IOC Report
Remittance 17042024.doc

loading gif

Files

File Path
Type
Category
Malicious
Remittance 17042024.doc
Rich Text Format data, version 1
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\JBNvj66BwYU3yCv[1].scr
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp871B.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\dzoihohj75439.scr
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\egFUHsL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{3CFC4CBC-CC73-4F84-AD38-3C803376DE7D}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CD72746F-B24F-4EC2-824D-173D2D672EC5}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{DBF5DE36-20E6-4ABC-A935-FF242E1062DB}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{FE2D0FDB-7F0A-4F00-BC04-18F54428C4C8}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\2e5ld3mp.01s.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\cbort3bz.v4p.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\kq40lqt5.aq3.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\mrczgnzh.lig.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\nwrfmadv.nij.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\rstwkshw.nod.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\setomjxh.wux.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\tmp9A3D.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\wxypf1oa.alk.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Remittance 17042024.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:04 2023, mtime=Fri Aug 11 15:42:04 2023, atime=Thu Apr 18 07:23:49 2024, length=282583, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Generic INItialization configuration [folders]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\~$mittance 17042024.doc
data
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Users\user\AppData\Roaming\dzoihohj75439.scr
"C:\Users\user\AppData\Roaming\dzoihohj75439.scr"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dzoihohj75439.scr"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\egFUHsL.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\egFUHsL" /XML "C:\Users\user\AppData\Local\Temp\tmp871B.tmp"
malicious
C:\Users\user\AppData\Roaming\dzoihohj75439.scr
"C:\Users\user\AppData\Roaming\dzoihohj75439.scr"
malicious
C:\Users\user\AppData\Roaming\dzoihohj75439.scr
"C:\Users\user\AppData\Roaming\dzoihohj75439.scr"
malicious
C:\Users\user\AppData\Roaming\egFUHsL.exe
C:\Users\user\AppData\Roaming\egFUHsL.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\egFUHsL.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\egFUHsL.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\egFUHsL" /XML "C:\Users\user\AppData\Local\Temp\tmp9A3D.tmp"
malicious
C:\Users\user\AppData\Roaming\egFUHsL.exe
"C:\Users\user\AppData\Roaming\egFUHsL.exe"
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Windows\System32\taskeng.exe
taskeng.exe {E15E873E-836C-4FC1-A12D-690BEBE78D2E} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://covid19help.top/JBNvj66BwYU3yCv.scr
104.21.83.128
malicious
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
https://account.dyn.com/
unknown
http://crl.comodoca
unknown
http://crl.entrust.net/server1.crl0
unknown
https://covid19help.top/tV
unknown
http://ocsp.entrust.net03
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://covid19help.top/JBNvj66BwYU3yCv.scrC:
unknown
http://ocsp.entrust.net0D
unknown
https://covid19help.top/JBNvj66BwYU3yCv.scrj
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://covid19help.top/
unknown
https://secure.comodo.com/CPS0
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
https://covid19help.top/JBNvj66BwYU3yCv.scrttC:
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
covid19help.top
104.21.83.128
malicious
smtp.fshpxm.com
unknown
malicious
us2.smtp.mailhostbox.com
208.91.198.143
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
104.21.83.128
covid19help.top
United States
malicious
208.91.198.143
us2.smtp.mailhostbox.com
United States
208.95.112.1
ip-api.com
United States
208.91.199.225
unknown
United States
208.91.199.223
unknown
United States
208.91.199.224
unknown
United States
192.168.2.255
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
y"/
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Word
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
"#/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
,$/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\28508
28508
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\30251
30251
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\30251
30251
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\30251
30251
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\30251
30251
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\dzoihohj75439_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\dzoihohj75439_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\dzoihohj75439_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\dzoihohj75439_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\dzoihohj75439_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\dzoihohj75439_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\dzoihohj75439_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\dzoihohj75439_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\dzoihohj75439_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\dzoihohj75439_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\dzoihohj75439_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\dzoihohj75439_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Handshake\{E15E873E-836C-4FC1-A12D-690BEBE78D2E}
data
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\egFUHsL_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\egFUHsL_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\egFUHsL_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\egFUHsL_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\egFUHsL_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\egFUHsL_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\egFUHsL_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\egFUHsL_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\egFUHsL_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\egFUHsL_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\egFUHsL_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\egFUHsL_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
There are 390 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2351000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
33DE000
trusted library allocation
page read and write
malicious
2591000
trusted library allocation
page read and write
malicious
13DB3000
trusted library allocation
page read and write
16D63000
trusted library allocation
page read and write
ECFE000
trusted library allocation
page read and write
10E4C000
stack
page read and write
C921000
trusted library allocation
page read and write
17EB1000
trusted library allocation
page read and write
94CD000
stack
page read and write
79BD000
stack
page read and write
1838E000
trusted library allocation
page read and write
9D3D000
stack
page read and write
100000
trusted library allocation
page read and write
B36D000
stack
page read and write
D8BD000
stack
page read and write
18F2C000
trusted library allocation
page read and write
1800E000
trusted library allocation
page read and write
240000
trusted library allocation
page read and write
A52000
unkown
page execute read
1AD000
trusted library allocation
page execute and read and write
DB1D000
stack
page read and write
10D4E000
stack
page read and write
B77A000
trusted library allocation
page read and write
C4D000
stack
page read and write
1878C000
stack
page read and write
719000
heap
page read and write
1340C000
trusted library allocation
page read and write
1081D000
stack
page read and write
F1DC000
stack
page read and write
48B0000
heap
page read and write
F270000
trusted library allocation
page read and write
7F7D000
stack
page read and write
50B0000
trusted library section
page read and write
2C7000
heap
page read and write
CAA1000
trusted library allocation
page read and write
85EF000
stack
page read and write
11D96000
trusted library allocation
page read and write
DC2E000
trusted library allocation
page read and write
11EAC000
trusted library allocation
page read and write
A86C000
stack
page read and write
58A000
heap
page read and write
19808000
trusted library allocation
page read and write
B12C000
heap
page read and write
D53B000
trusted library allocation
page read and write
18B000
trusted library allocation
page execute and read and write
80ED000
stack
page read and write
13AA3000
trusted library allocation
page read and write
1C2000
trusted library allocation
page read and write
BF0D000
stack
page read and write
13D83000
trusted library allocation
page read and write
19114000
trusted library allocation
page read and write
DF95000
trusted library allocation
page read and write
125FE000
trusted library allocation
page read and write
18D8E000
trusted library allocation
page read and write
13B90000
trusted library allocation
page read and write
1D05C000
stack
page read and write
932D000
stack
page read and write
35B9000
trusted library allocation
page read and write
784C000
stack
page read and write
39EF000
stack
page read and write
11735000
trusted library allocation
page read and write
14DCD000
stack
page read and write
467000
heap
page read and write
1281C000
trusted library allocation
page read and write
13489000
trusted library allocation
page read and write
800000
heap
page read and write
70AD000
stack
page read and write
150B8000
trusted library allocation
page read and write
DA5E000
trusted library allocation
page read and write
6CE000
stack
page read and write
1502D000
stack
page read and write
F3D000
unkown
page execute read
636C000
stack
page read and write
134FE000
trusted library allocation
page read and write
9C9E000
stack
page read and write
5DE000
stack
page read and write
82CE000
stack
page read and write
1A5DD000
stack
page read and write
2435000
trusted library allocation
page read and write
445E000
stack
page read and write
89DC000
stack
page read and write
AEFC000
stack
page read and write
58BD000
stack
page read and write
17EF1000
trusted library allocation
page read and write
E5AC000
trusted library allocation
page read and write
BF9D000
stack
page read and write
17C5C000
stack
page read and write
4C2E000
stack
page read and write
1C3E000
stack
page read and write
28FF000
trusted library allocation
page read and write
A2ED000
stack
page read and write
17D31000
trusted library allocation
page read and write
FEED000
stack
page read and write
3237000
trusted library allocation
page read and write
5C45000
heap
page read and write
2A0000
heap
page read and write
7950000
heap
page read and write
2845000
trusted library allocation
page read and write
250000
trusted library allocation
page read and write
1650C000
stack
page read and write
81BD000
stack
page read and write
193000
trusted library allocation
page execute and read and write
122A3000
trusted library allocation
page read and write
D26D000
stack
page read and write
6A3C000
stack
page read and write
D50D000
stack
page read and write
1A68D000
stack
page read and write
258E000
stack
page read and write | page guard
D85D000
stack
page read and write
279F000
trusted library allocation
page read and write
14C5A000
trusted library allocation
page read and write
9C5E000
stack
page read and write
18194000
heap
page read and write
56E0000
heap
page read and write
3A0000
heap
page read and write
FD000
