IOC Report
sipari#U015f listem05.08.2022.docx

loading gif

Files

File Path
Type
Category
Malicious
sipari#U015f listem05.08.2022.docx
Microsoft Word 2007+
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\FEE1FF08-6372-4F5E-B77E-8B1036D21086
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{C4A0D4C5-C5DA-4A24-9991-AB9B5D1C0938}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\~$pari#U015f listem05.08.2022.docx
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{59875063-1047-4CC6-A2F3-A0F4C03CF2F3}.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding

URLs

Name
IP
Malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://my.microsoftpersonalcontent.com
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
https://api.powerbi.com/beta/myorg/imports
unknown
https://devnull.onenote.com
unknown
https://messaging.action.office.com/
unknown
https://ncus.pagecontentsync.
unknown
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
unknown
https://messaging.office.com/
unknown
https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
There are 90 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
.i7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
/i7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
?l7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
rp7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
*
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
w *
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
8"*
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 319 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
14B54D02000
heap
page read and write
2578F459000
heap
page read and write
2065C102000
heap
page read and write
14B54D0A000
heap
page read and write
14B54C59000
heap
page read and write
14B4F343000
heap
page read and write
1542F2BC000
heap
page read and write
14B54D29000
heap
page read and write
2578F330000
heap
page read and write
14B4EEA0000
trusted library allocation
page read and write
14B54122000
trusted library allocation
page read and write
1542F26C000
heap
page read and write
1542F020000
heap
page read and write
E22AA7F000
stack
page read and write
14B54CB2000
heap
page read and write
D7491F8000
stack
page read and write
14B54D00000
heap
page read and write
14B5426C000
trusted library allocation
page read and write
14B5462F000
heap
page read and write
214D2A5F000
heap
page read and write
14B4F11D000
heap
page read and write
DD9147B000
stack
page read and write
1B274E80000
trusted library allocation
page read and write
14B54C11000
heap
page read and write
14B5426C000
trusted library allocation
page read and write
14B4EEA0000
trusted library allocation
page read and write
14B54C02000
heap
page read and write
14B4E887000
heap
page read and write
22AAD230000
remote allocation
page read and write
14B5412E000
trusted library allocation
page read and write
327097E000
stack
page read and write
14B4E7C0000
trusted library allocation
page read and write
B0F987E000
stack
page read and write
14B547B0000
heap
page read and write
14B4E9EB000
heap
page read and write
287A2D7B000
heap
page read and write
14B54772000
heap
page read and write
14B54759000
heap
page read and write
9CD9CFC000
stack
page read and write
287A3202000
heap
page read and write
1BE66170000
heap
page read and write
14B54300000
trusted library allocation
page read and write
14B4F202000
heap
page read and write
1BE66223000
heap
page read and write
14B54602000
heap
page read and write
E22B07F000
stack
page read and write
32709FC000
stack
page read and write
14B54126000
trusted library allocation
page read and write
1542F23D000
heap
page read and write
287A24A9000
heap
page read and write
14B5426C000
trusted library allocation
page read and write
14B547AA000
heap
page read and write
BF3DEFE000
stack
page read and write
14B547ED000
heap
page read and write
14B53FE0000
trusted library allocation
page read and write
14B54D72000
heap
page read and write
2578F461000
heap
page read and write
14B54D47000
heap
page read and write
22AA7A8D000
heap
page read and write
14B54C93000
heap
page read and write
14B5463A000
heap
page read and write
14B4EEA0000
trusted library allocation
page read and write
14B547B8000
heap
page read and write
AA6CFFE000
stack
page read and write
1B274720000
heap
page read and write
AA6CEFA000
stack
page read and write
22AA8318000
heap
page read and write
14B54794000
heap
page read and write
1542F200000
heap
page read and write
2578F47B000
heap
page read and write
22AA7A00000
heap
page read and write
2578F443000
heap
page read and write
BF3E27F000
stack
page read and write
1B274876000
heap
page read and write
14B54DD1000
heap
page read and write
14B5463D000
heap
page read and write
14B54C93000
heap
page read and write
22AAD102000
heap
page read and write
3270F7F000
stack
page read and write
14B54CD7000
heap
page read and write
2578F502000
heap
page read and write
14B54C76000
heap
page read and write
1C457C74000
heap
page read and write
1BE661F6000
heap
page read and write
32AE17E000
stack
page read and write
3270B7B000
stack
page read and write
23781410000
heap
page read and write
14B54CD9000
heap
page read and write
32ADCFE000
stack
page read and write
14B54DFE000
heap
page read and write
1C457A20000
heap
page read and write
14B54CDF000
heap
page read and write
22AAD0FB000
heap
page read and write
22AA7A29000
heap
page read and write
14B54CD7000
heap
page read and write
22AA7A41000
heap
page read and write
22AA7980000
trusted library section
page read and write
14B54264000
trusted library allocation
page read and write
214D2B00000
heap
page read and write
76B970C000
stack
page read and write
14B547F6000
heap
page read and write
14B54C49000
heap
page read and write
2578F469000
heap
page read and write
7973F7F000
stack
page read and write
2578F45F000
heap
page read and write
1C457C8B000
heap
page read and write
22AAD0E2000
heap
page read and write
1E702677000
heap
page read and write
1C457C8F000
heap
page read and write
9CDA87E000
stack
page read and write
287A2D00000
heap
page read and write
14B54D0A000
heap
page read and write
287A2D13000
heap
page read and write
2065BF70000
