IOC Report
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.12395.1520

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.12395.rtf
Rich Text Format data, version 1, unknown character set
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{35F4FC89-AF57-47A0-AA61-CE9C986E155F}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Local\Temp\Client.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Client.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{17E34B3C-ECE7-4F93-91C3-612FE851B900}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4AB22E69-27EE-49FB-B577-3348055FCC0D}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.12395.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 8 18:07:02 2022, mtime=Mon Aug 8 18:07:02 2022, atime=Mon Aug 8 18:07:12 2022, length=2883613, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\~$curiteInfo.com.Exploit.Rtf.Obfuscated.32.12395.rtf
data
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Windows\SysWOW64\cmd.exe
CmD.exe /C %tmp%\Client.exe A C
malicious
C:\Users\user\AppData\Local\Temp\Client.exe
C:\Users\user\AppData\Local\Temp\Client.exe A C
malicious
C:\Windows\SysWOW64\notepad.exe
C:\Windows\SysWOW64\notepad.exe /Processid:{9A42BBC4-4F4B-4518-841E-56E3DAA7341B}
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\NAPSTAT.EXE
C:\Windows\SysWOW64\NAPSTAT.EXE
malicious
C:\Program Files (x86)\Mozilla Firefox\firefox.exe
C:\Program Files (x86)\Mozilla Firefox\Firefox.exe
malicious

URLs

Name
IP
Malicious
www.bookmarkfiles.info/aekc/
malicious
http://www.magadirect.co.uk/aekc/?p6A=k0tTOTrAn50YQe1h4ozxDNX4wd5+O6pkKrWAMwmyhhYwJBfC5YpDY/r3FGLgLX7DF3fRHoVtyXQnCSOz0Ea/6qte5rYurCT1UmXBzRE=&xjRt=ZvcPNdzxaTTX6DM
45.33.18.44
malicious
http://www.windows.com/pctv.
unknown
http://investor.msn.com
unknown
http://www.msnbc.com/news/ticker.txt
unknown
http://wellformedweb.org/CommentAPI/
unknown
http://www.sqlite.org/2014/sqlite-dll-win32-x86-3080700.zip
45.33.6.223
http://www.iis.fhg.de/audioPA
unknown
http://www.piriform.com/ccleanerq
unknown
http://www.piriform.com/ccleaner1SPS0
unknown
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
unknown
http://www.hotmail.com/oe
unknown
http://treyresearch.net
unknown
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
unknown
http://java.sun.com
unknown
http://www.icra.org/vocabulary/.
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
http://investor.msn.com/
unknown
http://www.piriform.com/ccleaner
unknown
http://computername/printers/printername/.printer
unknown
http://www.%s.comPA
unknown
http://www.autoitscript.com/autoit3
unknown
https://support.mozilla.org
unknown
http://www.piriform.com/ccleanerv
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://servername/isapibackend.dll
unknown
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.magadirect.co.uk
45.33.18.44
malicious
www.luanaterra.online
unknown
malicious
www.hogogala.com
162.213.253.236
www.sqlite.org
45.33.6.223

IPs

IP
Domain
Country
Malicious
45.33.18.44
www.magadirect.co.uk
United States
malicious
45.33.6.223
www.sqlite.org
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
-(/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
$)/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
&+/
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@%SystemRoot%\system32\packager.dll,-2000
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\67ED0
67F0F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6FA46
6FA46
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6FA46
6FA46
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
Zoom
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
CustomZoom
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
ShowAll
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
Version
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
ForceOpen
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
ToolbarDocked
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
ToolbarShown
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
ToolbarDockPos
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
MTUpgradeDialog
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Sizes
Full
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Sizes
Script
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Sizes
ScriptScript
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Sizes
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Sizes
SubSymbol
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
LineSpacing
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
MatrixRowSpacing
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
MatrixColSpacing
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
SuperscriptHeight
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
SubscriptDepth
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
LimHeight
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
LimDepth
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
LimLineSpacing
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
NumerHeight
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
DenomDepth
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
FractBarOver
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
FractBarThick
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
SubFractBarThick
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
FenceOver
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
SpacingFactor
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
MinGap
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
RadicalGap
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
EmbellGap
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
PrimeHeight
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Text
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Function
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Variable
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
LCGreek
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
UCGreek
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Vector
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Number
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
User1
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
User2
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Windows
EquationWindow
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Windows
SpacingWindow
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Windows
TextLanguage
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Windows
MathLanguage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 361 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
80000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2B0000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
28B0000
system
page execute and read and write
malicious
28B0000
system
page execute and read and write
malicious
28B0000
system
page execute and read and write
malicious
B4B5000
unkown
page execute and read and write
malicious
230000
trusted library allocation
page read and write
malicious
3696000
trusted library allocation
page read and write
malicious
B4B5000
unkown
page execute and read and write
malicious
200000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
150000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2991000
trusted library allocation
page read and write
2FC5000
heap
page read and write
116C000
trusted library allocation
page read and write
7660000
stack
page read and write
437000
heap
page read and write
279B000
trusted library allocation
page read and write
2952000
trusted library allocation
page read and write
310000
trusted library allocation
page read and write
27B2000
trusted library allocation
page read and write
7110000
heap
page read and write
2995000
trusted library allocation
page read and write
379000
trusted library allocation
page read and write
28F0000
unkown
page read and write
4530000
unkown
page readonly
85FA000
unkown
page read and write
510000
unkown
page readonly
85F2000
unkown
page read and write
2BD9000
trusted library allocation
page read and write
690000
unkown
page readonly
2778000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
82D1000
unkown
page read and write
520000
trusted library allocation
page read and write
866C000
unkown
page read and write
293B000
trusted library allocation
page read and write
7720000
stack
page read and write
BB62000
unkown
page read and write
370000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
2750000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
359000
trusted library allocation
page read and write
8608000
unkown
page read and write
2797000
trusted library allocation
page read and write
593000
system
page read and write
32F000
stack
page read and write
46CC000
stack
page read and write
4550000
unkown
page readonly
B4000
trusted library allocation
page read and write
380000
trusted library allocation
page read and write
2F9E000
stack
page read and write
448C000
unkown
page read and write
250000
unkown
page read and write
6450000
unkown
page readonly
410000
trusted library allocation
page read and write
2A0D000
trusted library allocation
page read and write
B3F0000
unkown
page execute and read and write
360000
trusted library allocation
page read and write
84EE000
unkown
page read and write
7115000
heap
page read and write
4C30000
trusted library allocation
page read and write
3FAF000
stack
page read and write
4E0000
trusted library allocation
page read and write
28B0000
unkown
page readonly
8521000
unkown
page read and write
4CED000
stack
page read and write
AA5E000
stack
page read and write
100000
trusted library allocation
page execute and read and write
290000
unkown
page readonly
2B0000
unkown
page read and write
529F000
trusted library allocation
page read and write
2735000
trusted library allocation
page read and write
3A4000
heap
page read and write
2270000
trusted library allocation
page execute and read and write
43F0000
unkown
page read and write
593000
system
page read and write
84C0000
unkown
page read and write
2671000
trusted library allocation
page read and write
860E000
unkown
page read and write
36FF000
stack
page read and write
2872000
trusted library allocation
page read and write
BD23000
unkown
page read and write
2CA2000
unkown
page read and write
27F0000
unkown
page read and write
2CA8000
unkown
page read and write
437000
heap
page read and write
2CA2000
unkown
page read and write
227D000
stack
page read and write
2FC5000
heap
page read and write
354000
trusted library allocation
page read and write
3AE000
trusted library allocation
page read and write
380000
trusted library allocation
page read and write
4F1000
trusted library allocation
page read and write
27E6000
trusted library allocation
page read and write
500000
trusted library allocation
page read and write
82D5000
unkown
page read and write
42E000
unkown
page read and write
BCA4000
unkown
page read and write
45A0000
unkown
page readonly
41D0000
unkown
page readonly
7549000
heap
page read and write
3DF000
trusted library section
page readonly
EB0000
trusted library allocation
page read and write
869000
heap
page read and write
440D000
unkown
page read and write
3BF000
trusted library allocation
page read and write
28A6000
trusted library allocation
page read and write
1D13000
unkown
page read and write
44E0000
unkown
page read and write
44D000
unkown
page read and write
84EE000
unkown
page read and write
28C0000
unkown
page read and write
270C000
trusted library allocation
page read and write
4070000
unkown
page read and write
410000
trusted library allocation
page read and write
7953000
heap
page read and write
4C40000
trusted library allocation
page execute and read and write
375000
trusted library allocation
page read and write
2BA2000
trusted library allocation
page read and write
2CAE000
unkown
page read and write
4317000
unkown
page read and write
2908000
trusted library allocation
page read and write
4819000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
85F4000
unkown
page read and write
1D20000
unkown
page read and write