trusted library allocation
page execute and read and write
187A8000
trusted library allocation
page read and write
8EFD000
stack
page read and write
90000
trusted library allocation
page read and write
5F7000
heap
page read and write
126DE000
trusted library allocation
page read and write
FE3D000
stack
page read and write
702C000
stack
page read and write
D11D000
stack
page read and write
B19A000
heap
page read and write
EAFE000
trusted library allocation
page read and write
1140C000
stack
page read and write
1A45D000
stack
page read and write
1205E000
trusted library allocation
page read and write
E38E000
trusted library allocation
page read and write
3D74000
trusted library allocation
page read and write
18224000
heap
page read and write
350000
heap
page read and write
F8CC000
stack
page read and write
1567E000
stack
page read and write
610000
heap
page execute and read and write
3B73000
trusted library allocation
page read and write
719C000
stack
page read and write
E2AD000
stack
page read and write
E828000
trusted library allocation
page read and write
13605000
trusted library allocation
page read and write
181ED000
heap
page read and write
C52D000
stack
page read and write
10FAD000
stack
page read and write
5F63000
heap
page read and write
3657000
trusted library allocation
page read and write
23A8000
trusted library allocation
page read and write
10000
heap
page read and write
281F000
stack
page read and write
2975000
trusted library allocation
page read and write
18C7C000
trusted library allocation
page read and write
200000
heap
page read and write
18CB1000
trusted library allocation
page read and write
18242000
heap
page read and write
A3B000
trusted library allocation
page read and write
6D9D000
stack
page read and write
777D000
stack
page read and write
17FD8000
heap
page read and write
11D25000
trusted library allocation
page read and write
AED000
stack
page read and write
D155000
trusted library allocation
page read and write
FB0D000
stack
page read and write
1130D000
stack
page read and write
6EE000
heap
page read and write
11B4C000
trusted library allocation
page read and write
11CA5000
trusted library allocation
page read and write
1748F000
heap
page read and write
18C000
stack
page read and write
B124000
heap
page read and write
4C30000
heap
page read and write
13DCD000
stack
page read and write
B1B0000
heap
page read and write
12881000
trusted library allocation
page read and write
198AD000
stack
page read and write
1C41D000
stack
page read and write
CA21000
trusted library allocation
page read and write
16BA5000
trusted library allocation
page read and write
862D000
stack
page read and write
5BED000
stack
page read and write
19362000
trusted library allocation
page read and write
18785000
trusted library allocation
page read and write
E52C000
trusted library allocation
page read and write
1B22D000
stack
page read and write
BC0D000
stack
page read and write
6470000
heap
page read and write
5C9E000
heap
page read and write
E6EA000
trusted library allocation
page read and write
20000
heap
page read and write
4C7D000
stack
page read and write
119DD000
trusted library allocation
page read and write
300000
trusted library allocation
page read and write
1DF0000
heap
page read and write
19ABD000
trusted library allocation
page read and write
18A80000
trusted library allocation
page read and write
19204000
trusted library allocation
page read and write
B0A3000
heap
page read and write
B9AD000
stack
page read and write
97CD000
stack
page read and write
10E3D000
stack
page read and write
349000
stack
page read and write
9C12000
heap
page read and write
974D000
stack
page read and write
283D000
trusted library allocation
page read and write
1DD2C000
stack
page read and write
DB1C000
trusted library allocation
page read and write
5C0000
heap
page read and write
2A28000
trusted library allocation
page read and write
1750B000
heap
page read and write
AF3E000
stack
page read and write
6EAD000
stack
page read and write
1547D000
stack
page read and write
1BDAD000
stack
page read and write
1B65D000
stack
page read and write
6CFE000
stack
page read and write
8B7D000
stack
page read and write
14687000
trusted library allocation
page read and write
B19C000
heap
page read and write
BD9C000
stack
page read and write
EAA0000
trusted library allocation
page read and write
1C33D000
stack
page read and write
2984000
trusted library allocation
page read and write
1E0000
trusted library allocation
page read and write
52CD000
unkown
page read and write
4F7E000
stack
page read and write
13CDD000
trusted library allocation
page read and write
102AC000
stack
page read and write
174C1000
heap
page read and write
69FC000
stack
page read and write
18031000
trusted library allocation
page read and write
6D1F000
stack
page read and write
14D3C000
trusted library allocation
page read and write
13E6D000
trusted library allocation
page read and write
C15D000
stack
page read and write
77BD000
stack
page read and write
119B1000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
DECD000
stack
page read and write
15038000
trusted library allocation
page read and write
1287A000
trusted library allocation
page read and write
D8C8000
trusted library allocation
page read and write
5820000
heap
page read and write
251F000
stack
page read and write
5286000
heap
page read and write
F0000
heap
page read and write
12D8E000
stack
page read and write
F293000
trusted library allocation
page read and write
260000
trusted library allocation
page read and write
600000
trusted library section
page read and write
9D19000
heap
page read and write
820000
heap
page read and write
584000
heap
page read and write
1446A000
trusted library allocation
page read and write
DB000
stack
page read and write
12ADA000
trusted library allocation
page read and write
706000
heap
page read and write
12325000
trusted library allocation
page read and write
AA0000
trusted library allocation
page execute and read and write
CE2E000
trusted library allocation
page read and write
18805000
trusted library allocation
page read and write
C09D000
stack
page read and write
7E2D000
stack
page read and write
DBFA000
trusted library allocation
page read and write
A8E000
stack
page read and write
510000
heap
page read and write
6BCC000
stack
page read and write
1265E000
trusted library allocation
page read and write
6D7000
heap
page read and write
6F0000
trusted library section
page read and write
286B000
trusted library allocation
page read and write
66DD000
stack
page read and write
15B4C000
stack
page read and write
136BC000
trusted library allocation
page read and write
587000
heap
page read and write
15CAC000
stack
page read and write
6C10000
heap
page read and write
BDAE000
trusted library allocation
page read and write
12CC6000
trusted library allocation
page read and write
F40E000
trusted library allocation
page read and write
1066D000
stack
page read and write
168000
trusted library allocation
page read and write
18E1B000
trusted library allocation
page read and write
173C7000
heap
page read and write
370D000
heap
page read and write
2A0000
trusted library allocation
page read and write
5CAA000
heap
page read and write
C56D000
stack
page read and write
18EBD000
stack
page read and write
36F0000
heap
page read and write
11FCA000
trusted library allocation
page read and write
16A65000
trusted library allocation
page read and write
6FBC000
stack
page read and write
EB5C000
trusted library allocation
page read and write
1286D000
stack
page read and write
18010000
heap
page read and write
151CD000
stack
page read and write
195DE000
trusted library allocation
page read and write
13D54000
trusted library allocation
page read and write
C35D000
stack
page read and write
1806F000
heap
page read and write
63FD000
stack
page read and write
E1F3000
trusted library allocation
page read and write
1D4CD000
stack
page read and write
D908000
trusted library allocation
page read and write
5268000
heap
page read and write
27B3000
trusted library allocation
page read and write
1A2000
heap
page read and write
372F000
heap
page read and write
14961000
trusted library allocation
page read and write
151FD000
stack
page read and write
109BD000
stack
page read and write
E4000
trusted library allocation
page read and write
1BEED000
stack
page read and write
F5AC000
trusted library allocation
page read and write
F6AD000
stack
page read and write
512D000
stack
page read and write
AFE000
unkown
page readonly
590C000
stack
page read and write
23AD000
stack
page read and write
101AD000
stack
page read and write
160DC000
stack
page read and write
180B1000
trusted library allocation
page read and write
C35D000
stack
page read and write
1567D000
stack
page read and write
1961E000
trusted library allocation
page read and write
112BC000
stack
page read and write
13CAD000
trusted library allocation
page read and write
187CD000
stack
page read and write
85EE000
stack
page read and write | page guard
6E1C000
stack
page read and write
13C1A000
trusted library allocation
page read and write
6044000
heap
page read and write
1D0000
trusted library allocation
page read and write
1B94D000
stack
page read and write
E251000
trusted library allocation
page read and write
1E12000
heap
page read and write
831E000
stack
page read and write
17D0D000
stack
page read and write
16A8E000
stack
page read and write
1CF5D000
stack
page read and write
699000
heap
page read and write
E331000
trusted library allocation
page read and write
C9A1000
trusted library allocation
page read and write
173B0000
heap
page read and write
5C4A000
heap
page read and write
142CC000
stack
page read and write
1430D000
stack
page read and write
733000
trusted library allocation
page read and write
11F05000
trusted library allocation
page read and write
73EC000
stack
page read and write
C3AD000
stack
page read and write
2B00000
remote allocation
page read and write
C79C000
stack
page read and write
1C11D000
stack
page read and write
1219C000
trusted library allocation
page read and write
28C9000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
1E50000
direct allocation
page read and write
18647000
trusted library allocation
page read and write
17FB1000
trusted library allocation
page read and write
21C000
stack
page read and write
25EF000
trusted library allocation
page read and write
3358000
trusted library allocation
page read and write
10FED000
stack
page read and write
17416000
heap
page read and write
19A57000
trusted library allocation
page read and write
989D000
stack
page read and write
D48C000
trusted library allocation
page read and write
13BEF000
trusted library allocation
page read and write
905D000
stack
page read and write
140000
trusted library allocation
page read and write
90CD000
stack
page read and write
D71D000
stack
page read and write
1359E000
stack
page read and write
14765000
trusted library allocation
page read and write
18943000
trusted library allocation
page read and write
68BD000
stack
page read and write
DA6D000
stack
page read and write
FE3D000
stack
page read and write
9D1C000
heap
page read and write
879D000
stack
page read and write
1556D000
stack
page read and write
5C20000
heap
page read and write
49E4000
heap
page read and write
6E0000
heap
page read and write
14BBE000
trusted library allocation
page read and write
17B2C000
stack
page read and write
182CF000
heap
page read and write
8CEE000
stack
page read and write
163AC000
stack
page read and write
720000
trusted library allocation
page read and write
B1CD000
heap
page read and write
5C2C000
stack
page read and write
13C96000
trusted library allocation