heap
page read and write
20F7C03D000
heap
page read and write
214D2810000
heap
page read and write
14B54638000
heap
page read and write
DD9177E000
stack
page read and write
14B54CE2000
heap
page read and write
14B54118000
trusted library allocation
page read and write
14B54E02000
heap
page read and write
14B4F102000
heap
page read and write
14B54D65000
heap
page read and write
14B54C20000
heap
page read and write
14B4F1D1000
heap
page read and write
1542FA02000
heap
page read and write
22AACED0000
trusted library allocation
page read and write
214D2B02000
heap
page read and write
22AAD0FE000
heap
page read and write
14B4F39F000
heap
page read and write
14B4E88C000
heap
page read and write
14B5412C000
trusted library allocation
page read and write
14B54CBE000
heap
page read and write
14B54770000
heap
page read and write
14B54CA9000
heap
page read and write
9CDA37F000
stack
page read and write
23781638000
heap
page read and write
23781629000
heap
page read and write
287A2452000
heap
page read and write
14B54D96000
heap
page read and write
2065C056000
heap
page read and write
14B54CE8000
heap
page read and write
14B54661000
heap
page read and write
214D2A2A000
heap
page read and write
14B54C43000
heap
page read and write
14B547EB000
heap
page read and write
1C457C4E000
heap
page read and write
22AA7A58000
heap
page read and write
14B4F3C7000
heap
page read and write
22AACDC0000
trusted library allocation
page read and write
14B547B2000
heap
page read and write
14B54DD1000
heap
page read and write
14B54CC9000
heap
page read and write
287A243C000
heap
page read and write
22AAD063000
heap
page read and write
14B54C3E000
heap
page read and write
1C457C00000
heap
page read and write
1E702613000
heap
page read and write
23781702000
heap
page read and write
14B54669000
heap
page read and write
14B4E891000
heap
page read and write
14B5462D000
heap
page read and write
1E702672000
heap
page read and write
14B54D0A000
heap
page read and write
14B54662000
heap
page read and write
22AA8A00000
trusted library section
page readonly
23781652000
heap
page read and write
14B54D99000
heap
page read and write
14B54C7C000
heap
page read and write
287A2516000
heap
page read and write
1E70263C000
heap
page read and write
14B54D29000
heap
page read and write
14B54C69000
heap
page read and write
1C457C81000
heap
page read and write
1542F302000
heap
page read and write
14B54626000
heap
page read and write
14B4FED0000
trusted library section
page readonly
14B54CDD000
heap
page read and write
14B54D5B000
heap
page read and write
14B54CBC000
heap
page read and write
14B54130000
trusted library allocation
page read and write
14B54CAA000
heap
page read and write
22AAD100000
heap
page read and write
14B4F3D1000
heap
page read and write
14B54124000
trusted library allocation
page read and write
14B54CD7000
heap
page read and write
14B54D20000
heap
page read and write
14B4F190000
heap
page read and write
22AA8202000
heap
page read and write
14B54754000
heap
page read and write
287A2400000
heap
page read and write
14B54CA1000
heap
page read and write
14B547D1000
heap
page read and write
14B4F1AE000
heap
page read and write
14B542D0000
trusted library allocation
page read and write
287A2413000
heap
page read and write
2578F465000
heap
page read and write
2578F458000
heap
page read and write
14B5462D000
heap
page read and write
14B54CA9000
heap
page read and write
E22AE7C000
stack
page read and write
14B54DE1000
heap
page read and write
14B54DCA000
heap
page read and write
14B54D02000
heap
page read and write
14B54DFE000
heap
page read and write
14B54639000
heap
page read and write
14B54180000
trusted library allocation
page read and write
14B54D7D000
heap
page read and write
2065C802000
trusted library allocation
page read and write
14B54CB4000
heap
page read and write
287A2D7E000
heap
page read and write
14B54110000
trusted library allocation
page read and write
14B54CE9000
heap
page read and write
14B547EB000
heap
page read and write
14B4F300000
heap
page read and write
14B5415E000
trusted library allocation
page read and write
287A2450000
heap
page read and write
20F7C02A000
heap
page read and write
14B54DA0000
heap
page read and write
32ACF8B000
stack
page read and write
14B54655000
heap
page read and write
287A2D8C000
heap
page read and write
14B54D8B000
heap
page read and write
E22AB7B000
stack
page read and write
14B54750000
heap
page read and write
3D8BF8000
stack
page read and write
14B5463F000
heap
page read and write
1E702600000
heap
page read and write
14B541A0000
trusted library allocation
page read and write
23781E02000
trusted library allocation
page read and write
1542F2C4000
heap
page read and write
14B54CA2000
heap
page read and write
14B54C90000
heap
page read and write
14B4F880000
trusted library allocation
page read and write
2578F485000
heap
page read and write
14B54D5D000
heap
page read and write
1542F313000
heap
page read and write
2578F466000
heap
page read and write
14B54757000
heap
page read and write
22AA81C3000
trusted library allocation
page read and write
14B54C6D000
heap
page read and write
14B54634000
heap
page read and write
14B547B8000
heap
page read and write
1C458402000
trusted library allocation
page read and write
14B54C88000
heap
page read and write
14B4E85D000
heap
page read and write
214D2980000
trusted library allocation
page read and write
14B54CD7000
heap
page read and write
22AA8A10000
trusted library section
page readonly
287A2DA2000
heap
page read and write
14B54C7C000
heap
page read and write
DD90F2B000
stack
page read and write
14B54D7F000
heap
page read and write
14B54C1A000
heap
page read and write
23781470000
heap
page read and write
2578F46B000
heap
page read and write
14B54CF3000
heap
page read and write
287A2449000
heap
page read and write
AA6CDFE000
stack
page read and write
14B4FF50000
trusted library allocation
page read and write
22AAD030000
trusted library allocation
page read and write
14B54C4D000
heap
page read and write
14B4EEA0000
trusted library allocation
page read and write
14B4F000000
heap
page read and write
14B54C34000
heap
page read and write
14B54CD7000
heap