343000
trusted library allocation
page read and write
2B50000
unkown
page readonly
4385000
unkown
page read and write
2E10000
unkown
page read and write
2CB0000
unkown
page read and write
2ABA000
trusted library allocation
page read and write
42E000
unkown
page read and write
2A51000
trusted library allocation
page read and write
38D000
trusted library allocation
page read and write
37B000
heap
page read and write
2FC0000
heap
page read and write
85FD000
unkown
page read and write
441F000
unkown
page read and write
2CA2000
unkown
page read and write
288D000
stack
page read and write
E50000
trusted library allocation
page read and write
8602000
unkown
page read and write
4624000
trusted library allocation
page read and write
879E000
unkown
page read and write
2A19000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
2832000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
286E000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
5D4000
heap
page read and write
ED0000
trusted library allocation
page read and write
BD23000
unkown
page read and write
44B8000
unkown
page read and write
BC23000
unkown
page read and write
885B000
unkown
page read and write
2BF000
unkown
page read and write
10F0000
trusted library allocation
page read and write
6F4A000
stack
page read and write
83E2000
unkown
page read and write
EC0000
trusted library allocation
page read and write
2F9E000
stack
page read and write
2CBC000
unkown
page read and write
29E4000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
330000
trusted library allocation
page read and write
4F50000
heap
page read and write
2B42000
trusted library allocation
page read and write
85FA000
unkown
page read and write
4070000
unkown
page read and write
4B9C000
stack
page read and write
2BA4000
trusted library allocation
page read and write
3D0000
trusted library section
page readonly
3B0000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
333000
trusted library allocation
page read and write
2C21000
unkown
page read and write
1120000
trusted library allocation
page read and write
25F0000
unkown
page readonly
4423000
unkown
page read and write
7934000
heap
page read and write
370000
trusted library allocation
page read and write
4130000
unkown
page read and write
330000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4060000
unkown
page read and write
1B0000
trusted library allocation
page read and write
82D1000
unkown
page read and write
2B72000
trusted library allocation
page read and write
5D4000
heap
page read and write
365000
trusted library allocation
page read and write
88BD000
unkown
page read and write
330000
trusted library allocation
page read and write
785E000
stack
page read and write
E40000
trusted library allocation
page read and write
332000
trusted library allocation
page read and write
4464000
unkown
page read and write
2ADF000
stack
page read and write
8569000
unkown
page read and write
7083000
heap
page read and write
2C6F000
unkown
page read and write
D0000
unkown
page readonly
2763000
trusted library allocation
page read and write
87E8000
unkown
page read and write
3C0000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
2A62000
trusted library allocation
page read and write
310000
heap
page read and write
5A0000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
585000
trusted library allocation
page read and write
3FE000
heap
page read and write
2BDC000
trusted library allocation
page read and write
256000
unkown
page read and write
2C0000
unkown
page read and write
BC23000
unkown
page read and write
28D3000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
74BE000
stack
page read and write
7567000
heap
page read and write
320000
trusted library allocation
page read and write
2C6F000
unkown
page read and write
223F000
stack
page read and write
87FC000
unkown
page read and write
28EB000
trusted library allocation
page read and write
1F60000
trusted library allocation
page read and write
3A0000
trusted library allocation
page read and write
4A5F000
stack
page read and write
6E5A000
stack
page read and write
4E0000
trusted library allocation
page read and write
410000
trusted library allocation
page read and write
4D5E000
stack
page read and write
AC0000
heap
page execute and read and write
283C000
trusted library allocation
page read and write
27A000
unkown
page read and write
C70000
trusted library allocation
page execute and read and write
593000
system
page read and write
329000
heap
page read and write
2805000
trusted library allocation
page read and write
856B000
unkown
page read and write
277A000
trusted library allocation
page read and write
8844000
unkown
page read and write
830000
unkown
page readonly
401000
heap
page read and write
8669000
unkown
page read and write
2948000
trusted library allocation
page read and write
4C68000
trusted library allocation
page read and write
4EEC000
stack
page read and write
19F000
stack
page read and write
370000
trusted library allocation
page read and write
841B000
unkown
page read and write
1E0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2FB0000
unkown
page read and write
39D0000
unkown
page read and write
293D000
trusted library allocation
page read and write
7AE000
stack
page read and write
370000
trusted library allocation
page read and write
340000
trusted library allocation
page read and write
7EC0000
unkown
page read and write
330000
trusted library allocation
page read and write
330000
trusted library allocation
page read and write
4160000
unkown
page read and write
1140000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
2D0000
unkown
page readonly
6DDE000
stack
page read and write
4F0000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
2761000
trusted library allocation
page read and write
19F000
stack
page read and write
20F0000
trusted library allocation
page execute and read and write
2B0000
unkown
page read and write
588000
heap
page read and write
86CF000
unkown
page read and write
2FC0000
heap
page read and write
10000
heap
page read and write
30000
trusted library allocation
page read and write
336000
trusted library allocation
page read and write
590000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
2945000
trusted library allocation
page read and write
2742000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
87BB000
unkown
page read and write
7926000
stack
page read and write
4C60000
trusted library allocation
page execute and read and write
1100000
trusted library allocation
page read and write
856B000
unkown
page read and write
220000
unkown
page read and write
6D4B000
stack
page read and write
3B0000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
4080000
unkown
page read and write
1150000
trusted library allocation
page read and write
41D000
trusted library allocation
page read and write
8867000
unkown
page read and write
360000
trusted library allocation
page read and write
4060000
unkown
page read and write
320000
trusted library allocation
page read and write
20E7000
trusted library allocation
page execute and read and write
2A15000
trusted library allocation
page read and write
1E50000
trusted library allocation
page read and write
1EDD000
stack
page read and write
E62000
trusted library allocation
page read and write
2CBF000
unkown
page read and write
3C0000
trusted library allocation
page read and write
7133000
heap
page read and write
A0000
trusted library allocation
page read and write
223F000
stack
page read and write
2CF000
unkown
page read and write
8558000
unkown
page read and write
540000
heap
page read and write
1B0000
unkown
page read and write
8582000
unkown
page read and write
256000
unkown
page read and write
BCE3000
unkown
page read and write
AF0000
trusted library allocation
page execute and read and write
27D1000
trusted library allocation
page read and write
220000
unkown
page read and write
41C0000
unkown
page readonly
7DFB000
stack
page read and write
2A38000
trusted library allocation
page read and write
E60000
trusted library allocation
page read and write
28BF000
trusted library allocation
page read and write
450000
unkown
page read and write
4D5E000
stack
page read and write
2CB6000
unkown
page read and write
B30000
trusted library allocation
page read and write
D0000
unkown
page readonly
4040000
unkown
page readonly
3B0000
trusted library allocation
page read and write
5C9000
heap
page read and write
330000
trusted library allocation
page read and write
1A9000
stack
page read and write
41D0000
unkown
page readonly
8667000
unkown
page read and write
330000
trusted library allocation
page read and write
BF7000
trusted library allocation
page execute and read and write
970000
trusted library allocation
page execute and read and write
B4F6000
unkown
page execute and read and write
2CA8000
unkown
page read and write
297F000
trusted library allocation
page read and write
2FC0000
heap
page read and write
3FB7000
stack
page read and write
B5E0000
unkown
page read and write
9D0000
trusted library allocation
page read and write
433000
heap
page read and write
6BF000
stack
page read and write
2B3A000
trusted library allocation
page read and write
2CAE000
unkown
page read and write
2303000
unclassified section
page read and write
570000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
4CE000
stack
page read and write
B20000
trusted library allocation
page read and write
2D0000
unkown
page readonly
330000
trusted library allocation
page read and write
354000
heap
page read and write
2F0F000
stack
page read and write
2CB3000
unkown
page read and write
85F2000
unkown
page read and write
B03000
trusted library allocation
page read and write
29FB000
trusted library allocation
page read and write
42E000
heap
page read and write
210000
unkown
page readonly
A1E000
stack
page read and write
450000
unkown
page read and write
511000
trusted library allocation
page read and write
8926000
unkown
page read and write
1C30000
unkown
page readonly
2758000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
AAEF000
stack
page read and write
10F0000
trusted library allocation
page read and write
7727000
stack
page read and write
10000
heap
page read and write
2FC5000
heap
page read and write
E60000
trusted library allocation
page read and write
4457000
unkown
page read and write
8371000
unkown
page read and write
7660000
stack
page read and write
3FB7000
stack
page read and write
E50000
trusted library allocation
page read and write
2B20000
unkown
page read and write
360000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
244000
heap
page read and write
8805000
unkown
page read and write
1B0000
trusted library allocation
page read and write
27B4000
trusted library allocation
page read and write
28D9000
trusted library allocation
page read and write
506000
unkown
page read and write
4C27000
trusted library allocation
page read and write
11D6000
unkown
page execute read
26F0000
unkown
page read and write
329000
heap
page read and write
582000
system
page read and write
8575000
unkown
page read and write
273B000
trusted library allocation
page read and write
2E10000
unkown
page read and write
2A71000
trusted library allocation
page read and write
450000
unkown
page read and write
2CF000
unkown
page read and write
B40000
trusted library allocation
page read and write
3A0000
trusted library allocation
page read and write
6F3F000
stack
page read and write
8807000
unkown
page read and write
5A0000
trusted library allocation
page read and write
2B50000
unkown
page readonly
2765000
trusted library allocation
page read and write
4813000
trusted library allocation
page read and write
85FD000
unkown
page read and write
2FC9000
heap
page read and write
1DD0000
unkown
page readonly
41E0000
unkown
page read and write
879E000
unkown
page read and write
1F1E000
stack
page read and write
330000
trusted library allocation
page read and write
6C7000
heap
page read and write
29CF000
trusted library allocation
page read and write
7230000
heap
page read and write
379000
trusted library allocation
page read and write
323000
heap
page read and write
5B7000
heap
page read and write
28A0000
unkown