page read and write
723E000
stack
page read and write
F92D000
stack
page read and write
7610000
heap
page read and write
614000
heap
page read and write
774D000
stack
page read and write
6020000
heap
page read and write
137C5000
trusted library allocation
page read and write
17F50000
heap
page read and write
A7CC000
stack
page read and write
134BE000
trusted library allocation
page read and write
1092D000
stack
page read and write
B1ED000
stack
page read and write
C1F2000
trusted library allocation
page read and write
673C000
stack
page read and write
17F31000
trusted library allocation
page read and write
F213000
trusted library allocation
page read and write
53DD000
stack
page read and write
50BD000
stack
page read and write
56DE000
stack
page read and write
1692A000
trusted library allocation
page read and write
23A000
stack
page read and write
EACD000
stack
page read and write
123E3000
trusted library allocation
page read and write
1BC8D000
stack
page read and write
12957000
trusted library allocation
page read and write
282000
trusted library allocation
page read and write
11AC5000
trusted library allocation
page read and write
675C000
stack
page read and write
20000
heap
page read and write
57DF000
heap
page read and write
16F1E000
trusted library allocation
page read and write
723D000
stack
page read and write
1478D000
stack
page read and write
224C000
stack
page read and write
130000
heap
page read and write
1139C000
trusted library allocation
page read and write
5AAC000
stack
page read and write
3A40000
heap
page read and write
57D000
heap
page read and write
E833000
trusted library allocation
page read and write
8A2D000
stack
page read and write
3351000
trusted library allocation
page read and write
3A2E000
stack
page read and write
618C000
stack
page read and write
1DA3D000
stack
page read and write
1AFED000
stack
page read and write
1B10D000
stack
page read and write
CC6D000
stack
page read and write
6E7D000
stack
page read and write
E6E000
stack
page read and write
12A79000
trusted library allocation
page read and write
173D8000
heap
page read and write
95AD000
stack
page read and write
139F8000
trusted library allocation
page read and write
4992000
heap
page read and write
C4EC000
stack
page read and write
671F000
heap
page read and write
8B1C000
stack
page read and write
18C0C000
stack
page read and write
37B5000
trusted library allocation
page read and write
15A8D000
stack
page read and write
744D000
stack
page read and write
450000
trusted library allocation
page read and write
23C0000
heap
page execute and read and write
1C55C000
stack
page read and write
1378E000
stack
page read and write
545000
heap
page read and write
C02A000
trusted library allocation
page read and write
13687000
trusted library allocation
page read and write
673E000
stack
page read and write
A2AD000
stack
page read and write
1686C000
trusted library allocation
page read and write
7FAE000
stack
page read and write
245F000
trusted library allocation
page read and write
512D000
stack
page read and write
244F000
stack
page read and write
949D000
stack
page read and write
CC2C000
stack
page read and write
1D9FD000
stack
page read and write
E46E000
trusted library allocation
page read and write
C7BD000
stack
page read and write
B31C000
stack
page read and write
14A6D000
stack
page read and write
132DD000
stack
page read and write
11B000
trusted library allocation
page execute and read and write
1088D000
stack
page read and write
1457D000
stack
page read and write
13D9B000
trusted library allocation
page read and write
17F7B000
heap
page read and write
1280C000
stack
page read and write
7EF40000
trusted library allocation
page execute and read and write
111AD000
stack
page read and write
84AD000
stack
page read and write
1806A000
heap
page read and write
15FDD000
stack
page read and write
148ED000
stack
page read and write
2597000
trusted library allocation
page read and write
1C7000
trusted library allocation
page execute and read and write
6340000
trusted library allocation
page read and write
1A8CC000
stack
page read and write
D78A000
trusted library allocation
page read and write
C68C000
stack
page read and write
1885A000
trusted library allocation
page read and write
16571000
trusted library allocation
page read and write
16B2F000
stack
page read and write
702D000
stack
page read and write
148C3000
trusted library allocation
page read and write
891D000
stack
page read and write
54F000
heap
page read and write
312000
trusted library allocation
page read and write
2909000
trusted library allocation
page read and write
EB7D000
stack
page read and write
15F8D000
stack
page read and write
14B3E000
trusted library allocation
page read and write
9A1C000
stack
page read and write
A68D000
stack
page read and write
A50000
unkown
page readonly
BBCD000
stack
page read and write
5CED000
stack
page read and write
254000
trusted library allocation
page read and write
D0B8000
trusted library allocation
page read and write
6C18000
heap
page read and write
18D3C000
stack
page read and write
D921000
trusted library allocation
page read and write
6F0000
heap
page read and write
9CF5000
heap
page read and write
12901000
trusted library allocation
page read and write
EF3C000
stack
page read and write
7F9D000
stack
page read and write
528C000
stack
page read and write
74CD000
stack
page read and write
18672000
trusted library allocation
page read and write
F60C000
trusted library allocation
page read and write
18052000
heap
page read and write
375000
heap
page read and write
D2C7000
trusted library allocation
page read and write
1556D000
stack
page read and write
921D000
stack
page read and write
27EF000
trusted library allocation
page read and write
D961000
trusted library allocation
page read and write
B96D000
stack
page read and write
14B1E000
trusted library allocation
page read and write
2901000
trusted library allocation
page read and write
142CC000
trusted library allocation
page read and write
5F89000
stack
page read and write
E0B5000
trusted library allocation
page read and write
3C54000
trusted library allocation
page read and write
784D000
stack
page read and write
282000
heap
page read and write
4A7000
heap
page read and write
2BFC000
trusted library allocation
page read and write
620000
heap
page read and write
51FC000
stack
page read and write
AA6D000
stack
page read and write
743E000
stack
page read and write | page guard
67DC000
stack
page read and write
1308D000
stack
page read and write
3591000
trusted library allocation
page read and write
3738000
trusted library allocation
page read and write
50BC000
stack
page read and write
18055000
heap
page read and write
863D000
stack
page read and write
CB2D000
stack
page read and write
16C25000
trusted library allocation
page read and write
2FF000
unkown
page read and write
F44E000
trusted library allocation
page read and write
2A06000
trusted library allocation
page read and write
6DDD000
stack
page read and write
D64C000
trusted library allocation
page read and write
4A4000
heap
page read and write
750000
trusted library allocation
page execute and read and write
122D2000
trusted library allocation
page read and write
1237D000
stack
page read and write
1868D000
stack
page read and write
102000
trusted library allocation
page read and write
15CCD000
stack
page read and write
14D5D000
stack
page read and write
F0D5000
trusted library allocation
page read and write
27D5000
trusted library allocation
page read and write
14BFE000
trusted library allocation
page read and write
EBFE000
trusted library allocation
page read and write
50D0000
heap
page read and write
183ED000
stack
page read and write
5FCD000
stack
page read and write
8DEC000
stack
page read and write
19480000
trusted library allocation
page read and write
38D7000
trusted library allocation
page read and write
28B000
trusted library allocation
page execute and read and write
156BD000
stack
page read and write
7B6E000
stack
page read and write
13ABB000
trusted library allocation
page read and write
37D7000
trusted library allocation
page read and write
B224000
heap
page read and write
5C47000
heap
page read and write
5BB0000
heap
page read and write
11CC1000
trusted library allocation
page read and write
4B1000
heap
page read and write
12B5C000
trusted library allocation
page read and write
760000
trusted library allocation
page read and write
9D07000
heap
page read and write
13B61000
trusted library allocation
page read and write
1524D000
stack
page read and write
16DC1000
trusted library allocation
page read and write
BF5D000
stack
page read and write
10C6D000
stack
page read and write
36B0000
heap
page read and write
D7B6000
trusted library allocation
page read and write
2B60000
heap
page read and write
139F3000
trusted library allocation
page read and write
734C000
stack
page read and write
2310000
heap
page execute and read and write
61FC000
stack
page read and write
1969E000
trusted library allocation
page read and write
6680000
heap
page read and write
10000
heap
page read and write
1B33D000
stack
page read and write
21DE000
stack
page read and write | page guard
2B2B000
heap
page read and write
10D0D000
stack
page read and write
2917000
trusted library allocation
page read and write
EA3D000
stack
page read and write
3CD000
stack
page read and write
8F3D000
stack
page read and write
174EA000
heap
page read and write
11BCE000
trusted library allocation
page read and write
A1DE000
stack
page read and write
547D000
stack
page read and write
9BF4000
heap
page read and write
1DF3D000
stack
page read and write
544C000
stack
page read and write
38D8000
trusted library allocation
page read and write
EA8D000
stack
page read and write
185EA000
trusted library allocation
page read and write
19560000
trusted library allocation
page read and write
14A0D000
trusted library allocation
page read and write
371F000
heap
page read and write
E2ED000
stack
page read and write
13E8D000
stack
page read and write
161AC000
stack
page read and write
A01C000
stack
page read and write
587000
heap
page read and write
48BC000
heap
page read and write
18E5D000
stack
page read and write
E2B1000
trusted library allocation
page read and write
180000
heap
page read and write
495D000
stack
page read and write
9E0000
trusted library allocation
page execute and read and write
121B0000
trusted library allocation
page read and write
146E5000
trusted library allocation
page read and write
13E85000
trusted library allocation
page read and write
540D000
stack
page read and write
20DC000
stack
page read and write
13CC5000
trusted library allocation
page read and write
3B3F000
trusted library allocation
page read and write
68AC000
stack
page read and write
580000
heap
page read and write
11ABC000
stack
page read and write
4B2E000
stack
page read and write
1853D000
stack
page read and write
5E5E000
stack
page read and write
28EF000
stack
page read and write
2B0000
heap
page read and write
120C5000
trusted library allocation
page read and write
14ED8000
trusted library allocation
page read and write
84FD000
stack
page read and write
4AE000
heap
page read and write
1B8CD000
stack
page read and write
E67D000
stack
page read and write
103FD000
stack
page read and write
1D72D000
stack
page read and write
1E30000
heap
page read and write
19D4D000
stack
page read and write
5C0000
heap
page read and write
875D000
stack
page read and write
E04A000
trusted library allocation
page read and write
F3B0000
trusted library allocation
page read and write
1426E000
trusted library allocation
page read and write
B3E1000
trusted library allocation
page read and write
118D0000