page read and write
76B9A7E000
stack
page read and write
14B54CD7000
heap
page read and write
22AAD04A000
heap
page read and write
14B4FDE0000
trusted library allocation
page read and write
14B54658000
heap
page read and write
2065C002000
heap
page read and write
14B4F34D000
heap
page read and write
14B4FB90000
trusted library allocation
page read and write
14B4EEA0000
trusted library allocation
page read and write
9CDA0FB000
stack
page read and write
14B4F1DD000
heap
page read and write
287A24F1000
heap
page read and write
287A2D78000
heap
page read and write
287A24E4000
heap
page read and write
14B5477D000
heap
page read and write
14B4E843000
heap
page read and write
14B54CA2000
heap
page read and write
14B4EEA0000
trusted library allocation
page read and write
14B4E875000
heap
page read and write
14B5419C000
trusted library allocation
page read and write
32ADBFA000
stack
page read and write
14B5462D000
heap
page read and write
14B54669000
heap
page read and write
20F7BFF0000
trusted library allocation
page read and write
23781613000
heap
page read and write
1BE66214000
heap
page read and write
14B54C00000
heap
page read and write
14B54D8F000
heap
page read and write
14B54D02000
heap
page read and write
14B4EEA0000
trusted library allocation
page read and write
2578F47F000
heap
page read and write
14B54D58000
heap
page read and write
14B5462F000
heap
page read and write
287A2D7E000
heap
page read and write
1C457C13000
heap
page read and write
1E7023D0000
heap
page read and write
14B4F154000
heap
page read and write
14B54D41000
heap
page read and write
14B4EE90000
trusted library allocation
page read and write
D748EF7000
stack
page read and write
14B5411C000
trusted library allocation
page read and write
14B54661000
heap
page read and write
14B4F11D000
heap
page read and write
287A2D7E000
heap
page read and write
14B54C39000
heap
page read and write
D748DF7000
stack
page read and write
14B54D0A000
heap
page read and write
1B274902000
heap
page read and write
287A2DB7000
heap
page read and write
2578F43C000
heap
page read and write
14B54C86000
heap
page read and write
14B54669000
heap
page read and write
2578F476000
heap
page read and write
14B54D53000
heap
page read and write
14B547EB000
heap
page read and write
14B54CD5000
heap
page read and write
14B54CD7000
heap
page read and write
14B54320000
trusted library allocation
page read and write
14B54CA7000
heap
page read and write
1C457A80000
heap
page read and write
14B4F3CF000
heap
page read and write
76B9DFF000
stack
page read and write
BF3DF7E000
stack
page read and write
287A2D72000
heap
page read and write
14B54CD7000
heap
page read and write
20F7C102000
heap
page read and write
287A2D7B000
heap
page read and write
14B54264000
trusted library allocation
page read and write
14B54C1C000
heap
page read and write
287A244C000
heap
page read and write
1C457C63000
heap
page read and write
214D2A3C000
heap
page read and write
14B54110000
trusted library allocation
page read and write
14B54655000
heap
page read and write
D74893E000
stack
page read and write
14B54D6C000
heap
page read and write
20F7C002000
heap
page read and write
214D2A73000
heap
page read and write
14B54DA4000
heap
page read and write
14B54330000
trusted library allocation
page read and write
1542F224000
heap
page read and write
14B54C0D000
heap
page read and write
22AAD230000
remote allocation
page read and write
2578F441000
heap
page read and write
32AD5FB000
stack
page read and write
2578F478000
heap
page read and write
14B54260000
trusted library allocation
page read and write
14B54D63000
heap
page read and write
2578F45A000
heap
page read and write
22AACF10000
trusted library allocation
page read and write
14B54634000
heap
page read and write
14B54C60000
heap
page read and write
14B4F3D3000
heap
page read and write
22AA8200000
heap
page read and write
22AAD0A6000
heap
page read and write
14B4F002000
heap
page read and write
14B54115000
trusted library allocation
page read and write
14B540F0000
trusted library allocation
page read and write
14B54610000
heap
page read and write
2578F475000
heap
page read and write
14B4F34C000
heap
page read and write
22AACF00000
trusted library allocation
page read and write
287A2270000
heap
page read and write
E22B37F000
stack
page read and write
14B54C51000
heap
page read and write
14B5462D000
heap
page read and write
14B5462D000
heap
page read and write
7973C7B000
stack
page read and write
2578FC02000
trusted library allocation
page read and write
1E7023E0000
heap
page read and write
E22ABFE000
stack
page read and write
14B54CA2000
heap
page read and write
214D2A13000
heap
page read and write
E22AEFF000
stack
page read and write
14B54DBD000
heap
page read and write
14B5474C000
heap
page read and write
14B54CA4000
heap
page read and write
2578F42A000
heap
page read and write
287A2D71000
heap
page read and write
14B54D05000
heap
page read and write
14B54C59000
heap
page read and write
B0F956B000
stack
page read and write
14B54CEF000
heap
page read and write
14B54770000
heap
page read and write
14B54C79000
heap
page read and write
14B54C82000
heap
page read and write
14B54D8D000
heap
page read and write
3D8C7E000
stack
page read and write
14B54270000
trusted library allocation
page read and write
22AACEDE000
trusted library allocation
page read and write
14B54C19000
heap
page read and write
14B54D79000
heap
page read and write
214D2A61000
heap
page read and write
14B54C60000
heap
page read and write
287A2448000
heap
page read and write
14B54240000
trusted library allocation
page read and write
14B54D2B000
heap
page read and write
B0F9DFF000
stack
page read and write
1B275002000
trusted library allocation
page read and write
287A2455000
heap
page read and write
7973AFE000
stack
page read and write
14B54DB7000
heap
page read and write
14B542A0000
trusted library allocation
page read and write
1BE661E0000
heap
page read and write
14B54650000
heap
page read and write
14B54CEB000
heap
page read and write
1B274866000
heap
page read and write
32ADD7E000
stack
page read and write
14B54CCB000
heap
page read and write
14B54634000
heap
page read and write
BF3DE7E000
stack