page read and write
42AE000
stack
page read and write
6FE3000
heap
page read and write
1130000
trusted library allocation
page read and write
2898000
stack
page read and write
2BFE000
stack
page read and write
4EA000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
8691000
unkown
page read and write
4620000
unkown
page read and write
44F0000
unkown
page readonly
290000
unkown
page readonly
288D000
stack
page read and write
2AD1000
trusted library allocation
page read and write
28C3000
trusted library allocation
page read and write
380000
trusted library allocation
page read and write
330000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
86C9000
unkown
page read and write
8864000
unkown
page read and write
440D000
unkown
page read and write
23BF000
stack
page read and write
1DD0000
unkown
page readonly
310000
trusted library allocation
page read and write
340000
trusted library allocation
page read and write
449B000
unkown
page read and write
87FF000
unkown
page read and write
7DFB000
stack
page read and write
2CB9000
unkown
page read and write
A5E000
stack
page read and write
BCE3000
unkown
page read and write
8661000
unkown
page read and write
510000
trusted library allocation
page read and write
860B000
unkown
page read and write
82C0000
unkown
page read and write
7930000
heap
page read and write
851A000
unkown
page read and write
275F000
stack
page read and write
2A30000
trusted library allocation
page read and write
2868000
trusted library allocation
page read and write
310000
heap
page read and write
4E40000
trusted library allocation
page execute and read and write
1F5D000
stack
page read and write
3FB7000
stack
page read and write
3B00000
unkown
page read and write
7110000
heap
page read and write
28F8000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
E0000
unkown
page read and write
869E000
unkown
page read and write
885F000
unkown
page read and write
3A0000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
5BE000
heap
page read and write
410000
unkown
page read and write
570000
trusted library allocation
page read and write
528F000
trusted library allocation
page read and write
5CB000
heap
page read and write
8805000
unkown
page read and write
413000
heap
page read and write
7064000
heap
page read and write
244000
heap
page read and write
EA0000
trusted library allocation
page read and write
2725000
trusted library allocation
page read and write
240000
heap
page read and write
FE0000
trusted library allocation
page read and write
27BA000
trusted library allocation
page read and write
29B4000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
3A0000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
2643000
unkown
page read and write
3CE000
stack
page read and write
2CB6000
unkown
page read and write
2A9B000
trusted library allocation
page read and write
1D73000
heap
page read and write
83E2000
unkown
page read and write
2FA0000
unkown
page read and write
340000
trusted library allocation
page read and write
1F0000
unkown
page readonly
335000
trusted library allocation
page read and write
330000
trusted library allocation
page read and write
BB62000
unkown
page read and write
8807000
unkown
page read and write
766B000
stack
page read and write
286A000
trusted library allocation
page read and write
2CBC000
unkown
page read and write
51E000
stack
page read and write
2CB9000
unkown
page read and write
39E0000
heap
page read and write
6BF000
stack
page read and write
5F0000
heap
page read and write
380000
trusted library allocation
page read and write
2B03000
trusted library allocation
page read and write
4210000
unkown
page read and write
527D000
trusted library allocation
page read and write
2B3C000
trusted library allocation
page read and write
4EBF000
stack
page read and write
42D0000
unkown
page read and write
335000
trusted library allocation
page read and write
4E5000
heap
page read and write
2A1D000
trusted library allocation
page read and write
8605000
unkown
page read and write
331000
trusted library allocation
page read and write
333000
trusted library allocation
page read and write
62F000
stack
page read and write
4080000
unkown
page read and write
370000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
410C000
stack
page read and write
5A0000
trusted library allocation
page read and write
410000
trusted library allocation
page read and write
87FF000
unkown
page read and write
2E0000
unkown
page readonly
7549000
heap
page read and write
4E0000
trusted library allocation
page read and write
539E000
stack
page read and write
2876000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
2E0000
unkown
page readonly
2AF000
unkown
page read and write
8337000
unkown
page read and write
20000
unkown
page readonly
4BBF000
stack
page read and write
E40000
trusted library allocation
page read and write
2B8D000
trusted library allocation
page read and write
4188000
unkown
page read and write
2836000
trusted library allocation
page read and write
886A000
unkown
page read and write
387000
trusted library allocation
page read and write
2BFE000
stack
page read and write
2F9E000
stack
page read and write
2768000
trusted library allocation
page read and write
830000
unkown
page readonly
E70000
trusted library allocation
page read and write
320000
trusted library allocation
page read and write
297C000
trusted library allocation
page read and write
4168000
unkown
page read and write
72C0000
heap
page read and write
4D10000
heap
page read and write
8575000
unkown
page read and write
3FAF000
stack
page read and write
3FB5000
stack
page read and write
850D000
unkown
page read and write
4F0000
trusted library allocation
page read and write
B3F0000
unkown
page execute and read and write
448F000
unkown
page read and write
E70000
trusted library allocation
page read and write
22E0000
trusted library allocation
page execute and read and write
7926000
stack
page read and write
290C000
trusted library allocation
page read and write
3FD000
heap
page read and write
C60000
trusted library allocation
page execute and read and write
2993000
trusted library allocation
page read and write
5A0000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
380000
trusted library allocation
page read and write
83A7000
unkown
page read and write
4570000
unkown
page readonly
9D0000
trusted library allocation
page read and write
2C98000
heap
page read and write
44D0000
unkown
page readonly
27A000
unkown
page read and write
6E4E000
stack
page read and write
7540000
heap
page read and write
27EC000
trusted library allocation
page read and write
8867000
unkown
page read and write
28BC000
trusted library allocation
page read and write
2823000
trusted library allocation
page read and write
85FD000
unkown
page read and write
8802000
unkown
page read and write
3C0000
trusted library allocation
page read and write
29DE000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
93D000
trusted library allocation
page read and write
2A89000
trusted library allocation
page read and write
2FCE000
heap
page read and write
28B0000
unkown
page readonly
370000
trusted library allocation
page read and write
3A5000
trusted library allocation
page read and write
6FC4000
heap
page read and write
30000
trusted library allocation
page read and write
A989000
stack
page read and write
28B0000
unkown
page readonly
2AF000
unkown
page read and write
79F0000
heap
page read and write
4E0000
trusted library allocation
page read and write
2BBF000
trusted library allocation
page read and write
3A70000
unkown
page read and write
330000
trusted library allocation
page read and write
1D50000
heap
page read and write
360000
trusted library allocation
page read and write
4302000
unkown
page read and write
2A6A000
trusted library allocation
page read and write
89000
stack
page read and write
1DD0000
unkown
page readonly
2A13000
trusted library allocation
page read and write
1D40000
unkown
page readonly
960000
trusted library allocation
page read and write
380000
trusted library allocation
page read and write
2889000
trusted library allocation
page read and write
288D000
stack
page read and write
449B000
unkown
page read and write
360000
trusted library allocation
page read and write
6F3F000
stack
page read and write
27CD000
trusted library allocation
page read and write
2ACD000
trusted library allocation
page read and write
8558000
unkown
page read and write
277E000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
340000
trusted library allocation
page read and write
580000
trusted library allocation
page read and write
5A0000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
2A85000
trusted library allocation
page read and write
335000
heap
page read and write
82C0000
unkown
page read and write
3B0000
trusted library allocation
page read and write
2F0F000
stack
page read and write
3A6000
heap
page read and write
2801000
unkown
page read and write
2A3A000
trusted library allocation
page read and write
78E000
stack
page read and write
28F1000
trusted library allocation
page read and write
380000
trusted library allocation
page read and write
4168000
unkown
page read and write
2A17000
trusted library allocation
page read and write
2C94000
heap
page read and write
410000
unkown
page read and write
2F9E000
stack
page read and write
3B0000
trusted library allocation
page read and write
3AF0000
unkown
page read and write
42D0000
unkown
page read and write
2600000
unkown
page readonly
2BFE000
stack
page read and write
50E000
stack
page read and write
4B1000
heap
page read and write
271F000
trusted library allocation
page read and write
4D5E000
stack
page read and write
362000
trusted library allocation
page read and write
4560000
unkown
page readonly
1110000
trusted library allocation
page read and write
2A9D000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
88F5000
unkown
page read and write
340000
trusted library allocation
page execute and read and write
5C4000
heap
page read and write
410000
trusted library allocation
page read and write
340000
trusted library allocation
page read and write
7EFE0000
unkown
page readonly
2838000
trusted library allocation
page read and write
44E0000
unkown
page read and write
43A000
heap
page read and write
B20000
trusted library allocation
page read and write
220000
unkown
page read and write
28B4000
trusted library allocation
page read and write
38B000
trusted library allocation
page read and write
27CF000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
4457000
unkown
page read and write
690000
unkown
page readonly
44F0000
unkown
page readonly
332000
trusted library allocation
page read and write
2BFE000
stack
page read and write
43F0000
unkown
page read and write
4110000
unkown
page read and write
87E3000
unkown
page read and write
BC60000
unkown
page read and write
2915000
trusted library allocation
page read and write
380000
trusted library allocation
page read and write
8861000
unkown
page read and write
26C6000
unkown
page read and write
570000
trusted library allocation
page read and write
2DB6000
heap
page read and write
2261000
trusted library allocation
page execute and read and write
506000
unkown
page read and write
10000
heap
page read and write
4D20000
trusted library allocation
page read and write
3FD000
heap
page read and write
4D30000
trusted library allocation
page read and write
510000
trusted library allocation
page read and write
27F0000
unkown
page read and write
8512000
unkown
page read and write
AAEF000
stack
page read and write
34C000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
39D0000
unkown
page read and write
1D13000
unkown
page read and write
6FC0000
heap
page read and write
26F0000
unkown
page read and write
275A000
trusted library allocation
page read and write
329000
heap
page read and write
2904000
trusted library allocation
page read and write
22D0000
trusted library allocation
page execute and read and write
7083000
heap
page read and write
791F000
stack
page read and write
29F9000
trusted library allocation
page read and write
27F2000
trusted library allocation
page read and write
28E7000
trusted library allocation
page read and write