trusted library allocation
page read and write
738D000
stack
page read and write
4FBE000
stack
page read and write
1B4BD000
stack
page read and write
172CE000
stack
page read and write
5FEC000
stack
page read and write
873F000
stack
page read and write
297C000
trusted library allocation
page read and write
35D7000
trusted library allocation
page read and write
2C0000
trusted library allocation
page read and write
4C4D000
heap
page read and write
59AD000
unkown
page read and write
3623000
trusted library allocation
page read and write
6F0E000
stack
page read and write
CF8C000
stack
page read and write
E42D000
stack
page read and write
15DAD000
stack
page read and write
35DA000
trusted library allocation
page read and write
D34E000
trusted library allocation
page read and write
40F0000
heap
page read and write
ECDC000
trusted library allocation
page read and write
C0A7000
trusted library allocation
page read and write
1438E000
trusted library allocation
page read and write
63D000
heap
page read and write
FD1D000
stack
page read and write
EB2D000
stack
page read and write
181FE000
heap
page read and write
50E0000
heap
page read and write
17414000
heap
page read and write
181B1000
trusted library allocation
page read and write
68EE000
stack
page read and write
16FDE000
trusted library allocation
page read and write
DE75000
trusted library allocation
page read and write
7F2D000
stack
page read and write
3758000
trusted library allocation
page read and write
4AD000
heap
page read and write
89000
stack
page read and write
1587D000
stack
page read and write
27A8000
trusted library allocation
page read and write
14547000
trusted library allocation
page read and write
6042000
heap
page read and write
1CCFC000
stack
page read and write
CBB3000
trusted library allocation
page read and write
F95D000
stack
page read and write
59A000
heap
page read and write
16927000
trusted library allocation
page read and write
34D7000
trusted library allocation
page read and write
143CC000
trusted library allocation
page read and write
BFED000
stack
page read and write
5D8C000
stack
page read and write
106000
trusted library allocation
page execute and read and write
10000
heap
page read and write
65BC000
stack
page read and write
2C0000
heap
page read and write
192DC000
stack
page read and write
F70A000
trusted library allocation
page read and write
1C0000
trusted library allocation
page execute and read and write
1621D000
stack
page read and write
1984D000
stack
page read and write
FC0D000
stack
page read and write
460000
heap
page read and write
492D000
stack
page read and write
1273C000
trusted library allocation
page read and write
298B000
trusted library allocation
page read and write
E115000
trusted library allocation
page read and write
10B6E000
stack
page read and write
1AB2D000
stack
page read and write
10A000
trusted library allocation
page execute and read and write
182EA000
heap
page read and write
66FE000
stack
page read and write
624000
heap
page read and write
6A8F000
stack
page read and write
194A0000
trusted library allocation
page read and write
482C000
stack
page read and write
1007D000
stack
page read and write
734D000
stack
page read and write
1D65C000
stack
page read and write
70EE000
stack
page read and write
DFCA000
trusted library allocation
page read and write
31E1000
trusted library allocation
page read and write
27ED000
trusted library allocation
page read and write
1363C000
trusted library allocation
page read and write
1805C000
heap
page read and write
F48E000
trusted library allocation
page read and write
128FA000
trusted library allocation
page read and write
E961000
trusted library allocation
page read and write
663D000
stack
page read and write
690000
trusted library allocation
page read and write
F30D000
stack
page read and write
19FCC000
stack
page read and write
166AE000
trusted library allocation
page read and write
11E0C000
trusted library allocation
page read and write
1570D000
stack
page read and write
18D0E000
trusted library allocation
page read and write
123BD000
stack
page read and write
1181D000
stack
page read and write
4B0000
heap
page read and write
DD6C000
trusted library allocation
page read and write
194000
trusted library allocation
page read and write
66DC000
stack
page read and write
1712E000
stack
page read and write
646E000
stack
page read and write
460000
heap
page execute and read and write
35CD000
stack
page read and write
A0AD000
stack
page read and write
ADDD000
stack
page read and write
FB000
stack
page read and write
B118000
heap
page read and write
14E7A000
trusted library allocation
page read and write
EFF5000
trusted library allocation
page read and write
173C2000
heap
page read and write
1828F000
heap
page read and write
1953C000
trusted library allocation
page read and write
635000
heap
page read and write
7FED000
stack
page read and write
24F3000
trusted library allocation
page read and write
24000
heap
page read and write
517C000
stack
page read and write
A0ED000
stack
page read and write
6EBC000
stack
page read and write
18C1E000
trusted library allocation
page read and write
1BABD000
stack
page read and write
1846C000
trusted library allocation
page read and write
16611000
trusted library allocation
page read and write
98CC000
stack
page read and write
83EF000
stack
page read and write
148AC000
stack
page read and write
4A02000
heap
page read and write
FF9D000
stack
page read and write
B12E000
heap
page read and write
37C000
heap
page read and write
5A2C000
stack
page read and write
135DE000
stack
page read and write
96FD000
stack
page read and write
8A1D000
stack
page read and write
484000
heap
page read and write
5A8E000
stack
page read and write
56FD000
heap
page read and write
176000
trusted library allocation
page execute and read and write
11D8E000
trusted library allocation
page read and write
F029000
trusted library allocation
page read and write
3A3F000
trusted library allocation
page read and write
698F000
stack
page read and write
9C07000
heap
page read and write
1975C000
trusted library allocation
page read and write
4B9F000
stack
page read and write
1515D000
stack
page read and write
520E000
stack
page read and write
150000
trusted library allocation
page read and write
3A7000
heap
page read and write
872D000
stack
page read and write
609C000
stack
page read and write
7875000
heap
page read and write
1B60D000
stack
page read and write
1767C000
stack
page read and write
160000
trusted library allocation
page read and write
18221000
heap
page read and write
A18C000
stack
page read and write
6BDC000
stack
page read and write
13CAC000
stack
page read and write
10000
heap
page read and write
1866A000
trusted library allocation
page read and write
3E94000
trusted library allocation
page read and write
4233000
trusted library allocation
page read and write
167AC000
trusted library allocation
page read and write
873E000
stack
page read and write | page guard
6D5000
heap
page read and write
B71C000
stack
page read and write
649D000
stack
page read and write
4FA0000
heap
page read and write
10000
heap
page read and write
65ED000
stack
page read and write
400000
remote allocation
page execute and read and write
11D39000
trusted library allocation
page read and write
119BD000
stack
page read and write
9D17000
heap
page read and write
CA7E000
trusted library allocation
page read and write
16D000
trusted library allocation
page execute and read and write
19997000
trusted library allocation
page read and write
184000
heap
page read and write
13DCA000
trusted library allocation
page read and write
1A7AD000
stack
page read and write
390000
trusted library allocation
page read and write
172000
trusted library allocation
page read and write
12463000
trusted library allocation
page read and write
5F7000
heap
page read and write
9D12000
heap
page read and write
2BF000
stack
page read and write
7850000
heap
page read and write
124CC000
stack
page read and write
A06D000
stack
page read and write
17F94000
heap
page read and write
5F0C000
stack
page read and write
649E000
stack
page read and write
BECD000
stack
page read and write
12EED000
stack
page read and write
BE3D000
stack
page read and write
FFEC000
stack
page read and write
15B9D000
stack
page read and write
A6CD000
stack
page read and write
3FF000
trusted library allocation
page read and write
3BF5000
trusted library allocation
page read and write
53D000
stack
page read and write
182B2000
heap
page read and write
1078C000
stack
page read and write
B60D000
stack
page read and write
15D000
trusted library allocation
page execute and read and write
11E2E000
trusted library allocation
page read and write
D2BD000
stack
page read and write
708C000
stack
page read and write
22DE000
stack
page read and write
145CA000
trusted library allocation
page read and write
EB7E000
trusted library allocation
page read and write
14707000
trusted library allocation
page read and write
D93D000
stack
page read and write
18DEE000
trusted library allocation
page read and write
4BE000
stack
page read and write
54DE000
stack
page read and write
13B79000
trusted library allocation
page read and write
1C45D000
stack
page read and write
1BA4D000
stack
page read and write
1270D000
stack
page read and write
370000
heap
page execute and read and write
3E2000
heap
page read and write
84ED000
stack
page read and write
44B3000
trusted library allocation
page read and write
370000
heap
page read and write
19154000
trusted library allocation
page read and write
83FD000
stack
page read and write
9E5C000
stack
page read and write
2E4000
heap
page read and write
9A5D000
stack
page read and write
3379000
trusted library allocation
page read and write
33E000
stack
page read and write
925C000
stack
page read and write
810D000
stack
page read and write
1709C000
trusted library allocation
page read and write
7B0000
heap
page read and write
1852C000
trusted library allocation
page read and write
19D000
trusted library allocation
page execute and read and write
95DD000
stack
page read and write
14A81000
trusted library allocation
page read and write
764D000
stack
page read and write
1B37D000
stack
page read and write
262D000
trusted library allocation
page read and write
640000
heap
page read and write
195BC000
trusted library allocation
page read and write
102ED000
stack
page read and write
50F000
heap
page read and write
62FC000
stack
page read and write
3C0000
heap
page read and write
A93E000
stack
page read and write
8C7D000
stack
page read and write
38D000
heap
page read and write
CFC000
stack
page read and write
6300000
heap
page read and write
106DD000
stack
page read and write
D4E000
stack
page read and write
BE8D000
stack
page read and write
F4CE000
trusted library allocation
page read and write
1C0AC000
stack
page read and write
536D000
unkown
page read and write
633000
heap
page read and write
27A000
trusted library allocation
page execute and read and write
C2A5000
trusted library allocation
page read and write
C8CC000
stack
page read and write
D941000
trusted library allocation
page read and write
54A000
heap
page read and write
E3000
trusted library allocation
page execute and read and write
1672E000
trusted library allocation
page read and write
3957000
trusted library allocation
page read and write
690C000
stack
page read and write
593D000
unkown
page read and write
AD6D000
stack
page read and write
153000
trusted library allocation
page execute and read and write
14C3C000
stack
page read and write
65C000
heap
page read and write
1950D000
stack
page read and write
364C000
stack
page read and write
15C5D000
stack
page read and write
16551000