page read and write
14B54CC0000
heap
page read and write
2578F448000
heap
page read and write
14B54C93000
heap
page read and write
1BE66214000
heap
page read and write
14B54C80000
heap
page read and write
14B4F3BE000
heap
page read and write
14B54115000
trusted library allocation
page read and write
1C457D00000
heap
page read and write
14B4E868000
heap
page read and write
14B5476F000
heap
page read and write
14B547EB000
heap
page read and write
14B54C03000
heap
page read and write
22AA79E1000
trusted library allocation
page read and write
1542F266000
heap
page read and write
14B54D84000
heap
page read and write
14B54CC3000
heap
page read and write
20F7C5B0000
remote allocation
page read and write
14B5462D000
heap
page read and write
14B547EB000
heap
page read and write
14B54C02000
heap
page read and write
14B54D28000
heap
page read and write
E22A87A000
stack
page read and write
14B54CF5000
heap
page read and write
14B54C14000
heap
page read and write
287A2C02000
heap
page read and write
DD9157B000
stack
page read and write
14B54DDF000
heap
page read and write
14B54D88000
heap
page read and write
20F7C026000
heap
page read and write
14B5477D000
heap
page read and write
22AA7A71000
heap
page read and write
287A2DA5000
heap
page read and write
14B54340000
trusted library allocation
page read and write
14B4F3CF000
heap
page read and write
22AA8820000
trusted library allocation
page read and write
14B54CE3000
heap
page read and write
14B54D0A000
heap
page read and write
BF3E1FD000
stack
page read and write
B0F95EE000
stack
page read and write
76B9FFE000
stack
page read and write
14B54D03000
heap
page read and write
2065BF80000
heap
page read and write
14B542F0000
trusted library allocation
page read and write
287A2DA5000
heap
page read and write
14B54DC3000
heap
page read and write
14B54D35000
heap
page read and write
1E702694000
heap
page read and write
22AA7A78000
heap
page read and write
2065C100000
heap
page read and write
14B4E7E0000
trusted library allocation
page read and write
1E702700000
heap
page read and write
14B4F100000
heap
page read and write
14B54C0B000
heap
page read and write
14B54D15000
heap
page read and write
14B5462F000
heap
page read and write
14B54CD7000
heap
page read and write
287A2D7A000
heap
page read and write
22AACEF4000
trusted library allocation
page read and write
287A2502000
heap
page read and write
14B4E83D000
heap
page read and write
14B54D3E000
heap
page read and write
2065C079000
heap
page read and write
20F7BDC0000
heap
page read and write
14B5412A000
trusted library allocation
page read and write
14B547FD000
heap
page read and write
1E702BA0000
trusted library allocation
page read and write
2065C040000
heap
page read and write
287A2D3A000
heap
page read and write
287A24A8000
heap
page read and write
287A2D71000
heap
page read and write
1542FB00000
heap
page read and write
22AA8910000
trusted library allocation
page read and write
14B54D3B000
heap
page read and write
287A24F9000
heap
page read and write
2578F43A000
heap
page read and write
2065C740000
trusted library allocation
page read and write
214D2A5A000
heap
page read and write
14B4F1AB000
heap
page read and write
287A2200000
heap
page read and write
14B54510000
trusted library allocation
page read and write
14B4F36B000
heap
page read and write
1C457C3C000
heap
page read and write
22AA8318000
heap
page read and write
14B4E878000
heap
page read and write
14B54120000
trusted library allocation
page read and write
14B54770000
heap
page read and write
287A2D94000
heap
page read and write
14B54C8F000
heap
page read and write
14B54C3E000
heap
page read and write
14B54C7E000
heap
page read and write
287A2D82000
heap
page read and write
14B54669000
heap
page read and write
14B54704000
heap
page read and write
1B274866000
heap
page read and write
2578F400000
heap
page read and write
14B54132000
trusted library allocation
page read and write
14B54110000
trusted library allocation
page read and write
14B4F38C000
heap
page read and write
9CDA57D000
stack
page read and write
2578F3A0000
heap
page read and write
76B9B7B000
stack
page read and write
2578F46E000
heap
page read and write
1B274800000
heap
page read and write
7973E77000
stack
page read and write
14B547AE000
heap
page read and write
14B4E86F000
heap
page read and write
14B54128000
trusted library allocation
page read and write
22AACEF0000
trusted library allocation
page read and write
14B54520000
trusted library allocation
page read and write
14B54C66000
heap
page read and write
14B54CA7000
heap
page read and write
22AA7AFD000
heap
page read and write
14B54C32000
heap
page read and write
1E702649000
heap
page read and write
1C457C29000
heap
page read and write
BF3E37D000
stack
page read and write
20F7BDB0000
heap
page read and write
14B5426C000
trusted library allocation
page read and write
22AA7970000
trusted library allocation
page read and write
14B54260000
trusted library allocation
page read and write
14B54264000
trusted library allocation
page read and write
14B4FF10000
trusted library section
page readonly
32AD87A000
stack
page read and write
14B4F3CF000
heap
page read and write
214D2A52000
heap
page read and write
14B54110000
trusted library allocation
page read and write
14B54390000
trusted library allocation
page read and write
14B54653000
heap
page read and write
14B54CB1000
heap
page read and write
14B54656000
heap
page read and write
14B5412A000
trusted library allocation
page read and write
14B540F0000
trusted library allocation
page read and write
14B542C0000
trusted library allocation
page read and write
14B5412C000
trusted library allocation
page read and write
287A2D8C000
heap
page read and write
D748CFC000
stack
page read and write
287A2D5F000
heap
page read and write
1B27486C000
heap
page read and write
1542F22A000
heap
page read and write
14B54C8D000
heap
page read and write
14B54CB0000
heap
page read and write
14B54120000
trusted library allocation
page read and write
14B54200000
remote allocation
page read and write
1C457C5D000
heap
page read and write
287A2DBD000
heap
page read and write
14B54CCC000
heap
page read and write
14B542B0000