2B20000
unkown
page read and write
545E000
stack
page read and write
B40000
trusted library allocation
page read and write
2AEA000
trusted library allocation
page read and write
8602000
unkown
page read and write
2910000
unkown
page readonly
370000
trusted library allocation
page read and write
93A000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
1A9000
stack
page read and write
8605000
unkown
page read and write
8608000
unkown
page read and write
4520000
unkown
page readonly
2960000
trusted library allocation
page read and write
500000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
524000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
2A1B000
trusted library allocation
page read and write
2C0000
unkown
page read and write
B00000
trusted library allocation
page execute and read and write
1FDD000
stack
page read and write
2A64000
trusted library allocation
page read and write
580000
trusted library allocation
page read and write
BBA0000
unkown
page read and write
8661000
unkown
page read and write
340000
trusted library allocation
page read and write
3A0000
trusted library allocation
page read and write
3A60000
unkown
page read and write
B40000
trusted library allocation
page read and write
1182000
unkown
page execute and write copy
8337000
unkown
page read and write
2939000
trusted library allocation
page read and write
1D55000
heap
page read and write
18A000
trusted library allocation
page execute and read and write
EA0000
trusted library allocation
page read and write
180000
trusted library allocation
page execute and read and write
4080000
unkown
page read and write
2C0E000
stack
page read and write
340000
trusted library allocation
page read and write
8805000
unkown
page read and write
500000
trusted library allocation
page read and write
4385000
unkown
page read and write
4484000
unkown
page read and write
6EC0000
heap
page read and write
4D70000
trusted library allocation
page read and write
54BF000
stack
page read and write
8844000
unkown
page read and write
C68000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
AAEF000
stack
page read and write
2BAA000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
2CBC000
unkown
page read and write
4F0000
trusted library allocation
page read and write
500000
trusted library allocation
page read and write
1D50000
heap
page read and write
B30000
trusted library allocation
page read and write
883B000
unkown
page read and write
4560000
unkown
page readonly
441F000
unkown
page read and write
40E000
heap
page read and write
8512000
unkown
page read and write
288F000
trusted library allocation
page read and write
3DD000
heap
page read and write
E90000
trusted library allocation
page read and write
580000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
2941000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
5A6000
heap
page read and write
79FA000
heap
page read and write
7953000
heap
page read and write
4540000
unkown
page readonly
2CA0000
unkown
page read and write
100000
unkown
page read and write
2646000
unclassified section
page read and write
2CAB000
unkown
page read and write
6EC0000
heap
page read and write
2AE4000
trusted library allocation
page read and write
2CA8000
unkown
page read and write
20D000
stack
page read and write
28DB000
trusted library allocation
page read and write
320000
trusted library allocation
page read and write
5A0000
trusted library allocation
page read and write
2FCE000
heap
page read and write
841B000
unkown
page read and write
2B3E000
trusted library allocation
page read and write
8664000
unkown
page read and write
270A000
trusted library allocation
page read and write
88FD000
unkown
page read and write
363000
trusted library allocation
page read and write
329000
heap
page read and write
4520000
unkown
page readonly
2B2E000
trusted library allocation
page read and write
8371000
unkown
page read and write
29C5000
trusted library allocation
page read and write
1F0000
unkown
page readonly
BBA0000
unkown
page read and write
8926000
unkown
page read and write
56F000
heap
page read and write
2843000
trusted library allocation
page read and write
3BF000
trusted library allocation
page read and write
7064000
heap
page read and write
B30000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
343000
trusted library allocation
page read and write
6BF9000
stack
page read and write
1FF0000
trusted library allocation
page execute and read and write
2FC9000
heap
page read and write
87E3000
unkown
page read and write
36D000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
2731000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
500000
trusted library allocation
page read and write
8611000
unkown
page read and write
3A60000
unkown
page read and write
590000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
2F1B000
stack
page read and write
448F000
unkown
page read and write
79F0000
heap
page read and write
2F1B000
stack
page read and write
2801000
unkown
page read and write
323000
heap
page read and write
22A2000
heap
page read and write
8569000
unkown
page read and write
6E4E000
stack
page read and write
2879000
trusted library allocation
page read and write
4423000
unkown
page read and write
8506000
unkown
page read and write
8861000
unkown
page read and write
290A000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
28ED000
trusted library allocation
page read and write
41E000
trusted library allocation
page read and write
434F000
unkown
page read and write
2B92000
trusted library allocation
page read and write
244000
heap
page read and write
4E5000
heap
page read and write
1F0000
unkown
page readonly
B5D5000
heap
page read and write
2BBC000
trusted library allocation
page read and write
44C3000
unkown
page read and write
82C5000
unkown
page read and write
866C000
unkown
page read and write
E0000
unkown
page read and write
4620000
trusted library allocation
page read and write
2799000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
85D2000
unkown
page read and write
4C10000
heap
page read and write
2CA5000
unkown
page read and write
8675000
unkown
page read and write
351000
trusted library allocation
page read and write
510000
unkown
page readonly
2AD3000
trusted library allocation
page read and write
E0000
unkown
page read and write
8636000
unkown
page read and write
2910000
unkown
page readonly
20E4000
trusted library allocation
page execute and read and write
841F000
unkown
page read and write
1120000
trusted library allocation
page read and write
33B000
trusted library allocation
page read and write
2CB3000
unkown
page read and write
88C0000
unkown
page read and write
4510000
unkown
page execute and read and write
5FD000
heap
page read and write
410000
trusted library allocation
page read and write
4040000
unkown
page readonly
300000
unkown
page read and write
2C6F000
unkown
page read and write
4BA0000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
210000
heap
page read and write
8903000
unkown
page read and write
510000
trusted library allocation
page read and write
510000
trusted library allocation
page read and write
3CF7000
unkown
page readonly
295A000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
110000
unkown
page read and write
2737000
trusted library allocation
page read and write
2782000
trusted library allocation
page read and write
1B0000
trusted library allocation
page read and write
348000
trusted library allocation
page read and write
2B85000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
87FF000
unkown
page read and write
340000
trusted library allocation
page read and write
1D55000
heap
page read and write
27EA000
trusted library allocation
page read and write
7727000
stack
page read and write
2B50000
unkown
page readonly
85D2000
unkown
page read and write
344000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
582000
system
page read and write
2887000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
2B87000
trusted library allocation
page read and write
2AD0000
heap
page read and write
468000
heap
page read and write
37B000
heap
page read and write
310000
trusted library allocation
page read and write
2F0F000
stack
page read and write
82C0000
unkown
page read and write
9D0000
trusted library allocation
page read and write
A8BB000
stack
page read and write
34A000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
2B50000
unkown
page readonly
410000
trusted library allocation
page read and write
BBE0000
unkown
page read and write
380000
trusted library allocation
page read and write
44D000
unkown
page read and write
ED0000
trusted library allocation
page read and write
7926000
stack
page read and write
6FC4000
heap
page read and write
3C0000
trusted library allocation
page read and write
10000
heap
page read and write
288F000
stack
page read and write
2962000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
44C3000
unkown
page read and write
2BF000
unkown
page read and write
869E000
unkown
page read and write
4070000
unkown
page read and write
3A0000
trusted library allocation
page read and write
2AF1000
trusted library allocation
page read and write
4AAC000
stack
page read and write
4EEC000
stack
page read and write
2E00000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
2280000
heap
page read and write
83A7000
unkown
page read and write
2A0000
unkown
page read and write
8675000
unkown
page read and write
520000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
2BA8000
trusted library allocation
page read and write
880D000
unkown
page read and write
4030000
unkown
page execute read
230000
trusted library allocation
page execute and read and write
20000
trusted library allocation
page read and write
2FB0000
unkown
page read and write
DE0000
trusted library allocation
page execute and read and write
366000
trusted library allocation
page read and write
8608000
unkown
page read and write
250000
unkown
page read and write
3AF0000
unkown
page read and write
43D000
heap
page read and write
86CF000
unkown
page read and write
510000
trusted library allocation
page read and write
4F60000
heap
page read and write
220000
unkown
page read and write
2B83000
trusted library allocation
page read and write
410000
trusted library allocation
page read and write
87E8000
unkown
page read and write
BDA3000
unkown
page read and write
44C3000
unkown
page read and write
8D6000
system
page read and write
4550000
unkown
page readonly
4450000
unkown
page read and write
3B10000
unkown
page readonly
590000
trusted library allocation
page read and write
2E9F000
stack
page read and write
36D000
trusted library allocation
page read and write
851A000
unkown
page read and write
2CB0000
unkown
page read and write
350000
trusted library allocation
page read and write
4110000
unkown
page read and write
850D000
unkown
page read and write
3AF0000
unkown
page read and write
2FC000
stack
page read and write
6750000
unkown
page read and write
2B30000
unkown
page readonly
350000
trusted library allocation
page read and write
87BB000
unkown
page read and write
AB0000
trusted library allocation
page read and write
5A0000
trusted library allocation
page read and write
561F000
stack
page read and write
500000
trusted library allocation
page read and write
4570000
unkown
page readonly
860B000
unkown
page read and write
3CF7000
unkown
page readonly
424000
heap
page read and write
25F0000
unkown
page readonly
2B30000
unkown
page readonly
860000
heap
page read and write
57D0000
heap
page read and write
4CDD000
stack
page read and write
2801000
trusted library allocation
page read and write
450000
unkown
page read and write
44D000
unkown
page read and write
39D0000
unkown
page read and write
2AB0000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
28B8000
trusted library allocation
page read and write
8669000
unkown
page read and write
25F0000
unkown
page readonly
87FC000
unkown
page read and write
2756000
trusted library allocation
page read and write
5B0000
heap
page read and write
4220000
unkown
page readonly
2FC9000
heap
page read and write
410000
unkown
page read and write
1160000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
885F000