trusted library allocation
page read and write
17A000
trusted library allocation
page execute and read and write
444E000
stack
page read and write
55F000
heap
page read and write
AC4D000
stack
page read and write
3F57000
trusted library allocation
page read and write
188E5000
trusted library allocation
page read and write
762D000
heap
page read and write
10F4C000
stack
page read and write
78FD000
stack
page read and write
1940D000
stack
page read and write
A63C000
stack
page read and write
DDD7000
trusted library allocation
page read and write
6E8000
heap
page read and write
138BC000
stack
page read and write
4BE000
heap
page read and write
110AE000
stack
page read and write
EDCE000
trusted library allocation
page read and write
844C000
stack
page read and write
939D000
stack
page read and write
4B4000
heap
page read and write
13B31000
trusted library allocation
page read and write
F0000
trusted library allocation
page read and write
2E9000
stack
page read and write
190BC000
stack
page read and write
1252D000
stack
page read and write
EC7E000
trusted library allocation
page read and write
2B28000
heap
page read and write
4BDD000
heap
page read and write
18246000
heap
page read and write
8EBD000
stack
page read and write
118BD000
stack
page read and write
1725A000
trusted library allocation
page read and write
C5BD000
stack
page read and write
1370C000
stack
page read and write
1295E000
trusted library allocation
page read and write
DD97000
trusted library allocation
page read and write
1519D000
stack
page read and write
8B5D000
stack
page read and write
539000
heap
page read and write
1DEFE000
stack
page read and write
1609E000
stack
page read and write
1186D000
stack
page read and write
173C5000
heap
page read and write
49FF000
stack
page read and write
786D000
heap
page read and write
64F000
heap
page read and write
602E000
stack
page read and write
10CAE000
stack
page read and write
233F000
stack
page read and write
13745000
trusted library allocation
page read and write
B1AE000
heap
page read and write
A58D000
stack
page read and write
6718000
heap
page read and write
2B00000
remote allocation
page read and write
DEF3000
trusted library allocation
page read and write
F66A000
trusted library allocation
page read and write
8B0000
heap
page read and write
180D1000
trusted library allocation
page read and write
1099D000
stack
page read and write
4C4000
heap
page read and write
1412D000
stack
page read and write
1D1FD000
stack
page read and write
4974000
heap
page read and write
174F5000
heap
page read and write
CA9E000
stack
page read and write
A42D000
stack
page read and write
139D5000
trusted library allocation
page read and write
18001000
heap
page read and write
577000
heap
page read and write
13052000
trusted library allocation
page read and write
11B83000
trusted library allocation
page read and write
2B24000
heap
page read and write
BB33000
trusted library allocation
page read and write
127D0000
trusted library allocation
page read and write
B5C4000
trusted library allocation
page read and write
35C5000
trusted library allocation
page read and write
6C1D000
stack
page read and write
1B5CD000
stack
page read and write
16EA1000
trusted library allocation
page read and write
37D8000
trusted library allocation
page read and write
1890C000
stack
page read and write
169AA000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
1D35C000
stack
page read and write
977D000
stack
page read and write
1DB9D000
stack
page read and write
EF9D000
stack
page read and write
7F2D000
stack
page read and write
264000
heap
page read and write
1B3BD000
stack
page read and write
1050C000
stack
page read and write
3FE000
stack
page read and write
EEE4000
trusted library allocation
page read and write
4F0000
trusted library allocation
page execute and read and write
13B1A000
trusted library allocation
page read and write
E0CA000
trusted library allocation
page read and write
1CAAD000
stack
page read and write
1C3DD000
stack
page read and write
17EE5000
trusted library allocation
page read and write
11F6C000
trusted library allocation
page read and write
10CAD000
stack
page read and write
E9FD000
stack
page read and write
7A0C000
stack
page read and write
1C92D000
stack
page read and write
10F5D000
stack
page read and write
23E0000
heap
page read and write
A2FC000
stack
page read and write
12A1E000
trusted library allocation
page read and write
F34D000
stack
page read and write
E4CC000
trusted library allocation
page read and write
1D9AC000
stack
page read and write
FC3D000
stack
page read and write
2B20000
heap
page read and write
121E7000
trusted library allocation
page read and write
B226000
heap
page read and write
BAAD000
stack
page read and write
1580D000
stack
page read and write
15F000
stack
page read and write
D211000
trusted library allocation
page read and write
18B61000
trusted library allocation
page read and write
E9BD000
stack
page read and write
C91D000
stack
page read and write
1453D000
stack
page read and write
19BA5000
trusted library allocation
page read and write
1A49D000
stack
page read and write
115000
trusted library allocation
page execute and read and write
2FD000
stack
page read and write
6E5C000
stack
page read and write
13D0C000
trusted library allocation
page read and write
5D2C000
stack
page read and write
170D1000
trusted library allocation
page read and write
36BB000
trusted library allocation
page read and write
D75D000
stack
page read and write
1434E000
trusted library allocation
page read and write
828000
heap
page read and write
354E000
trusted library allocation
page read and write
1611D000
stack
page read and write
17398000
trusted library allocation
page read and write
27AF000
trusted library allocation
page read and write
B4FE000
trusted library allocation
page read and write
A16D000
stack
page read and write
4A8F000
stack
page read and write
538D000
stack
page read and write
2966000
trusted library allocation
page read and write
AD8D000
stack
page read and write
36D8000
trusted library allocation
page read and write
24E000
stack
page read and write
245D000
stack
page read and write
DB5C000
trusted library allocation
page read and write
1625D000
stack
page read and write
6EFA000
heap
page read and write
DCDA000
trusted library allocation
page read and write
1820D000
heap
page read and write
1BC3D000
stack
page read and write
11C03000
trusted library allocation
page read and write
123A3000
trusted library allocation
page read and write
594F000
unkown
page read and write
53BD000
unkown
page read and write
2BE0000
trusted library allocation
page read and write
970000
heap
page execute and read and write
A3FD000
stack
page read and write
18231000
trusted library allocation
page read and write
1D19D000
stack
page read and write
19B95000
trusted library allocation
page read and write
5F4D000
stack
page read and write
9EFD000
stack
page read and write
31E8000
trusted library allocation
page read and write
F90D000
stack
page read and write
C47C000
stack
page read and write
21BE000
unkown
page read and write
12E9D000
stack
page read and write
181E6000
heap
page read and write
C50000
heap
page read and write
21B0000
heap
page read and write
113DC000
trusted library allocation
page read and write
189AD000
stack
page read and write
1A62D000
stack
page read and write
9F0000
heap
page read and write
DC3D000
stack
page read and write
1DEBC000
stack
page read and write
78AD000
stack
page read and write
12633000
trusted library allocation
page read and write
149E1000
trusted library allocation
page read and write
3757000
trusted library allocation
page read and write
5ECD000
stack
page read and write
2AB4000
trusted library allocation
page read and write
17D4D000
stack
page read and write
2AD3000
trusted library allocation
page read and write
889C000
stack
page read and write
114BA000
trusted library allocation
page read and write
1BA000
trusted library allocation
page execute and read and write
3CBF000
stack
page read and write
B040000
heap
page read and write
65FC000
stack
page read and write
6CD000
stack
page read and write
9F2D000
stack
page read and write
174C6000
heap
page read and write
E23D000
stack
page read and write
D2FD000
stack
page read and write
DAC000
stack
page read and write
27A1000
trusted library allocation
page read and write
13C4D000
trusted library allocation
page read and write
6210000
heap
page read and write
3DE000
heap
page read and write
710000
heap
page read and write
17444000
heap
page read and write
180CD000
heap
page read and write
13190000
trusted library allocation
page read and write
1E2C000
stack
page read and write
613E000
stack
page read and write
179FC000
stack
page read and write
B321000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
1C64000
heap
page read and write
126CC000
stack
page read and write
876D000
stack
page read and write
1419D000
stack
page read and write
131AD000
stack
page read and write
CCF1000
trusted library allocation
page read and write
11873000
trusted library allocation
page read and write
EC7D000
stack
page read and write
F133000
trusted library allocation
page read and write
A50000
unkown
page readonly
4373000
trusted library allocation
page read and write
13D3C000
trusted library allocation
page read and write
D7DD000
stack
page read and write
A8DC000
stack
page read and write
4A3E000
stack
page read and write
21DF000
stack
page read and write
57D000
heap
page read and write
1678C000
trusted library allocation
page read and write
E42E000
trusted library allocation
page read and write
197DC000
trusted library allocation
page read and write
E3ED000
stack
page read and write
40D4000
trusted library allocation
page read and write
17FAB000
heap
page read and write
16A67000
trusted library allocation
page read and write
14191000
trusted library allocation
page read and write
B1D9000
heap
page read and write
1709A000
trusted library allocation
page read and write
A4AD000
stack
page read and write
1F0000
trusted library allocation
page execute and read and write
3D8000
stack
page read and write
4A4D000
stack
page read and write
5C52000
heap
page read and write
748D000
stack
page read and write
18A00000
trusted library allocation
page read and write
12D1D000
stack
page read and write
F57C000
stack
page read and write
3C4000
heap
page read and write
4A8C000
stack
page read and write
184EC000
stack
page read and write
F310000
trusted library allocation
page read and write
A53C000
stack
page read and write
BFAA000
trusted library allocation
page read and write
133EE000
stack
page read and write
12B88000
trusted library allocation
page read and write
4730000
trusted library section
page read and write
EE0E000
trusted library allocation
page read and write
193CF000
trusted library allocation
page read and write
DABC000
trusted library allocation
page read and write
F47C000
stack
page read and write
6AFE000
stack
page read and write
137F9000
trusted library allocation
page read and write
5F74000
heap
page read and write
4F0000
heap
page read and write
4216000
trusted library allocation
page read and write
19422000
trusted library allocation
page read and write
11DCA000
trusted library allocation
page read and write
15B000
stack
page read and write
1B90D000
stack
page read and write
627000
heap
page read and write
16BA3000
trusted library allocation
page read and write
1B79C000
stack
page read and write
57D7000
heap
page read and write
C0DE000
stack
page read and write
1AAED000
stack
page read and write
14383000
trusted library allocation
page read and write
634D000
stack
page read and write
5F50000
heap
page read and write
A45D000
stack
page read and write
