write
100E4000
unkown
page read and write
1BA37650000
heap
page read and write
92E3000
unkown
page read and write
11D0000
unkown
page readonly
1C82BD18000
heap
page read and write
B3EB000
unkown
page read and write
16E88C60000
heap
page read and write
910D000
unkown
page read and write
9359000
unkown
page read and write
CF73BFF000
stack
page read and write
1017A000
unkown
page read and write
1BA377FD000
heap
page read and write
1BA36EB0000
trusted library allocation
page read and write
D391000
unkown
page read and write
F6D000
stack
page read and write
12375000
unkown
page read and write
943F000
unkown
page read and write
56AC07F000
stack
page read and write
12551000
unkown
page execute and read and write
DCE1000
unkown
page read and write
9469000
unkown
page read and write
101ED000
unkown
page read and write
D97B000
unkown
page read and write
9417000
unkown
page read and write
B42B000
unkown
page read and write
D3E0000
unkown
page read and write
1BA3763C000
heap
page read and write
93B3000
unkown
page read and write
945D000
unkown
page read and write
1F8303B7000
heap
page read and write
93CB000
unkown
page read and write
93B7000
unkown
page read and write
1BA3762F000
heap
page read and write
1012A000
unkown
page read and write
D311000
unkown
page read and write
D93A000
unkown
page read and write
2DA155A0000
trusted library allocation
page read and write
9325000
unkown
page read and write
14107000
unkown
page read and write
14700000
unkown
page read and write
FFE40000
unkown
page execute read
9323000
unkown
page read and write
B0C8000
unkown
page read and write
261D5B30000
trusted library allocation
page read and write
90AB000
unkown
page read and write
9343000
unkown
page read and write
9433000
unkown
page read and write
B070000
unkown
page read and write
14838000
unkown
page read and write
92DB000
unkown
page read and write
92AD000
unkown
page read and write
There are 3343 hidden memdumps, click here to show them.