unkown
page read and write
7722000
stack
page read and write
27E8000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
4423000
unkown
page read and write
33F000
trusted library allocation
page read and write
29B6000
trusted library allocation
page read and write
841F000
unkown
page read and write
766B000
stack
page read and write
2B40000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
BD23000
unkown
page read and write
570000
trusted library allocation
page read and write
6DDE000
stack
page read and write
6C0000
heap
page read and write
38F000
trusted library allocation
page read and write
100000
unkown
page read and write
29E6000
trusted library allocation
page read and write
7060000
heap
page read and write
C5F000
stack
page read and write
E90000
trusted library allocation
page execute and read and write
350000
heap
page read and write
2A6F000
trusted library allocation
page read and write
8664000
unkown
page read and write
2B20000
unkown
page read and write
7729000
stack
page read and write
410000
trusted library allocation
page read and write
2CB0000
unkown
page read and write
317000
heap
page read and write
350000
trusted library allocation
page read and write
4CDD000
trusted library allocation
page read and write
2B07000
trusted library allocation
page read and write
2817000
trusted library allocation
page read and write
72C0000
heap
page read and write
D74000
trusted library allocation
page execute and read and write
26C6000
unkown
page read and write
52A4000
trusted library allocation
page read and write
38E000
trusted library allocation
page read and write
2956000
trusted library allocation
page read and write
20D0000
trusted library allocation
page execute and read and write
4620000
unkown
page read and write
400000
heap
page read and write
449F000
unkown
page read and write
520000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
2CA0000
unkown
page read and write
884000
heap
page read and write
2B34000
trusted library allocation
page read and write
19F000
stack
page read and write
8600000
unkown
page read and write
2B1C000
trusted library allocation
page read and write
506000
unkown
page read and write
500000
trusted library allocation
page read and write
A61000
trusted library allocation
page read and write
867000
heap
page read and write
25C0000
unclassified section
page execute and read and write
4130000
unkown
page read and write
2CB9000
unkown
page read and write
2250000
trusted library allocation
page execute and read and write
2C0000
unkown
page read and write
4C50000
trusted library allocation
page read and write
28B6000
trusted library allocation
page read and write
7C0000
heap
page read and write
3A4000
heap
page read and write
434F000
unkown
page read and write
7060000
heap
page read and write
2B05000
trusted library allocation
page read and write
2739000
trusted library allocation
page read and write
41E0000
unkown
page read and write
3C0000
trusted library allocation
page read and write
2B1E000
trusted library allocation
page read and write
414000
trusted library allocation
page read and write
438000
heap
page read and write
126A000
unkown
page readonly
2AE2000
trusted library allocation
page read and write
2BF000
unkown
page read and write
2AB4000
trusted library allocation
page read and write
320000
trusted library allocation
page read and write
82D1000
unkown
page read and write
2CD000
trusted library allocation
page read and write
2AEC000
trusted library allocation
page read and write
690000
unkown
page readonly
419000
trusted library allocation
page read and write
413000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
367000
trusted library allocation
page read and write
A00000
system
page execute and read and write
44F0000
unkown
page readonly
2170000
trusted library allocation
page execute and read and write
85AC000
unkown
page read and write
FC000
stack
page read and write
82C5000
unkown
page read and write
B5D5000
heap
page read and write
244000
heap
page read and write
42C000
heap
page read and write
4CE0000
trusted library allocation
page read and write
8867000
unkown
page read and write
22F000
stack
page read and write
3CF7000
unkown
page readonly
6D49000
stack
page read and write
585000
trusted library allocation
page read and write
20E0000
trusted library allocation
page execute and read and write
42D0000
unkown
page read and write
4050000
unkown
page read and write
2B70000
heap
page read and write
4040000
unkown
page readonly
4E0000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
2BCF000
stack
page read and write
2FB0000
unkown
page read and write
2CB0000
unkown
page read and write
2752000
trusted library allocation
page read and write
110000
unkown
page read and write
520000
trusted library allocation
page read and write
3A0000
trusted library allocation
page read and write
3A0000
trusted library allocation
page read and write
B5E0000
unkown
page read and write
283A000
trusted library allocation
page read and write
1CD000
system
page execute and read and write
B20000
trusted library allocation
page read and write
886F000
unkown
page read and write
370000
trusted library allocation
page read and write
299B000
trusted library allocation
page read and write
285C000
trusted library allocation
page read and write
330000
trusted library allocation
page read and write
4BE000
heap
page read and write
2874000
trusted library allocation
page read and write
4030000
unkown
page execute read
B1F000
trusted library allocation
page read and write
28D5000
trusted library allocation
page read and write
449F000
unkown
page read and write
323000
heap
page read and write
5B10000
heap
page read and write
3A70000
unkown
page read and write
510000
trusted library allocation
page read and write
2AA2000
trusted library allocation
page read and write
29E8000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
330000
trusted library allocation
page read and write
87E3000
unkown
page read and write
2E9F000
stack
page read and write
1130000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
2B53000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
580000
trusted library allocation
page read and write
580000
trusted library allocation
page read and write
10000
heap
page read and write
4550000
unkown
page readonly
A4B8000
stack
page read and write
110000
unkown
page read and write
1D30000
unkown
page read and write
293F000
trusted library allocation
page read and write
8D6000
system
page read and write
A60000
trusted library allocation
page read and write
3A4000
trusted library allocation
page read and write
2BC000
stack
page read and write
335000
trusted library allocation
page read and write
6FC4000
heap
page read and write
766B000
stack
page read and write
4E20000
trusted library allocation
page read and write
8521000
unkown
page read and write
29B0000
trusted library allocation
page read and write
2FCE000
heap
page read and write
2821000
trusted library allocation
page read and write
2AB8000
trusted library allocation
page read and write
310000
trusted library allocation
page read and write
43D000
heap
page read and write
1A9000
stack
page read and write
3A4000
heap
page read and write
2267000
trusted library allocation
page execute and read and write
D0000
unkown
page readonly
379000
trusted library allocation
page read and write
57C000
stack
page read and write
8661000
unkown
page read and write
2264000
trusted library allocation
page execute and read and write
88FA000
unkown
page read and write
BBE0000
unkown
page read and write
2A3C000
trusted library allocation
page read and write
88F5000
unkown
page read and write
27D3000
trusted library allocation
page read and write
45A0000
unkown
page readonly
26BA000
unkown
page read and write
4457000
unkown
page read and write
4C20000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
407000
heap
page read and write
44B6000
unkown
page read and write
330000
trusted library allocation
page read and write
886F000
unkown
page read and write
2BA0000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
580000
trusted library allocation
page read and write
1D73000
heap
page read and write
256000
unkown
page read and write
4168000
unkown
page read and write
290000
unkown
page readonly
74BE000
stack
page read and write
378000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
7934000
heap
page read and write
A67000
trusted library allocation
page read and write
8371000
unkown
page read and write
4CA0000
trusted library allocation
page read and write
82D5000
unkown
page read and write
4CDD000
stack
page read and write
8926000
unkown
page read and write
4F9000
heap
page read and write
223F000
stack
page read and write
36A000
trusted library allocation
page read and write
364000
trusted library allocation
page read and write
29EA000
trusted library allocation
page read and write
8691000
unkown
page read and write
8611000
unkown
page read and write
8858000
unkown
page read and write
B00000
trusted library allocation
page read and write
71A0000
heap
page read and write
6750000
unkown
page read and write
4F0000
trusted library allocation
page read and write
2E0000
unkown
page readonly
6C0000
heap
page read and write
79FA000
heap
page read and write
BC60000
unkown
page read and write
59A0000
heap
page read and write
2FC0000
heap
page read and write
88BD000
unkown
page read and write
A60000
trusted library allocation
page read and write
8900000
unkown
page read and write
3FB5000
stack
page read and write
26BA000
unkown
page read and write
35C000
trusted library allocation
page read and write
27D6000
trusted library allocation
page read and write
6E5A000
stack
page read and write
350000
trusted library allocation
page read and write
4302000
unkown
page read and write
380000
trusted library allocation
page read and write
2AF000
stack
page read and write
8858000
unkown
page read and write
4CD0000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
D80000
trusted library allocation
page execute and read and write
B10000
trusted library allocation
page read and write
4130000
unkown
page read and write
BF4000
trusted library allocation
page execute and read and write
2FB0000
unkown
page read and write
1D13000
unkown
page read and write
28D7000
trusted library allocation
page read and write
372000
trusted library allocation
page read and write
510000
trusted library allocation
page read and write
2AF000
unkown
page read and write
350000
trusted library allocation
page read and write
1F9F000
stack
page read and write
E60000
trusted library allocation
page read and write
4EEC000
stack
page read and write
4627000
trusted library allocation
page read and write
27F0000
trusted library allocation
page read and write
22F2000
unclassified section
page read and write
4EE000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
27A000
unkown
page read and write
2B59000
trusted library allocation
page read and write
3A6000
heap
page read and write
582000
system
page read and write
7E40000
heap
page read and write
7230000
heap
page read and write
340000
trusted library allocation
page read and write
200000
trusted library allocation
page read and write
190000
system
page execute and read and write
830000
unkown
page readonly
2BF000
unkown
page read and write
8903000
unkown
page read and write
860000
trusted library allocation
page read and write
44D0000
unkown
page readonly
3A9A000
unkown
page read and write
2CA5000
unkown
page read and write
8900000
unkown
page read and write
4220000
unkown
page readonly
E0000
unkown
page read and write
3CF7000
unkown
page readonly
8900000
unkown
page read and write
1D20000
unkown
page read and write
8691000
unkown
page read and write
337000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
19A000
stack
page read and write
520000
trusted library allocation
page read and write
2C9B000
heap
page read and write
2A7F000
trusted library allocation
page read and write
39E0000
heap
page read and write
84EE000
unkown
page read and write
323000
heap
page read and write
38F000
trusted library allocation
page read and write
1D50000
heap
page read and write
1FB000
stack
page read and write