18074000
heap
page read and write
1531D000
stack
page read and write
62D000
stack
page read and write
7C6D000
stack
page read and write
657000
heap
page read and write
16CA3000
trusted library allocation
page read and write
C0F000
stack
page read and write
11A91000
trusted library allocation
page read and write
1408D000
stack
page read and write
15E5D000
stack
page read and write
650000
heap
page read and write
177CD000
stack
page read and write
48B0000
heap
page read and write
1829B000
heap
page read and write
2EF000
heap
page read and write
368C000
stack
page read and write
1009D000
stack
page read and write
60EC000
stack
page read and write
260000
heap
page read and write
13BC0000
trusted library allocation
page read and write
71EC000
stack
page read and write
18294000
heap
page read and write
BBF000
stack
page read and write
1DB4C000
stack
page read and write
44CE000
stack
page read and write
52DC000
stack
page read and write
1858A000
trusted library allocation
page read and write
1C60000
heap
page read and write
B8B7000
trusted library allocation
page read and write
5C8C000
stack
page read and write
13BD8000
trusted library allocation
page read and write
1442D000
stack
page read and write
145FE000
trusted library allocation
page read and write
740000
heap
page execute and read and write
1127E000
trusted library allocation
page read and write
91CD000
stack
page read and write
D15D000
stack
page read and write
1C22C000
stack
page read and write
1354D000
stack
page read and write
8EFD000
stack
page read and write
7ABC000
stack
page read and write
6D4C000
stack
page read and write
1DD9D000
stack
page read and write
1C7000
stack
page read and write
1C65D000
stack
page read and write
12B08000
trusted library allocation
page read and write
39D7000
trusted library allocation
page read and write
13AEA000
trusted library allocation
page read and write
425D000
stack
page read and write
87DD000
stack
page read and write
A51D000
stack
page read and write
1D09D000
stack
page read and write
1DCE000
stack
page read and write
18058000
heap
page read and write
13BAC000
stack
page read and write
199BD000
stack
page read and write
167EC000
trusted library allocation
page read and write
147C2000
trusted library allocation
page read and write
182B1000
trusted library allocation
page read and write
AFCD000
stack
page read and write
7C5C000
stack
page read and write
120FA000
trusted library allocation
page read and write
1CE5D000
stack
page read and write
525D000
stack
page read and write
1A0000
trusted library allocation
page read and write
F2F0000
trusted library allocation
page read and write
9D0F000
heap
page read and write
1BF8D000
stack
page read and write
5D2C000
stack
page read and write
125BD000
stack
page read and write
3600000
trusted library allocation
page read and write
730000
trusted library allocation
page read and write
1864D000
stack
page read and write
13C7E000
trusted library allocation
page read and write
E63D000
stack
page read and write
17F8E000
trusted library allocation
page read and write
E015000
trusted library allocation
page read and write
3557000
trusted library allocation
page read and write
546000
trusted library allocation
page read and write
168CA000
trusted library allocation
page read and write
9B1C000
stack
page read and write
5260000
heap
page read and write
EA20000
trusted library allocation
page read and write
1B2000
trusted library allocation
page read and write
581E000
stack
page read and write
6EF8000
heap
page read and write
18348000
heap
page read and write
256000
heap
page read and write
3ABF000
trusted library allocation
page read and write
4E9D000
stack
page read and write
125A0000
trusted library allocation
page read and write
159CD000
stack
page read and write
1535E000
stack
page read and write
1233C000
stack
page read and write
1535D000
stack
page read and write
1C7CD000
stack
page read and write
CD9C000
trusted library allocation
page read and write
10000
heap
page read and write
157CD000
stack
page read and write
A30000
trusted library allocation
page read and write
16F5E000
trusted library allocation
page read and write
1821A000
heap
page read and write
17F4D000
stack
page read and write
7B4000
heap
page read and write
18A000
stack
page read and write
7D6D000
stack
page read and write
352E000
trusted library allocation
page read and write
2B64000
heap
page read and write
12352000
trusted library allocation
page read and write
169EE000
stack
page read and write
140CC000
stack
page read and write
56F3000
heap
page read and write
103AC000
stack
page read and write
6C0D000
stack
page read and write
1A05D000
stack
page read and write
6E0000
heap
page read and write
320000
heap
page execute and read and write
1131C000
trusted library allocation
page read and write
10D1E000
stack
page read and write
EE2D000
stack
page read and write
DADD000
stack
page read and write
D8FD000
stack
page read and write
114BD000
stack
page read and write
AD1D000
stack
page read and write
B1B3000
heap
page read and write
167C0000
trusted library allocation
page read and write
9DDD000
stack
page read and write
13B02000
trusted library allocation
page read and write
D3D1000
trusted library allocation
page read and write
DD37000
trusted library allocation
page read and write
291F000
stack
page read and write
5A6C000
stack
page read and write
11D0C000
trusted library allocation
page read and write
129D3000
trusted library allocation
page read and write
4ABF000
stack
page read and write
1CE1D000
stack
page read and write
228E000
stack
page read and write
706D000
stack
page read and write
70ED000
stack
page read and write
163FD000
stack
page read and write
1256D000
stack
page read and write
10000
heap
page read and write
DE17000
trusted library allocation
page read and write
16591000
trusted library allocation
page read and write
6A20000
heap
page read and write
356000
heap
page read and write
1AECD000
stack
page read and write
11BDD000
stack
page read and write
1580D000
stack
page read and write
CB21000
trusted library allocation
page read and write
1D48C000
stack
page read and write
1440C000
trusted library allocation
page read and write
2B68000
heap
page read and write
1F3F000
stack
page read and write
648D000
heap
page read and write
2C1A000
trusted library allocation
page read and write
75FC000
stack
page read and write
3F1F000
stack
page read and write
7DED000
stack
page read and write
14983000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
120E5000
trusted library allocation
page read and write
180C8000
heap
page read and write
AAAD000
stack
page read and write
15EAD000
stack
page read and write
154000
trusted library allocation
page read and write
16E21000
trusted library allocation
page read and write
13A7D000
stack
page read and write
3F20000
heap
page read and write
644D000
stack
page read and write
AA6D000
stack
page read and write
77FD000
stack
page read and write
3589000
trusted library allocation
page read and write
111FD000
stack
page read and write
19EAD000
stack
page read and write
948D000
stack
page read and write
550000
trusted library allocation
page read and write
3A0000
heap
page read and write
B8BC000
stack
page read and write
59ED000
stack
page read and write
13742000
trusted library allocation
page read and write
19BEC000
stack
page read and write
1551D000
stack
page read and write
63AE000
stack
page read and write
8B9D000
stack
page read and write
B02D000
stack
page read and write
C91D000
stack
page read and write
154BD000
stack
page read and write
2AB8000
trusted library allocation
page read and write
4AE000
unkown
page read and write
D681000
trusted library allocation
page read and write
102AC000
stack
page read and write
7DAD000
stack
page read and write
112000
trusted library allocation
page read and write
6EF0000
heap
page read and write
827C000
stack
page read and write
12167000
trusted library allocation
page read and write
1DC0D000
stack
page read and write
3D10000
heap
page read and write
AA0000
trusted library allocation
page read and write
163BD000
stack
page read and write
162AD000
stack
page read and write
7D2000
heap
page read and write
1018C000
stack
page read and write
1468D000
stack
page read and write
182000
trusted library allocation
page read and write
116CC000
stack
page read and write
77E000
stack
page read and write
2BE6000
trusted library allocation
page read and write
13C1D000
trusted library allocation
page read and write
8A7D000
stack
page read and write
CEDA000
trusted library allocation
page read and write
A26D000
stack
page read and write
C0E000
stack
page read and write | page guard
EBBE000
trusted library allocation
page read and write
680000
heap
page read and write
1635D000
stack
page read and write
7B1E000
stack
page read and write
1AD5D000
stack
page read and write
581C000
stack
page read and write
E90000
unkown
page readonly
1D55D000
stack
page read and write
3457000
trusted library allocation
page read and write
25F5000
heap
page read and write
10B2C000
stack
page read and write
B76D000
stack
page read and write
8DAD000
stack
page read and write
661C000
stack
page read and write
5BC1000
heap
page read and write
DF15000
trusted library allocation
page read and write
13CF5000
trusted library allocation
page read and write
58E000
heap
page read and write
152DD000
stack
page read and write
D0DD000
stack
page read and write
14FB8000
trusted library allocation
page read and write
272000
trusted library allocation
page read and write
7DDD000
stack
page read and write
73BD000
stack
page read and write
12027000
trusted library allocation
page read and write
C2BE000
stack
page read and write
B204000
heap
page read and write
1545D000
stack
page read and write
B192000
heap
page read and write
128D7000
trusted library allocation
page read and write
ADCD000
stack
page read and write
1CA5C000
stack
page read and write
7CAD000
stack
page read and write
686C000
stack
page read and write
6F3C000
heap
page read and write
1BBDC000
stack
page read and write
6F4A000
heap
page read and write
15A1D000
stack
page read and write
83AD000
stack
page read and write
29E000
stack
page read and write
F74A000
trusted library allocation
page read and write
14DE6000
trusted library allocation
page read and write
6EDE000
stack
page read and write
17FEF000
heap
page read and write
128DE000
trusted library allocation
page read and write
D50E000
trusted library allocation
page read and write
E60A000
trusted library allocation
page read and write
12555000
trusted library allocation
page read and write
5C62000
heap
page read and write
14AC1000
trusted library allocation
page read and write
7BFC000
stack
page read and write
234F000
stack
page read and write
11655000
trusted library allocation
page read and write
40F3000
trusted library allocation
page read and write
E90000
unkown
page readonly
1597D000
stack
page read and write
16AE7000
trusted library allocation
page read and write
25D000
trusted library allocation
page execute and read and write
17E31000
trusted library allocation
page read and write
9BC8000
heap
page read and write
113BC000
trusted library allocation
page read and write
240000
trusted library allocation
page read and write
531D000
stack
page read and write
EE5A000
trusted library allocation
page read and write
8BED000
stack
page read and write
835D000
unkown
page read and write
600C000
stack
page read and write
220000
heap
page read and write
58CC000
stack
page read and write
817D000
stack
page read and write
26C5000
trusted library allocation
page read and write
985C000
stack
page read and write
14B3D000
stack
page read and write
D61D000
stack
page read and write