trusted library allocation
page read and write
14B4E98E000
heap
page read and write
287A2D4A000
heap
page read and write
14B4F374000
heap
page read and write
287A24F1000
heap
page read and write
14B4FB80000
trusted library allocation
page read and write
14B54DFE000
heap
page read and write
14B54CA1000
heap
page read and write
23781570000
trusted library allocation
page read and write
14B5462D000
heap
page read and write
32706FC000
stack
page read and write
14B54750000
heap
page read and write
14B4F3CF000
heap
page read and write
2578F447000
heap
page read and write
14B4E660000
heap
page read and write
14B54C46000
heap
page read and write
14B5462D000
heap
page read and write
14B547F5000
heap
page read and write
287A244F000
heap
page read and write
14B54260000
trusted library allocation
page read and write
22AAD0EE000
heap
page read and write
1C457C62000
heap
page read and write
14B54264000
trusted library allocation
page read and write
32ADAFF000
stack
page read and write
14B54CE8000
heap
page read and write
14B54D95000
heap
page read and write
14B4F3D9000
heap
page read and write
14B54DE7000
heap
page read and write
14B54440000
remote allocation
page read and write
14B54130000
trusted library allocation
page read and write
20F7C602000
trusted library allocation
page read and write
14B54200000
remote allocation
page read and write
14B54D74000
heap
page read and write
14B54638000
heap
page read and write
32ADA7E000
stack
page read and write
287A2429000
heap
page read and write
14B54D0A000
heap
page read and write
22AA8302000
heap
page read and write
14B4E913000
heap
page read and write
14B54D5F000
heap
page read and write
14B54CC5000
heap
page read and write
14B5462F000
heap
page read and write
22AAD0FB000
heap
page read and write
3D8D7C000
stack
page read and write
287A2D94000
heap
page read and write
14B54260000
trusted library allocation
page read and write
14B4E9C2000
heap
page read and write
14B54C84000
heap
page read and write
22AAD0F3000
heap
page read and write
2378162C000
heap
page read and write
2578F463000
heap
page read and write
14B5476F000
heap
page read and write
287A2D82000
heap
page read and write
14B54D39000
heap
page read and write
F681BFE000
stack
page read and write
287A248A000
heap
page read and write
1542F2CD000
heap
page read and write
14B54DD1000
heap
page read and write
14B5426C000
trusted library allocation
page read and write
14B4FF40000
trusted library allocation
page read and write
14B4F16F000
heap
page read and write
14B54D29000
heap
page read and write
14B54634000
heap
page read and write
14B54250000
trusted library allocation
page read and write
14B54C3F000
heap
page read and write
2578F340000
heap
page read and write
14B4F3D7000
heap
page read and write
14B54CCF000
heap
page read and write
14B54CF9000
heap
page read and write
287A24B3000
heap
page read and write
1542F080000
heap
page read and write
32ADE7A000
stack
page read and write
14B5462C000
heap
page read and write
76B9C7B000
stack
page read and write
7973A7B000
stack
page read and write
287A24B0000
heap
page read and write
22AAD020000
trusted library allocation
page read and write
14B54DBA000
heap
page read and write
14B54D46000
heap
page read and write
1E70264E000
heap
page read and write
14B54626000
heap
page read and write
287A2D7F000
heap
page read and write
22AAD210000
trusted library allocation
page read and write
287A2D79000
heap
page read and write
14B4F12D000
heap
page read and write
14B4F200000
heap
page read and write
22AA7A9F000
heap
page read and write
14B54CE8000
heap
page read and write
14B4F376000
heap
page read and write
14B4F12A000
heap
page read and write
287A2210000
heap
page read and write
287A24C2000
heap
page read and write
14B54D29000
heap
page read and write
14B5411C000
trusted library allocation
page read and write
14B54C64000
heap
page read and write
14B547C8000
heap
page read and write
14B547EB000
heap
page read and write
14B54CD1000
heap
page read and write
287A23E0000
remote allocation
page read and write
14B54C6F000
heap
page read and write
14B54CC7000
heap
page read and write
1C457D02000
heap
page read and write
14B54C41000
heap
page read and write
14B54CD7000
heap
page read and write
22AA8313000
heap
page read and write
14B5412E000
trusted library allocation
page read and write
1C457D08000
heap
page read and write
1BE66206000
heap
page read and write
14B54D13000
heap
page read and write
14B54C5E000
heap
page read and write
2578F47C000
heap
page read and write
14B54110000
trusted library allocation
page read and write
14B4E650000
heap
page read and write
14B54637000
heap
page read and write
14B54D02000
heap
page read and write
14B54D93000
heap
page read and write
14B54CD7000
heap
page read and write
14B54120000
trusted library allocation
page read and write
AA6C8EC000
stack
page read and write
287A2D94000
heap
page read and write
14B54CE9000
heap
page read and write
14B54661000
heap
page read and write
22AACF00000
trusted library allocation
page read and write
14B54CD7000
heap
page read and write
14B54D68000
heap
page read and write
22AAD03D000
heap
page read and write
214D3202000
trusted library allocation
page read and write
14B4F3A8000
heap
page read and write
14B54626000
heap
page read and write
32AE47D000
stack
page read and write
14B54CCE000
heap
page read and write
214D2A5C000
heap
page read and write
14B4F3B4000
heap
page read and write
14B54D02000
heap
page read and write
2065BFE0000
heap
page read and write
14B54626000
heap
page read and write
32AD4FF000
stack
page read and write
22AACED8000
trusted library allocation
page read and write
287A2D78000
heap
page read and write
14B54CD7000
heap
page read and write
14B54CAE000
heap
page read and write
287A2DCD000
heap
page read and write
14B5476F000
heap
page read and write
287A2DBD000
heap
page read and write
14B54D0A000
heap
page read and write
14B54648000
heap
page read and write
14B55010000
heap
page read and write
287A2D7F000
heap
page read and write
14B54DA6000
heap
page read and write
F681DFE000
stack
page read and write
14B54370000
trusted library allocation
page read and write
20F7BE20000
heap
page read and write
14B4EEA0000