6C78000
stack
page read and write
82CC000
unkown
page read and write
E10000
trusted library allocation
page read and write
28F3000
trusted library allocation
page read and write
4302000
unkown
page read and write
88F5000
unkown
page read and write
4120000
unkown
page read and write
27C9000
trusted library allocation
page read and write
5D7000
unkown
page read and write
310000
heap
page read and write
88FD000
unkown
page read and write
2A0000
unkown
page read and write
317000
heap
page read and write
4540000
unkown
page readonly
370000
trusted library allocation
page read and write
2B4B000
trusted library allocation
page read and write
2ADF000
stack
page read and write
223F000
stack
page read and write
46CC000
stack
page read and write
26D9000
trusted library allocation
page read and write
2D0000
unkown
page readonly
7230000
heap
page read and write
6FE3000
heap
page read and write
590000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
590000
trusted library allocation
page read and write
3671000
trusted library allocation
page read and write
36C000
trusted library allocation
page read and write
1D30000
unkown
page read and write
44B8000
unkown
page read and write
1182000
unkown
page execute and read and write
3C0000
trusted library allocation
page read and write
8600000
unkown
page read and write
3A70000
unkown
page read and write
2BCF000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
240000
heap
page read and write
7BE0000
heap
page read and write
17C000
trusted library allocation
page read and write
340000
trusted library allocation
page read and write
54F000
stack
page read and write
2E9F000
stack
page read and write
3A0000
heap
page read and write
4F60000
heap
page read and write
8636000
unkown
page read and write
B5D0000
heap
page read and write
403000
heap
page read and write
2780000
trusted library allocation
page read and write
AA5E000
stack
page read and write
3BC000
trusted library allocation
page read and write
2A68000
trusted library allocation
page read and write
2F1B000
stack
page read and write
82CC000
unkown
page read and write
240000
heap
page read and write
27BC000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
3A6000
heap
page read and write
370000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
1C30000
unkown
page readonly
33F000
trusted library allocation
page read and write
2898000
stack
page read and write
D60000
trusted library allocation
page execute and read and write
582000
system
page read and write
286C000
trusted library allocation
page read and write
47C000
heap
page read and write
BCE3000
unkown
page read and write
6DDE000
stack
page read and write
2E10000
unkown
page read and write
2912000
trusted library allocation
page read and write
7953000
heap
page read and write
448F000
unkown
page read and write
320000
trusted library allocation
page read and write
320000
trusted library allocation
page read and write
41C0000
unkown
page readonly
860E000
unkown
page read and write
330000
trusted library allocation
page read and write
27E4000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
42C000
heap
page read and write
7720000
stack
page read and write
3B00000
unkown
page read and write
210000
unkown
page readonly
42E000
unkown
page read and write
3B0000
trusted library allocation
page read and write
2B5B000
trusted library allocation
page read and write
41D0000
unkown
page readonly
4338000
unkown
page read and write
354000
trusted library allocation
page read and write
380000
trusted library allocation
page read and write
2FA0000
unkown
page read and write
2A7D000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page read and write
8667000
unkown
page read and write
88C0000
unkown
page read and write
320000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
2C90000
heap
page read and write
2BA6000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
3A9A000
unkown
page read and write
29CD000
trusted library allocation
page read and write
330000
trusted library allocation
page read and write
2ADF000
stack
page read and write
2CAB000
unkown
page read and write
3A60000
unkown
page read and write
2E9F000
stack
page read and write
1D30000
unkown
page read and write
1D60000
direct allocation
page read and write
7567000
heap
page read and write
FE0000
trusted library allocation
page read and write
2898000
stack
page read and write
2DB0000
heap
page read and write
7722000
stack
page read and write
BC23000
unkown
page read and write
3A0000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
1F51000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
551E000
stack
page read and write
DF0000
trusted library allocation
page execute and read and write
240000
trusted library allocation
page execute and read and write
88C000
heap
page read and write
E80000
trusted library allocation
page read and write
86CF000
unkown
page read and write
B3000
trusted library allocation
page execute and read and write
2CB3000
unkown
page read and write
58EF000
stack
page read and write
500000
trusted library allocation
page read and write
7115000
heap
page read and write
330000
trusted library allocation
page read and write
4C9000
heap
page read and write
380000
trusted library allocation
page read and write
31D000
trusted library allocation
page read and write
850F000
unkown
page read and write
3D9000
trusted library section
page readonly
39E0000
heap
page read and write
866C000
unkown
page read and write
2AE6000
trusted library allocation
page read and write
74BE000
stack
page read and write
D77000
trusted library allocation
page execute and read and write
A60000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
856B000
unkown
page read and write
390000
heap
page read and write
85F4000
unkown
page read and write
B30000
trusted library allocation
page read and write
2B51000
trusted library allocation
page read and write
317000
heap
page read and write
360000
trusted library allocation
page read and write
2ABF000
trusted library allocation
page read and write
2CB6000
unkown
page read and write
6D49000
stack
page read and write
1FE0000
trusted library allocation
page execute and read and write
1D20000
unkown
page read and write
7DFB000
stack
page read and write
5630000
heap
page read and write
42AE000
stack
page read and write
20000
unkown
page readonly
374000
trusted library allocation
page read and write
4120000
unkown
page read and write
340000
trusted library allocation
page read and write
37A000
trusted library allocation
page read and write
448C000
unkown
page read and write
A66000
unclassified section
page execute and read and write
320000
trusted library allocation
page read and write
4385000
unkown
page read and write
E4F000
trusted library allocation
page read and write
2ADF000
stack
page read and write
AB0000
trusted library allocation
page read and write
BF0000
trusted library allocation
page execute and read and write
1F57000
trusted library allocation
page read and write
437000
heap
page read and write
340000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
8636000
unkown
page read and write
3B10000
unkown
page readonly
582000
system
page read and write
3B0000
trusted library allocation
page read and write
8D6000
system
page read and write
3A0000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
B5FE000
unkown
page read and write
4317000
unkown
page read and write
2600000
unkown
page readonly
37B000
heap
page read and write
82CC000
unkown
page read and write
87BB000
unkown
page read and write
8512000
unkown
page read and write
5C2000
heap
page read and write
410000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
1F54000
trusted library allocation
page read and write
B0000
trusted library allocation
page read and write
6BF9000
stack
page read and write
A989000
stack
page read and write
4C70000
trusted library allocation
page read and write
1A9000
stack
page read and write
2943000
trusted library allocation
page read and write
320000
trusted library allocation
page read and write
2F1B000
stack
page read and write
7064000
heap
page read and write
400000
remote allocation
page read and write
2A0000
unkown
page read and write
3B0000
trusted library allocation
page read and write
5030000
heap
page read and write
340000
trusted library allocation
page read and write
3A4000
heap
page read and write
28BA000
trusted library allocation
page read and write
298F000
trusted library allocation
page read and write
288D000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
7540000
heap
page read and write
28D1000
trusted library allocation
page read and write
2B8B000
trusted library allocation
page read and write
4160000
unkown
page read and write
370000
trusted library allocation
page read and write
2CB9000
unkown
page read and write
8858000
unkown
page read and write
4DA0000
trusted library allocation
page read and write
3A0000
trusted library allocation
page read and write
300000
trusted library allocation
page read and write
79F0000
heap
page read and write
2A9F000
trusted library allocation
page read and write
2E10000
unkown
page read and write
2FA0000
unkown
page read and write
84D2000
unkown
page read and write
2C0000
heap
page read and write
5D7000
unkown
page read and write
3B9000
trusted library allocation
page read and write
2B30000
unkown
page readonly
29C9000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
88FA000
unkown
page read and write
3A7000
heap
page read and write
4F54000
heap
page read and write
410C000
stack
page read and write
860B000
unkown
page read and write
8582000
unkown
page read and write
20000
unkown
page readonly
4DE000
stack
page read and write
186000
trusted library allocation
page execute and read and write
1160000
trusted library allocation
page read and write
44B8000
unkown
page read and write
368000
trusted library allocation
page read and write
1B0000
unkown
page read and write
8802000
unkown
page read and write
27A000
unkown
page read and write
10EF000
stack
page read and write
85F7000
unkown
page read and write
1150000
trusted library allocation
page read and write
4450000
unkown
page read and write
440D000
unkown
page read and write
3A9A000
unkown
page read and write
28B2000
trusted library allocation
page read and write
87FC000
unkown
page read and write
2801000
unkown
page read and write
4570000
unkown
page readonly
4030000
unkown
page execute read
1B0000
trusted library allocation
page read and write
297A000
trusted library allocation
page read and write
850F000
unkown
page read and write
6D4B000
stack
page read and write
4EE000
trusted library allocation
page read and write
31D000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
2BCD000
trusted library allocation
page read and write
A8BB000
stack
page read and write
31A000
trusted library allocation
page read and write
BBE0000
unkown
page read and write
2870000
trusted library allocation
page read and write
8558000
unkown
page read and write
5C8000
heap
page read and write
337000
trusted library allocation
page read and write
1CD000
system
page execute and read and write
85F2000
unkown
page read and write
8861000
unkown
page read and write
886F000
unkown
page read and write
281B000
trusted library allocation
page read and write
5C6000
heap
page read and write
2815000
trusted library allocation
page read and write
5DC000
heap
page read and write
360000
trusted library allocation
page read and write
240000
heap
page read and write
410000
trusted library allocation
page read and write
2785000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
45A0000
unkown
page readonly
885F000
unkown
page read and write
360000
trusted library allocation
page read and write
8D6000
system
page read and write
2AB6000
trusted library allocation
page read and write
1D55000
heap
page read and write
46D0000
unkown
page readonly
A64000
trusted library allocation
page read and write
84C0000
unkown
page read and write
2CA8000
unkown
page read and write
785E000
stack
page read and write
370000
trusted library allocation
page read and write
26F0000
unkown
page read and write
357000
trusted library allocation
page read and write
2A2A000
trusted library allocation