66EF000
stack
page read and write
1D0000
heap
page read and write
1C8DC000
stack
page read and write
530D000
unkown
page read and write
F52C000
trusted library allocation
page read and write
19AED000
stack
page read and write
258F000
stack
page read and write
379000
heap
page read and write
3BBF000
trusted library allocation
page read and write
1880D000
stack
page read and write
19D8D000
stack
page read and write
9BC0000
heap
page read and write
11B4E000
trusted library allocation
page read and write
AD4D000
stack
page read and write
AA000
stack
page read and write
EF97000
trusted library allocation
page read and write
6710000
heap
page read and write
5BAE000
stack
page read and write
1711C000
trusted library allocation
page read and write
50A0000
heap
page read and write
9B5C000
stack
page read and write
24B000
stack
page read and write
13FCD000
stack
page read and write
1A1ED000
stack
page read and write
1C6BD000
stack
page read and write
D87C000
trusted library allocation
page read and write
191A7000
trusted library allocation
page read and write
1703C000
trusted library allocation
page read and write
98DD000
stack
page read and write
194A4000
trusted library allocation
page read and write
11762000
trusted library allocation
page read and write
518D000
stack
page read and write
2BF0000
trusted library allocation
page read and write
1840E000
trusted library allocation
page read and write
1A59C000
stack
page read and write
10D9D000
stack
page read and write
770000
heap
page execute and read and write
360E000
stack
page read and write
559000
heap
page read and write
7635000
heap
page read and write
F193000
trusted library allocation
page read and write
11C71000
trusted library allocation
page read and write
55A0000
heap
page read and write
1071D000
stack
page read and write
665C000
stack
page read and write
16CCF000
trusted library allocation
page read and write
144CC000
trusted library allocation
page read and write
33BE000
trusted library allocation
page read and write
B0B4000
heap
page read and write
594E000
unkown
page read and write | page guard
679D000
stack
page read and write
1AC4C000
stack
page read and write
1A30D000
stack
page read and write
D81D000
stack
page read and write
1831B000
heap
page read and write
960000
trusted library allocation
page read and write
B221000
heap
page read and write
FF4D000
stack
page read and write
A8CD000
stack
page read and write
E97D000
stack
page read and write
17FFD000
heap
page read and write
524C000
stack
page read and write
1963D000
stack
page read and write
E7DD000
stack
page read and write
3F2E000
heap
page read and write
10DDD000
stack
page read and write
859000
heap
page read and write
1778D000
stack
page read and write
1CAED000
stack
page read and write
5C4F000
heap
page read and write
11CF1000
trusted library allocation
page read and write
1666E000
trusted library allocation
page read and write
3858000
trusted library allocation
page read and write
6DC000
heap
page read and write
3D33000
trusted library allocation
page read and write
13A07000
trusted library allocation
page read and write
8F8D000
stack
page read and write
219F000
unkown
page read and write
4CDE000
stack
page read and write
1E27C000
stack
page read and write
12440000
trusted library allocation
page read and write
1E40000
direct allocation
page read and write
16C83000
trusted library allocation
page read and write
CE8C000
stack
page read and write
C62D000
stack
page read and write
88000
stack
page read and write
1CB000
trusted library allocation
page execute and read and write
1397C000
stack
page read and write
88DD000
stack
page read and write
1E40000
heap
page read and write
1115C000
stack
page read and write
7975000
heap
page read and write
A97D000
stack
page read and write
20000
heap
page read and write
108BC000
stack
page read and write
1C0000
trusted library allocation
page execute and read and write
19AB3000
trusted library allocation
page read and write
330000
heap
page read and write
18963000
trusted library allocation
page read and write
2ADE000
stack
page read and write
14647000
trusted library allocation
page read and write
1906A000
trusted library allocation
page read and write
2B10000
heap
page read and write
638E000
stack
page read and write
1724E000
stack
page read and write
743F000
stack
page read and write
186E7000
trusted library allocation
page read and write
1DF4000
heap
page read and write
D79D000
stack
page read and write
81BE000
stack
page read and write
1003D000
stack
page read and write
6ADC000
stack
page read and write
B07D000
stack
page read and write
120AA000
trusted library allocation
page read and write
18277000
heap
page read and write
18728000
trusted library allocation
page read and write
181E0000
heap
page read and write
2905000
trusted library allocation
page read and write
12A17000
trusted library allocation
page read and write
B0ED000
stack
page read and write
229F000
trusted library allocation
page read and write
935C000
stack
page read and write
15138000
trusted library allocation
page read and write
4E3C000
stack
page read and write
15A1D000
stack
page read and write
DA13000
trusted library allocation
page read and write
B09F000
heap
page read and write
1D86D000
stack
page read and write
1147D000
stack
page read and write
C81D000
stack
page read and write
26D000
trusted library allocation
page execute and read and write
12C46000
trusted library allocation
page read and write
18A23000
trusted library allocation
page read and write
27F000
stack
page read and write
ED7E000
trusted library allocation
page read and write
6BA000
heap
page read and write
4C2E000
stack
page read and write
DD3D000
stack
page read and write
F0AD000
stack
page read and write
111BD000
stack
page read and write
532E000
stack
page read and write
1432C000
trusted library allocation
page read and write
C167000
trusted library allocation
page read and write
5CED000
stack
page read and write
4B0000
heap
page read and write
A76C000
stack
page read and write
14823000
trusted library allocation
page read and write
6A1E000
stack
page read and write
D9DE000
trusted library allocation
page read and write
C4BD000
stack
page read and write
105DC000
stack
page read and write
8A000
stack
page read and write
109FD000
stack
page read and write
3E1E000
stack
page read and write
DB9C000
trusted library allocation
page read and write
D293000
trusted library allocation
page read and write
1848C000
trusted library allocation
page read and write
1BF3D000
stack
page read and write
9C0C000
heap
page read and write
4BA000
heap
page read and write
7A4D000
stack
page read and write
12520000
trusted library allocation
page read and write
BC71000
trusted library allocation
page read and write
197B8000
trusted library allocation
page read and write
B90D000
stack
page read and write
B1D7000
heap
page read and write
3443000
trusted library allocation
page read and write
13AD2000
trusted library allocation
page read and write
ABDC000
stack
page read and write
3DB1000
trusted library allocation
page read and write
16EFE000
trusted library allocation
page read and write
26B5000
trusted library allocation
page read and write
95ED000
stack
page read and write
E1B3000
trusted library allocation
page read and write
19919000
trusted library allocation
page read and write
1251E000
trusted library allocation
page read and write
55E0000
heap
page read and write
14AFD000
stack
page read and write
28D8000
trusted library allocation
page read and write
287000
trusted library allocation
page execute and read and write
12A37000
trusted library allocation
page read and write
1A9EC000
stack
page read and write
14845000
trusted library allocation
page read and write
5BC5000
heap
page read and write
16A07000
trusted library allocation
page read and write
7BAE000
stack
page read and write
2B7000
heap
page read and write
11C8A000
trusted library allocation
page read and write
18131000
trusted library allocation
page read and write
13BA8000
trusted library allocation
page read and write
12770000
trusted library allocation
page read and write
FAAC000
stack
page read and write
1105D000
stack
page read and write
EDCD000
stack
page read and write
ED000
trusted library allocation
page execute and read and write
13A8B000
trusted library allocation
page read and write
B5BD000
stack
page read and write
12147000
trusted library allocation
page read and write
4BC0000
heap
page read and write
E52C000
stack
page read and write
13E47000
trusted library allocation
page read and write
598D000
stack
page read and write
C76D000
stack
page read and write
A1ED000
stack
page read and write
21E1000
trusted library allocation
page read and write
114E6000
trusted library allocation
page read and write
187000
trusted library allocation
page execute and read and write
9F0000
trusted library allocation
page execute and read and write
CF6C000
trusted library allocation
page read and write
13C1F000
trusted library allocation
page read and write
585D000
stack
page read and write
D3FD000
trusted library allocation
page read and write
1968D000
stack
page read and write
15DED000
stack
page read and write
1AD9D000
stack
page read and write
CADD000
stack
page read and write
16FBA000
trusted library allocation
page read and write
BEEC000
trusted library allocation
page read and write
FACD000
stack
page read and write
6A3D000
heap
page read and write
700000
trusted library section
page read and write
363D000
trusted library allocation
page read and write
13862000
trusted library allocation
page read and write
AECD000
stack
page read and write
CD6D000
stack
page read and write
7E2D000
stack
page read and write
ABFC000
stack
page read and write
1350D000
stack
page read and write
760C000
stack
page read and write
17F8D000
heap
page read and write
10000
heap
page read and write
1D69E000
stack
page read and write
B9F5000
trusted library allocation
page read and write
973D000
stack
page read and write
9A1C000
stack
page read and write
11F20000
trusted library allocation
page read and write
1454A000
trusted library allocation
page read and write
14F2D000
stack
page read and write
171EA000
trusted library allocation
page read and write
10000
heap
page read and write
E0000
trusted library allocation
page read and write
C66D000
stack
page read and write
2593000
trusted library allocation
page read and write
9C7000
heap
page read and write
534C000
unkown
page read and write
28E3000
trusted library allocation
page read and write
678E000
stack
page read and write
C0E7000
trusted library allocation
page read and write
1448C000
trusted library allocation
page read and write
10AAD000
stack
page read and write
130DD000
trusted library allocation
page read and write
1221C000
trusted library allocation
page read and write
38EF000
stack
page read and write
E02D000
stack
page read and write
20F000
stack
page read and write
74DC000
stack
page read and write
1D8AD000
stack
page read and write
E172000
trusted library allocation
page read and write
3351000
trusted library allocation
page read and write
5E8E000
stack
page read and write
2ABF000
trusted library allocation
page read and write
47E0000
heap
page read and write
1C39D000
stack
page read and write
13A12000
trusted library allocation
page read and write
49DD000
stack
page read and write
147C5000
trusted library allocation
page read and write
197FD000
stack
page read and write
12B35000
trusted library allocation
page read and write
B1A8000
heap
page read and write
1133E000
trusted library allocation
page read and write
942D000
stack
page read and write
6B7C000
stack
page read and write
145A7000
trusted library allocation