trusted library allocation
page read and write
32AD77A000
stack
page read and write
23781630000
heap
page read and write
14B54DCA000
heap
page read and write
14B54CAC000
heap
page read and write
14B54DDB000
heap
page read and write
14B5463C000
heap
page read and write
9CDA77E000
stack
page read and write
1E702713000
heap
page read and write
1542F213000
heap
page read and write
22AA8300000
heap
page read and write
F681AFE000
stack
page read and write
14B4F1F1000
heap
page read and write
14B4F258000
heap
page read and write
3270AFD000
stack
page read and write
1E70264A000
heap
page read and write
22AAD02C000
heap
page read and write
14B53F50000
trusted library allocation
page read and write
14B547C9000
heap
page read and write
14B54D02000
heap
page read and write
14B54175000
trusted library allocation
page read and write
22AAE000000
heap
page read and write
14B54DFC000
heap
page read and write
14B54669000
heap
page read and write
14B54C2E000
heap
page read and write
22AA8A30000
trusted library section
page readonly
22AA7B02000
heap
page read and write
1E702702000
heap
page read and write
14B5477D000
heap
page read and write
76B9EFF000
stack
page read and write
22AA7870000
heap
page read and write
14B54750000
heap
page read and write
22AAD056000
heap
page read and write
214D2A63000
heap
page read and write
14B547C8000
heap
page read and write
22AA81E0000
trusted library allocation
page read and write
14B54D4D000
heap
page read and write
14B54669000
heap
page read and write
14B54D21000
heap
page read and write
32AD9FF000
stack
page read and write
1E70262A000
heap
page read and write
14B54CE5000
heap
page read and write
14B54D1E000
heap
page read and write
14B54110000
trusted library allocation
page read and write
23781420000
heap
page read and write
F6818FE000
stack
page read and write
14B54126000
trusted library allocation
page read and write
14B547EB000
heap
page read and write
14B54CA5000
heap
page read and write
2578F445000
heap
page read and write
14B4F3A7000
heap
page read and write
BF3E47D000
stack
page read and write
14B54132000
trusted library allocation
page read and write
14B54C93000
heap
page read and write
14B54626000
heap
page read and write
E22B17A000
stack
page read and write
14B4F900000
trusted library allocation
page read and write
14B54C22000
heap
page read and write
14B54D9E000
heap
page read and write
14B4F3EF000
heap
page read and write
22AA7A13000
heap
page read and write
14B54D0A000
heap
page read and write
D7490FF000
stack
page read and write
14B4F3AE000
heap
page read and write
14B54DC3000
heap
page read and write
22AACF14000
trusted library allocation
page read and write
14B54C66000
heap
page read and write
14B54264000
trusted library allocation
page read and write
14B547B4000
heap
page read and write
14B547EC000
heap
page read and write
14B54738000
heap
page read and write
14B4E6C0000
heap
page read and write
14B54C17000
heap
page read and write
14B4F3D3000
heap
page read and write
1542F180000
trusted library allocation
page read and write
14B54700000
heap
page read and write
32AE07E000
stack
page read and write
14B54D76000
heap
page read and write
14B5415A000
trusted library allocation
page read and write
1BE66205000
heap
page read and write
14B54669000
heap
page read and write
2578F45C000
heap
page read and write
1BE66222000
heap
page read and write
14B54C6A000
heap
page read and write
14B54CF1000
heap
page read and write
14B5478E000
heap
page read and write
14B54D36000
heap
page read and write
14B54D29000
heap
page read and write
14B54713000
heap
page read and write
DD9167E000
stack
page read and write
14B54634000
heap
page read and write
287A2471000
heap
page read and write
14B4E829000
heap
page read and write
14B54C03000
heap
page read and write
22AA81C0000
trusted library allocation
page read and write
14B54120000
trusted library allocation
page read and write
1542FB32000
heap
page read and write
1BE66214000
heap
page read and write
14B4F1CC000
heap
page read and write
14B54D19000
heap
page read and write
1B2746B0000
heap
page read and write
20F7C000000
heap
page read and write
14B4F34D000
heap
page read and write
14B547EE000
heap
page read and write
2578F44F000
heap
page read and write
B0F9A7B000
stack
page read and write
14B54D06000
heap
page read and write
14B4FEC0000
trusted library section
page readonly
14B54C07000
heap
page read and write
14B547B2000
heap
page read and write
32AD679000
stack
page read and write
14B54D71000
heap
page read and write
14B54D02000
heap
page read and write
76B9D77000
stack
page read and write
14B4FF21000
trusted library allocation
page read and write
1BE661EB000
heap
page read and write
2578F446000
heap
page read and write
22AACFA0000
trusted library allocation
page read and write
1E702440000
heap
page read and write
287A24C9000
heap
page read and write
14B54D8A000
heap
page read and write
14B5463C000
heap
page read and write
14B4F20A000
heap
page read and write
20F7C059000
heap
page read and write
14B4F223000
heap
page read and write
3270D7E000
stack
page read and write
22AA7A76000
heap
page read and write
B0F9CFF000
stack
page read and write
14B540F0000
trusted library allocation
page read and write
14B54D54000
heap
page read and write
22AAD000000
heap
page read and write
14B54661000
heap
page read and write
22AA8215000
heap
page read and write
14B542F0000
trusted library allocation
page read and write
14B54D7C000
heap
page read and write
22AAD08A000
heap
page read and write
14B54DC3000
heap
page read and write
14B4F1C0000
heap
page read and write
14B54D49000
heap
page read and write
23781645000
heap
page read and write
14B4F3D0000
heap
page read and write
2065C113000
heap
page read and write
14B54CB8000
heap
page read and write
14B54600000
heap
page read and write
14B4E892000
heap
page read and write
14B547B2000
heap
page read and write
14B547EB000
heap
page read and write
22AAD230000
remote allocation
page read and write
287A2D6D000
heap
page read and write
287A2D79000
heap
page read and write
F681CFE000
stack
page read and write
22AAD200000
trusted library allocation
page read and write
214D2A5B000
heap
page read and write
9CDA47E000
stack