page read and write
83E2000
unkown
page read and write
3A0000
heap
page read and write
7133000
heap
page read and write
370000
trusted library allocation
page read and write
4484000
unkown
page read and write
EA0000
trusted library allocation
page read and write
7060000
heap
page read and write
288D000
stack
page read and write
3A0000
trusted library allocation
page read and write
8802000
unkown
page read and write
44D000
unkown
page read and write
82FD000
unkown
page read and write
2150000
trusted library allocation
page execute and read and write
4C20000
trusted library allocation
page read and write
25F0000
unkown
page readonly
2CA0000
unkown
page read and write
2AB2000
trusted library allocation
page read and write
830000
unkown
page readonly
154C000
stack
page read and write
5BC000
heap
page read and write
5F7000
unkown
page read and write
4D80000
trusted library allocation
page read and write
29AC000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
85D2000
unkown
page read and write
2CAE000
unkown
page read and write
7729000
stack
page read and write
1F0000
unkown
page readonly
883B000
unkown
page read and write
791F000
stack
page read and write
4CB0000
trusted library allocation
page read and write
10000
heap
page read and write
2A83000
trusted library allocation
page read and write
86C9000
unkown
page read and write
8844000
unkown
page read and write
44E0000
unkown
page read and write
29AA000
trusted library allocation
page read and write
420000
heap
page read and write
8506000
unkown
page read and write
5B7000
heap
page read and write
34D000
trusted library allocation
page read and write
8667000
unkown
page read and write
27CB000
trusted library allocation
page read and write
8506000
unkown
page read and write
520000
trusted library allocation
page read and write
8575000
unkown
page read and write
2520000
unclassified section
page execute and read and write
2CA2000
unkown
page read and write
342000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
4188000
unkown
page read and write
2A54000
trusted library allocation
page read and write
182000
trusted library allocation
page read and write
4BA1000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
44B6000
unkown
page read and write
4F72000
heap
page read and write
2FA0000
unkown
page read and write
7720000
stack
page read and write
4050000
unkown
page read and write
85F7000
unkown
page read and write
2CAB000
unkown
page read and write
3A6000
heap
page read and write
4464000
unkown
page read and write
86E000
heap
page read and write
39D0000
unkown
page read and write
850F000
unkown
page read and write
2ACF000
trusted library allocation
page read and write
B5D0000
heap
page read and write
36E000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
1E60000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
360000
trusted library allocation
page execute and read and write
330000
trusted library allocation
page read and write
4BE000
heap
page read and write
449F000
unkown
page read and write
4450000
unkown
page read and write
7133000
heap
page read and write
4C30000
trusted library allocation
page read and write
2FCE000
heap
page read and write
7E40000
heap
page read and write
3C0000
trusted library allocation
page read and write
448C000
unkown
page read and write
3A70000
unkown
page read and write
6450000
unkown
page readonly
8337000
unkown
page read and write
4120000
unkown
page read and write
6750000
unkown
page read and write
6BF9000
stack
page read and write
4F0E000
stack
page read and write
77DC000
stack
page read and write
2CA0000
unkown
page read and write
410000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
8605000
unkown
page read and write
77DC000
stack
page read and write
B40000
trusted library allocation
page read and write
1ED000
stack
page read and write
246000
heap
page read and write
7EC0000
unkown
page read and write
310000
heap
page read and write
2AEE000
trusted library allocation
page read and write
8664000
unkown
page read and write
2A2E000
trusted library allocation
page read and write
4BBF000
stack
page read and write
350000
trusted library allocation
page read and write
410000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
320000
trusted library allocation
page read and write
3FAF000
stack
page read and write
30000
trusted library allocation
page read and write
82FD000
unkown
page read and write
510000
unkown
page readonly
B00000
trusted library allocation
page read and write
860E000
unkown
page read and write
1B0000
trusted library allocation
page read and write
886D000
unkown
page read and write
B5D0000
heap
page read and write
3A60000
unkown
page read and write
2910000
unkown
page readonly
290E000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
590000
trusted library allocation
page read and write
44D0000
unkown
page readonly
BCA4000
unkown
page read and write
583000
heap
page read and write
2643000
unkown
page read and write
3B10000
unkown
page readonly
B30000
trusted library allocation
page read and write
2C21000
unkown
page read and write
8903000
unkown
page read and write
360000
trusted library allocation
page read and write
4464000
unkown
page read and write
4220000
unkown
page readonly
585E000
stack
page read and write
4E0000
trusted library allocation
page read and write
886A000
unkown
page read and write
1D30000
unkown
page read and write
3C0000
trusted library allocation
page read and write
7083000
heap
page read and write
A00000
system
page execute and read and write
3B00000
unkown
page read and write
960000
unclassified section
page execute and read and write
3FB5000
stack
page read and write
26C6000
unkown
page read and write
BD60000
unkown
page read and write
2B5D000
trusted library allocation
page read and write
590000
trusted library allocation
page read and write
E3D000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
8D6000
system
page read and write
4DF0000
trusted library allocation
page read and write
6D49000
stack
page read and write
590000
trusted library allocation
page read and write
210000
unkown
page readonly
8864000
unkown
page read and write
589000
trusted library allocation
page read and write
2BD3000
trusted library allocation
page read and write
380000
trusted library allocation
page read and write
2CAB000
unkown
page read and write
2B55000
trusted library allocation
page read and write
8611000
unkown
page read and write
883B000
unkown
page read and write
96F000
stack
page read and write
82D5000
unkown
page read and write
46D0000
unkown
page readonly
498000
heap
page read and write
360000
trusted library allocation
page read and write
41E0000
unkown
page read and write
5AC000
heap
page read and write
AAD000
stack
page read and write
310000
trusted library allocation
page read and write
320000
trusted library allocation
page read and write
29EC000
trusted library allocation
page read and write
340000
trusted library allocation
page read and write
1180000
unkown
page readonly
4060000
unkown
page read and write
570000
trusted library allocation
page read and write
D71000
trusted library allocation
page execute and read and write
273D000
trusted library allocation
page read and write
53DD000
stack
page read and write
24BF000
stack
page read and write
3BB000
trusted library allocation
page read and write
8669000
unkown
page read and write
9D0000
trusted library allocation
page read and write
410000
trusted library allocation
page read and write
4050000
unkown
page read and write
530000
heap
page read and write
48A000
heap
page read and write
2E0000
unclassified section
page execute and read and write
A4B8000
stack
page read and write
277C000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
19F000
stack
page read and write
3B10000
unkown
page readonly
B4F6000
unkown
page execute and read and write
2160000
trusted library allocation
page execute and read and write
690000
unkown
page readonly
380000
trusted library allocation
page read and write
100000
unkown
page read and write
3C0000
trusted library allocation
page read and write
2891000
trusted library allocation
page read and write
791F000
stack
page read and write
2FC5000
heap
page read and write
3E6000
heap
page read and write
2CF000
unkown
page read and write
6F4A000
stack
page read and write
869E000
unkown
page read and write
B10000
trusted library allocation
page read and write
430000
heap
page read and write
344000
trusted library allocation
page read and write
C80000
trusted library allocation
page execute and read and write
4160000
unkown
page read and write
6C78000
stack
page read and write
B5FE000
unkown
page read and write
7110000
heap
page read and write
1D13000
unkown
page read and write
B5E0000
unkown
page read and write
2803000
trusted library allocation
page read and write
500000
trusted library allocation
page read and write
2284000
heap
page read and write
4E70000
trusted library allocation
page read and write
29C1000
trusted library allocation
page read and write
B5D5000
heap
page read and write
A50000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
555F000
stack
page read and write
7930000
heap
page read and write
7E40000
heap
page read and write
4317000
unkown
page read and write
E10000
trusted library allocation
page read and write
564000
heap
page read and write
310000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
2CBC000
unkown
page read and write
2643000
unkown
page read and write
27EE000
trusted library allocation
page read and write
2CA5000
unkown
page read and write
389000
trusted library allocation
page read and write
A989000
stack
page read and write
36D000
stack
page read and write
449B000
unkown
page read and write
2776000
trusted library allocation
page read and write
373000
trusted library allocation
page read and write
120000
heap
page read and write
841B000
unkown
page read and write
8600000
unkown
page read and write
3D4000
trusted library section
page readonly
6F4A000
stack
page read and write
4540000
unkown
page readonly
256000
unkown
page read and write
360000
trusted library allocation
page read and write
410000
trusted library allocation
page read and write
4210000
unkown
page read and write
8521000
unkown
page read and write
4CDD000
stack
page read and write
851A000
unkown
page read and write
28F5000
trusted library allocation
page read and write
2910000
unkown
page readonly
35B000
heap
page read and write
7727000
stack
page read and write
3AF0000
unkown
page read and write
4620000
unkown
page read and write
1F40000
trusted library allocation
page read and write
2AD7000
trusted library allocation
page read and write
38D000
trusted library allocation
page read and write
547000
heap
page read and write
7660000
stack
page read and write
B5FE000
unkown
page read and write
56BE000
stack
page read and write
1D73000
heap
page read and write
340000
trusted library allocation
page read and write
2B01000
trusted library allocation
page read and write
82C5000
unkown
page read and write
5C8000
heap
page read and write
4188000
unkown
page read and write
2CA5000
unkown
page read and write
26BA000
unkown
page read and write
322000
trusted library allocation
page read and write
2B20000
unkown
page read and write
3A0000
trusted library allocation
page read and write
36B000
trusted library allocation
page read and write
85F7000
unkown
page read and write
3FD000
heap
page read and write
86C9000
unkown
page read and write
BE0000
trusted library allocation
page execute and read and write
2733000
trusted library allocation
page read and write
7EC0000
unkown
page read and write
8569000
unkown
page read and write
7BE0000
heap
page read and write
6F3F000
stack
page read and write
36B000
trusted library allocation
page read and write
79FA000
heap
page read and write
B20000
trusted library allocation
page read and write
308000
stack
page read and write
4520000
unkown
page readonly
580000
trusted library allocation
page read and write
2CF000
unkown
page read and write
350000
trusted library allocation
page read and write
4210000
unkown
page read and write
10000
heap
page read and write
340000
trusted library allocation
page read and write