page read and write
1E04C000
stack
page read and write
E095000
trusted library allocation
page read and write
DC5A000
trusted library allocation
page read and write
88DC000
stack
page read and write
180D2000
heap
page read and write
3285000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
E13D000
stack
page read and write
1A41C000
stack
page read and write
D09C000
stack
page read and write
1E16D000
stack
page read and write
4970000
heap
page read and write
1894D000
stack
page read and write
15F6C000
stack
page read and write
607000
heap
page read and write
A12D000
stack
page read and write
ECBE000
stack
page read and write
499D000
stack
page read and write
A52000
unkown
page execute read
11CB1000
trusted library allocation
page read and write
39BF000
trusted library allocation
page read and write
813D000
stack
page read and write
594000
heap
page read and write
17FB4000
heap
page read and write
165EE000
trusted library allocation
page read and write
13E1D000
stack
page read and write
3857000
trusted library allocation
page read and write
113000
heap
page read and write
7DFE000
stack
page read and write
49E0000
heap
page read and write
12BF3000
trusted library allocation
page read and write
13A80000
trusted library allocation
page read and write
7A0000
heap
page execute and read and write
174D5000
trusted library allocation
page read and write
1D24D000
stack
page read and write
2841000
trusted library allocation
page read and write
658D000
stack
page read and write
915E000
stack
page read and write
B12A000
heap
page read and write
18FBC000
stack
page read and write
19C2D000
stack
page read and write
2915000
trusted library allocation
page read and write
F7A7000
trusted library allocation
page read and write
5C5F000
heap
page read and write
A21D000
stack
page read and write
E8B5000
trusted library allocation
page read and write
991D000
stack
page read and write
BC6D000
stack
page read and write
180000
trusted library allocation
page read and write
13D6B000
trusted library allocation
page read and write
1859A000
trusted library allocation
page read and write
D40D000
stack
page read and write
19A33000
trusted library allocation
page read and write
9C0000
heap
page read and write
F6FE000
trusted library allocation
page read and write
64FC000
stack
page read and write
310000
trusted library allocation
page read and write
B63C000
trusted library allocation
page read and write
3B7C000
stack
page read and write
4B7000
heap
page read and write
3FB4000
trusted library allocation
page read and write
191CD000
stack
page read and write
1CBFD000
stack
page read and write
F7CC000
stack
page read and write
3DF7000
trusted library allocation
page read and write
CFB7000
trusted library allocation
page read and write
3AB7000
trusted library allocation
page read and write
1838D000
stack
page read and write
115CC000
stack
page read and write
9D38000
heap
page read and write
D037000
trusted library allocation
page read and write
18AFC000
stack
page read and write
A4C000
stack
page read and write
F190000
trusted library allocation
page read and write
82DE000
unkown
page read and write
11E4A000
trusted library allocation
page read and write
DE95000
trusted library allocation
page read and write
DD7D000
stack
page read and write
5C57000
heap
page read and write
4D3E000
stack
page read and write
17CCD000
stack
page read and write
58FD000
stack
page read and write
185000
trusted library allocation
page execute and read and write
FE7D000
stack
page read and write
8F3D000
stack
page read and write
1590D000
stack
page read and write
1A01D000
stack
page read and write
670000
trusted library allocation
page read and write
1D6DD000
stack
page read and write
14ECD000
stack
page read and write
15B000
stack
page read and write
2B6B000
heap
page read and write
DAF0000
trusted library allocation
page read and write
55FD000
heap
page read and write
1654D000
stack
page read and write
A90D000
stack
page read and write
EA1E000
trusted library allocation
page read and write
2351000
trusted library allocation
page read and write
7B4C000
stack
page read and write
1D82C000
stack
page read and write
11F88000
trusted library allocation
page read and write
991D000
stack
page read and write
4BBF000
stack
page read and write
FA6D000
stack
page read and write
15F1D000
stack
page read and write
139CD000
stack
page read and write
13B49000
trusted library allocation
page read and write
908D000
stack
page read and write
1102D000
stack
page read and write
1460A000
trusted library allocation
page read and write
7E7E000
stack
page read and write
4FBF000
stack
page read and write
B1CF000
heap
page read and write
276000
trusted library allocation
page execute and read and write
117000
trusted library allocation
page execute and read and write
7AFD000
stack
page read and write
FD3D000
stack
page read and write
18240000
heap
page read and write
1938F000
trusted library allocation
page read and write
23E4000
heap
page read and write
6E1D000
stack
page read and write
B7AD000
stack
page read and write
9F9D000
stack
page read and write
50E3000
heap
page read and write
17E4C000
stack
page read and write
726000
trusted library allocation
page read and write
18BDE000
trusted library allocation
page read and write
6299000
stack
page read and write
12A7C000
trusted library allocation
page read and write
330000
heap
page read and write
AAFD000
stack
page read and write
3F0000
trusted library allocation
page read and write
80AD000
stack
page read and write
C11D000
stack
page read and write
BDFE000
stack
page read and write
1D20000
heap
page read and write
132CE000
trusted library allocation
page read and write
25F0000
heap
page read and write
104BC000
stack
page read and write
2F0000
trusted library allocation
page execute and read and write
1487A000
trusted library allocation
page read and write
1494D000
stack
page read and write
18D5B000
trusted library allocation
page read and write
178FD000
stack
page read and write
1EBF000
stack
page read and write
164AD000
stack
page read and write
11EE0000
trusted library allocation
page read and write
17DB1000
trusted library allocation
page read and write
5A4000
heap
page read and write
B48C000
stack
page read and write
6EE000
stack
page read and write
1A16D000
stack
page read and write
1BDED000
stack
page read and write
1D51D000
stack
page read and write
51CE000
stack
page read and write
32D3000
trusted library allocation
page read and write
142CE000
trusted library allocation
page read and write
18239000
heap
page read and write
850000
heap
page read and write
CC5E000
trusted library allocation
page read and write
6E6000
heap
page read and write
117CC000
stack
page read and write
1056E000
stack
page read and write
84BD000
stack
page read and write
189ED000
stack
page read and write
56E0000
heap
page read and write
18D2E000
trusted library allocation
page read and write
9D3C000
heap
page read and write
18E4E000
trusted library allocation
page read and write
4BBE000
stack
page read and write
137A2000
trusted library allocation
page read and write
85FC000
stack
page read and write
12F6D000
stack
page read and write
B03C000
stack
page read and write
18331000
trusted library allocation
page read and write
5F0000
heap
page read and write
F7E7000
trusted library allocation
page read and write
AC1D000
stack
page read and write
18299000
heap
page read and write
BBE000
stack
page read and write | page guard
669C000
stack
page read and write
9B60000
heap
page read and write
581000
heap
page read and write
688000
heap
page read and write
C1BD000
stack
page read and write
817D000
stack
page read and write
14B73000
trusted library allocation
page read and write
120DE000
trusted library allocation
page read and write
14ABD000
stack
page read and write
13F8D000
stack
page read and write
852D000
stack
page read and write
570000
heap
page read and write
4A0000
heap
page read and write
AA2D000
stack
page read and write
B917000
trusted library allocation
page read and write
12DD7000
trusted library allocation
page read and write
721D000
stack
page read and write
9CDD000
stack
page read and write
1C9B000
heap
page read and write
FBBD000
stack
page read and write
56EE000
heap
page read and write
E2D1000
trusted library allocation
page read and write
FBFD000
stack
page read and write
DDBD000
stack
page read and write
B17F000
heap
page read and write
CA3D000
stack
page read and write
13549000
trusted library allocation
page read and write
12C9A000
trusted library allocation
page read and write
3734000
heap
page read and write
BF76000
trusted library allocation
page read and write
13D24000
trusted library allocation
page read and write
6D0000
trusted library allocation
page execute and read and write
16B45000
trusted library allocation
page read and write
13389000
trusted library allocation
page read and write
10BAC000
stack
page read and write
A9CD000
stack
page read and write
D9B3000
trusted library allocation
page read and write
253000
trusted library allocation
page execute and read and write
11C11000
trusted library allocation
page read and write
E801000
trusted library allocation
page read and write
9E2D000
stack
page read and write
14211000
trusted library allocation
page read and write
11C45000
trusted library allocation
page read and write
2402000
heap
page read and write
556E000
stack
page read and write
C2FD000
stack
page read and write
36D7000
trusted library allocation
page read and write
667C000
stack
page read and write
16DF5000
trusted library allocation
page read and write
7C3E000
stack
page read and write
64DE000
stack
page read and write
2A9E000
stack
page read and write
524E000
stack
page read and write
262B000
heap
page read and write
17E8E000
trusted library allocation
page read and write
B0E2000
heap
page read and write
540000
trusted library allocation
page read and write
71DD000
stack
page read and write
541D000
stack
page read and write
192E5000
trusted library allocation
page read and write
4A8E000
stack
page read and write
E881000
trusted library allocation
page read and write
1A1AD000
stack
page read and write
5BAE000
stack
page read and write
664000
heap
page read and write
644000
heap
page read and write
174C4000
heap
page read and write
F99D000
stack
page read and write
5CA0000
heap
page read and write
139EE000
trusted library allocation
page read and write
17FED000
heap
page read and write
3FD7000
trusted library allocation
page read and write
9CED000
heap
page read and write
12F15000
trusted library allocation
page read and write
9D9D000
stack
page read and write
96DD000
stack
page read and write
B047000
heap
page read and write
9D09000
heap
page read and write
3632000
trusted library allocation
page read and write
5B4000
heap
page read and write
17149000
trusted library allocation
page read and write
8B9000
heap
page read and write
C05D000
stack
page read and write
2238000
trusted library allocation
page read and write
3C7D000
stack
page read and write
196CD000
stack
page read and write
DF2E000
stack
page read and write
3E77000
trusted library allocation
page read and write
E78D000
stack
page read and write
1B69E000
stack
page read and write
AABE000
stack
page read and write
9B5D000
stack
page read and write
1B6000
trusted library allocation
page execute and read and write
600000
heap
page read and write
B13D000
heap
page read and write
55DE000
stack
page read and write
1971C000
trusted library allocation
page read and write
9E9D000
stack
page read and write
115F7000
trusted library allocation
page read and write
112BE000
trusted library allocation
page read and write
There are 2066 hidden memdumps, click here to show them.