page read and write
287A2D11000
heap
page read and write
214D2B13000
heap
page read and write
14B4F3D3000
heap
page read and write
1B274829000
heap
page read and write
20F7C5B0000
remote allocation
page read and write
1BE66204000
heap
page read and write
14B5415A000
trusted library allocation
page read and write
14B4F354000
heap
page read and write
1BE66040000
heap
page read and write
14B54D4B000
heap
page read and write
14B54D09000
heap
page read and write
214D2880000
heap
page read and write
E22A97C000
stack
page read and write
14B54613000
heap
page read and write
1BE66450000
heap
page read and write
2578F44E000
heap
page read and write
14B54CC6000
heap
page read and write
14B54260000
trusted library allocation
page read and write
22AA7B13000
heap
page read and write
287A2D77000
heap
page read and write
22AACEF1000
trusted library allocation
page read and write
14B5462F000
heap
page read and write
287A24DC000
heap
page read and write
22AA8D90000
trusted library allocation
page read and write
BF3DFFE000
stack
page read and write
1E702657000
heap
page read and write
1BE661F6000
heap
page read and write
1B274913000
heap
page read and write
22AA7810000
heap
page read and write
20F7C5B0000
remote allocation
page read and write
14B54110000
trusted library allocation
page read and write
14B547C8000
heap
page read and write
22AA81D0000
trusted library allocation
page read and write
32AE275000
stack
page read and write
14B54626000
heap
page read and write
214D2B08000
heap
page read and write
9CDA97F000
stack
page read and write
14B54DA2000
heap
page read and write
287A244B000
heap
page read and write
22AACFF0000
trusted library allocation
page read and write
14B54773000
heap
page read and write
14B54C1E000
heap
page read and write
14B54D2B000
heap
page read and write
14B54CD5000
heap
page read and write
14B54634000
heap
page read and write
14B54662000
heap
page read and write
14B4E813000
heap
page read and write
E22A777000
stack
page read and write
214D2A00000
heap
page read and write
14B54C80000
heap
page read and write
14B54CB6000
heap
page read and write
3D8CFF000
stack
page read and write
BF3E0FF000
stack
page read and write
14B5410C000
trusted library allocation
page read and write
22AAD088000
heap
page read and write
14B54626000
heap
page read and write
287A3202000
heap
page read and write
14B4F366000
heap
page read and write
14B54D38000
heap
page read and write
1C457A10000
heap
page read and write
214D2A60000
heap
page read and write
D74927F000
unkown
page read and write
2578F464000
heap
page read and write
E22AC7E000
stack
page read and write
14B547B1000
heap
page read and write
287A2D7C000
heap
page read and write
14B54C78000
heap
page read and write
1C457B80000
trusted library allocation
page read and write
14B54C3B000
heap
page read and write
14B54CD7000
heap
page read and write
1B27485B000
heap
page read and write
14B4E800000
heap
page read and write
3D8B7F000
stack
page read and write
E22ACFE000
stack
page read and write
14B54CA4000
heap
page read and write
3D8AFE000
stack
page read and write
14B5411C000
trusted library allocation
page read and write
287A2DB6000
heap
page read and write
14B54CAC000
heap
page read and write
14B4F1F7000
heap
page read and write
14B54114000
trusted library allocation
page read and write
287A2D97000
heap
page read and write
14B54175000
trusted library allocation
page read and write
22AA7A7B000
heap
page read and write
14B5477D000
heap
page read and write
14B5465F000
heap
page read and write
14B547DA000
heap
page read and write
B0F997B000
stack
page read and write
1B27483C000
heap
page read and write
2065C068000
heap
page read and write
22AA8358000
heap
page read and write
2578F46C000
heap
page read and write
14B54C76000
heap
page read and write
14B54DBA000
heap
page read and write
214D2820000
heap
page read and write
14B54D11000
heap
page read and write
14B54D29000
heap
page read and write
14B54D83000
heap
page read and write
14B547C8000
heap
page read and write
14B54C39000
heap
page read and write
14B54D87000
heap
page read and write
76B978E000
stack
page read and write
D7489BF000
stack
page read and write
14B5465B000
heap
page read and write
9CDA27D000
stack
page read and write
2378163C000
heap
page read and write
14B53F60000
trusted library allocation
page read and write
14B54CA1000
heap
page read and write
14B547BC000
heap
page read and write
214D2A5D000
heap
page read and write
E22AD7F000
stack
page read and write
B0F9BF7000
stack
page read and write
3270E7C000
stack
page read and write
14B54DDC000
heap
page read and write
287A2513000
heap
page read and write
14B5476B000
heap
page read and write
14B54D4F000
heap
page read and write
14B4F1CA000
heap
page read and write
327087E000
stack
page read and write
14B547C8000
heap
page read and write
14B54DE3000
heap
page read and write
14B54D81000
heap
page read and write
287A23E0000
remote allocation
page read and write
14B4F3D4000
heap
page read and write
14B54626000
heap
page read and write
32AD97F000
stack
page read and write
14B53FD0000
trusted library allocation
page read and write
14B54264000
trusted library allocation
page read and write
14B54D0A000
heap
page read and write
22AAD0A3000
heap
page read and write
22AA8A20000
trusted library section
page readonly
14B5462F000
heap
page read and write
2578F47A000
heap
page read and write
14B5476A000
heap
page read and write
D7488BB000
stack
page read and write
14B4FF00000
trusted library section
page readonly
14B54662000
heap
page read and write
20F7C024000
heap
page read and write
32ADC7F000
stack
page read and write
1542F010000
heap
page read and write
7973D7B000
stack
page read and write
14B54D2F000
heap
page read and write
14B54260000
trusted library allocation
page read and write
14B4FEE0000
trusted library section
page readonly
287A2508000
heap
page read and write
14B4F1C6000
heap
page read and write
14B4F3F5000
heap
page read and write
14B54CBA000
heap
page read and write
14B54D78000
heap
page read and write
14B5464D000
heap
page read and write
BF3DAAB000
stack
page read and write
14B54D29000
heap
page read and write
14B54C82000
heap
page read and write
14B5464F000
heap
page read and write
14B547B4000
heap
page read and write
23781625000
heap
page read and write
14B54C53000
heap
page read and write
797407F000
stack
page read and write
1542F288000
heap
page read and write
32702FB000
stack
page read and write
14B54CC8000
heap
page read and write
22AA7A8B000
heap
page read and write
14B54128000
trusted library allocation
page read and write
14B54D02000
heap
page read and write
14B54655000
heap
page read and write
32ADF7D000
stack
page read and write
14B4F3CF000
heap
page read and write
14B54C13000
heap
page read and write
14B547B8000
heap
page read and write
14B54D6E000
heap
page read and write
2065C000000
heap
page read and write
1BE66212000
heap
page read and write
F68197E000
stack
page read and write
14B54C4B000
heap
page read and write
14B54669000
heap
page read and write
22AA7800000
heap
page read and write
214D2A82000
heap
page read and write
14B54634000
heap
page read and write
14B5462F000
heap
page read and write
23781600000
heap
page read and write
14B4F3E0000
heap
page read and write
32AD3FA000
stack
page read and write
14B54626000
heap
page read and write
14B54124000
trusted library allocation
page read and write
287A2D74000
heap
page read and write
22AAD01E000
heap
page read and write
1E702C02000
trusted library allocation
page read and write
22AA89F0000
trusted library section
page readonly
1BE661F1000
heap
page read and write
1B274813000
heap
page read and write
287A244D000
heap
page read and write
14B54C30000
heap
page read and write
14B547FB000
heap
page read and write
2578F442000
heap
page read and write
14B4F393000
heap
page read and write
1BE66190000
heap
page read and write
14B54CDB000
heap
page read and write
287A2DA6000
heap
page read and write
14B54D6A000
heap
page read and write
14B4F015000
heap
page read and write
14B54CC2000
heap
page read and write
1C457C67000
heap
page read and write
14B547C8000
heap
page read and write
E22AFFE000
stack
page read and write
14B547AA000
heap
page read and write
1C457D13000
heap
page read and write
14B54C51000
heap
page read and write
14B54C8B000
heap
page read and write
14B54D33000
heap
page read and write
22AA8A40000
trusted library section
page readonly
1BE66455000
heap
page read and write
2578F45D000
heap
page read and write
14B54C62000
heap
page read and write
14B54118000
trusted library allocation
page read and write
7973B7E000
stack
page read and write
14B54DB2000
heap
page read and write
14B54D57000
heap
page read and write
14B54D1D000
heap
page read and write
1E702652000
heap
page read and write
14B54D1B000
heap
page read and write
14B54D9A000
heap
page read and write
2578F45B000
heap
page read and write
14B4F1EE000
heap
page read and write
14B4E82F000
heap
page read and write
14B5462F000
heap
page read and write
1BE66212000
heap
page read and write
2578F449000
heap
page read and write
14B54C89000
heap
page read and write
14B547AC000
heap
page read and write
1B2746C0000
heap
page read and write
14B54661000
heap
page read and write
14B54643000
heap
page read and write
14B54D61000
heap
page read and write
1B274887000
heap
page read and write
14B54D91000
heap
page read and write
287A2D89000
heap
page read and write
14B54634000
heap
page read and write
14B54DFE000
heap
page read and write
14B54C93000
heap
page read and write
14B54D50000
heap
page read and write
1E702622000
heap
page read and write
3270C7C000
stack
page read and write
14B54703000
heap
page read and write
14B547EB000
heap
page read and write
3D8A7A000
stack
page read and write
14B55010000
heap
page read and write
287A23E0000
remote allocation
page read and write
2578F3D0000
trusted library allocation
page read and write
14B54CD3000
heap
page read and write
14B54122000
trusted library allocation
page read and write
14B54CCA000
heap
page read and write
1E702708000
heap
page read and write
2578F462000
heap
page read and write
2578F431000
heap
page read and write
14B54D02000
heap
page read and write
287A2453000
heap
page read and write
22AACED0000
trusted library allocation
page read and write
14B5410C000
trusted library allocation
page read and write
287A3200000
heap
page read and write
14B54638000
heap
page read and write
14B5465C000
heap
page read and write
14B5426C000
trusted library allocation
page read and write
1E702653000
heap
page read and write
14B4F21B000
heap
page read and write
14B54C21000
heap
page read and write
22AACFE0000
trusted library allocation
page read and write
F68187B000
stack
page read and write
1BE66202000
heap
page read and write
2578F413000
heap
page read and write
9CDAA7E000
stack
page read and write
2065C013000
heap
page read and write
14B547EB000
heap
page read and write
E22A30B000
stack
page read and write
14B54653000
heap
page read and write
22AA7A92000
heap
page read and write
B0F9AFF000
stack
page read and write
14B54CAE000
heap
page read and write
14B54260000
trusted library allocation
page read and write
20F7C013000
heap
page read and write
14B5411E000
trusted library allocation
page read and write
287A2370000
trusted library allocation
page read and write
14B54C5B000
heap
page read and write
14B5477D000
heap
page read and write
9CDA67E000
stack
page read and write
14B54669000
heap
page read and write
22AAD012000
heap
page read and write
2065C028000
heap
page read and write
14B4FEF0000
trusted library section
page readonly
14B54DD1000
heap
page read and write
1542F264000
heap
page read and write
14B54D44000
heap
page read and write
14B4F25A000
heap
page read and write
14B54DFC000
heap
page read and write
14B5415E000
trusted library allocation
page read and write
14B54D17000
heap
page read and write
14B5411E000
trusted library allocation
page read and write
23781602000
heap
page read and write
14B54C47000
heap
page read and write
14B54C47000
heap
page read and write
14B4F3D3000
heap
page read and write
D748FFA000
stack
page read and write
14B54DFE000
heap
page read and write
14B54C7E000
heap
page read and write
14B54C71000
heap
page read and write
1BE66212000
heap
page read and write
22AAD0F9000
heap
page read and write
14B54C16000
heap
page read and write
There are 1166 hidden memdumps, click here to show them.