41C0000
unkown
page readonly
360000
trusted library allocation
page read and write
1C30000
unkown
page readonly
2A1F000
trusted library allocation
page read and write
4B2E000
stack
page read and write
383000
trusted library allocation
page read and write
2AF000
unkown
page read and write
2826000
trusted library allocation
page read and write
34A000
trusted library allocation
page read and write
28B0000
unkown
page readonly
46CC000
stack
page read and write
2BAD000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
1D20000
unkown
page read and write
4338000
unkown
page read and write
270000
heap
page read and write
510000
trusted library allocation
page read and write
2600000
unkown
page readonly
6E5A000
stack
page read and write
26F0000
unkown
page read and write
570000
trusted library allocation
page read and write
6C78000
stack
page read and write
77DC000
stack
page read and write
288B000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
2964000
trusted library allocation
page read and write
A8BB000
stack
page read and write
2B30000
unkown
page readonly
7540000
heap
page read and write
2795000
trusted library allocation
page read and write
BDA3000
unkown
page read and write
2B89000
trusted library allocation
page read and write
2CB3000
unkown
page read and write
B20000
trusted library allocation
page read and write
4530000
unkown
page readonly
593000
system
page read and write
2B38000
trusted library allocation
page read and write
510000
unkown
page readonly
2A0000
unkown
page read and write
410000
unkown
page read and write
2CBF000
unkown
page read and write
468000
heap
page read and write
2754000
trusted library allocation
page read and write
71A0000
heap
page read and write
2793000
trusted library allocation
page read and write
2958000
trusted library allocation
page read and write
281F000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
3CE000
trusted library allocation
page read and write
8582000
unkown
page read and write
1D40000
unkown
page readonly
250000
unkown
page read and write
3AC000
trusted library allocation
page read and write
369000
trusted library allocation
page read and write
3A0000
trusted library allocation
page read and write
3A9A000
unkown
page read and write
1B0000
unkown
page read and write
4110000
unkown
page read and write
2B36000
trusted library allocation
page read and write
B18000
trusted library allocation
page read and write
335000
heap
page read and write
350000
trusted library allocation
page read and write
4AEE000
stack
page read and write
84D2000
unkown
page read and write
380000
trusted library allocation
page read and write
33F000
trusted library allocation
page read and write
2A87000
trusted library allocation
page read and write
380000
trusted library allocation
page read and write
38C000
trusted library allocation
page read and write
410000
trusted library allocation
page read and write
4560000
unkown
page readonly
8675000
unkown
page read and write
330000
trusted library allocation
page read and write
BD60000
unkown
page read and write
2B75000
trusted library allocation
page read and write
2BD1000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
2C21000
unkown
page read and write
3C0000
trusted library allocation
page read and write
3A5000
trusted library allocation
page read and write
88FD000
unkown
page read and write
1180000
unkown
page readonly
20000
unkown
page readonly
360000
trusted library allocation
page read and write
10000
heap
page read and write
4CA0000
trusted library allocation
page read and write
841F000
unkown
page read and write
380000
trusted library allocation
page read and write
970000
trusted library allocation
page read and write
2B0B000
trusted library allocation
page read and write
2B8F000
trusted library allocation
page read and write
5D3000
unkown
page read and write
27BF000
trusted library allocation
page read and write
85AC000
unkown
page read and write
2E0000
unkown
page readonly
4D00000
trusted library allocation
page read and write
2BD5000
trusted library allocation
page read and write
10000
heap
page read and write
3B0000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
515000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
4C10000
heap
page read and write
3A0000
trusted library allocation
page read and write
281D000
trusted library allocation
page read and write
378000
trusted library allocation
page read and write
7567000
heap
page read and write
590000
trusted library allocation
page read and write
2CBF000
unkown
page read and write
4E00000
trusted library allocation
page read and write
43F0000
unkown
page read and write
BCA4000
unkown
page read and write
29E2000
trusted library allocation
page read and write
330000
trusted library allocation
page read and write
B50000
trusted library allocation
page execute and read and write
785E000
stack
page read and write
4530000
unkown
page readonly
2B09000
trusted library allocation
page read and write
37B000
heap
page read and write
27F0000
unkown
page read and write
1F0000
trusted library allocation
page execute and read and write
18C000
stack
page read and write
1D55000
heap
page read and write
AB0000
trusted library allocation
page read and write
380000
trusted library allocation
page read and write
4484000
unkown
page read and write
274E000
trusted library allocation
page read and write
44B6000
unkown
page read and write
2643000
unkown
page read and write
8807000
unkown
page read and write
7549000
heap
page read and write
360000
trusted library allocation
page read and write
197000
trusted library allocation
page execute and read and write
2AD5000
trusted library allocation
page read and write
879E000
unkown
page read and write
D00000
trusted library allocation
page execute and read and write
3A0000
trusted library allocation
page read and write
2BD7000
trusted library allocation
page read and write
29AE000
trusted library allocation
page read and write
4510000
unkown
page execute and read and write
C00000
trusted library allocation
page execute and read and write
29CB000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
29C7000
trusted library allocation
page read and write
886A000
unkown
page read and write
BBA0000
unkown
page read and write
BDA3000
unkown
page read and write
190000
system
page execute and read and write
42E000
unkown
page read and write
150000
trusted library allocation
page read and write
2999000
trusted library allocation
page read and write
87E8000
unkown
page read and write
370000
trusted library allocation
page read and write
26BA000
unkown
page read and write
441F000
unkown
page read and write
4E0000
trusted library allocation
page read and write
2FC9000
heap
page read and write
2CB6000
unkown
page read and write
410000
trusted library allocation
page read and write
3E0000
heap
page read and write
40C000
heap
page read and write
88BD000
unkown
page read and write
250000
heap
page read and write
1B0000
heap
page read and write
1140000
trusted library allocation
page read and write
317000
heap
page read and write
335000
heap
page read and write
500000
trusted library allocation
page read and write
5D0000
unkown
page read and write
410C000
stack
page read and write
4800000
trusted library allocation
page read and write
2819000
trusted library allocation
page read and write
26C6000
unkown
page read and write
6FE3000
heap
page read and write
6EC0000
heap
page read and write
3D0000
heap
page execute and read and write
1DD0000
unkown
page readonly
5A0000
trusted library allocation
page read and write
2898000
stack
page read and write
EB0000
trusted library allocation
page read and write
330000
trusted library allocation
page read and write
2722000
trusted library allocation
page read and write
384000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
6FC0000
heap
page read and write
19B000
trusted library allocation
page execute and read and write
10F0000
trusted library allocation
page read and write
2ABC000
trusted library allocation
page read and write
434F000
unkown
page read and write
27F0000
unkown
page read and write
2B0000
unkown
page read and write
380000
trusted library allocation
page read and write
83A7000
unkown
page read and write
B1E000
trusted library allocation
page read and write
6FC0000
heap
page read and write
10000
heap
page read and write
BD60000
unkown
page read and write
2CA000
trusted library allocation
page read and write
410000
trusted library allocation
page read and write
2A32000
trusted library allocation
page read and write
7729000
stack
page read and write
85F4000
unkown
page read and write
340000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
335000
heap
page read and write
2A11000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
7722000
stack
page read and write
2C6F000
unkown
page read and write
29B2000
trusted library allocation
page read and write
886D000
unkown
page read and write
2F0F000
stack
page read and write
84D2000
unkown
page read and write
5030000
heap
page read and write
850D000
unkown
page read and write
B30000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
2A6C000
trusted library allocation
page read and write
454000
heap
page read and write
4510000
unkown
page execute and read and write
2801000
unkown
page read and write
29C3000
trusted library allocation
page read and write
506000
unkown
page read and write
3B00000
unkown
page read and write
2712000
trusted library allocation
page read and write
30000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
84C0000
unkown
page read and write
1130000
trusted library allocation
page read and write
FDE000
stack
page read and write
2C21000
unkown
page read and write
1D50000
heap
page read and write
593000
system
page read and write
33E000
trusted library allocation
page read and write
367000
trusted library allocation
page read and write
39E0000
heap
page read and write
8602000
unkown
page read and write
368000
trusted library allocation
page read and write
28EF000
trusted library allocation
page read and write
2CBF000
unkown
page read and write
BC60000
unkown
page read and write
27B8000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
4C10000
heap
page read and write
46D0000
unkown
page readonly
360000
trusted library allocation
page read and write
88C0000
unkown
page read and write
86F000
heap
page read and write
71A0000
heap
page read and write
1FC0000
trusted library allocation
page read and write
2C0000
unkown
page read and write
100000
unkown
page read and write
320000
trusted library allocation
page read and write
110000
unkown
page read and write
85AC000
unkown
page read and write
320000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
5030000
heap
page read and write
E0E000
stack
page read and write
88FA000
unkown
page read and write
1D40000
unkown
page readonly
1D73000
heap
page read and write
2600000
unkown
page readonly
2A34000
trusted library allocation
page read and write
3FD000
heap
page read and write
72C0000
heap
page read and write
EB0000
trusted library allocation
page read and write
4D60000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
28E9000
trusted library allocation
page read and write
590000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
2A66000
trusted library allocation
page read and write
82FD000
unkown
page read and write
7115000
heap
page read and write
290000
unkown
page readonly
14C000
stack
page read and write
A4B8000
stack
page read and write
1B0000
unkown
page read and write
2710000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
5A0000
trusted library allocation
page read and write
4F60000
heap
page read and write
7930000
heap
page read and write
6E4E000
stack
page read and write
5260000
trusted library allocation
page read and write
860000
trusted library allocation
page execute and read and write
886D000
unkown
page read and write
8864000
unkown
page read and write
5A9000
heap
page read and write
298F000
stack
page read and write
42AE000
stack
page read and write
4D50000
trusted library allocation
page read and write
2935000
trusted library allocation
page read and write
7934000
heap
page read and write
2D0000
unkown
page readonly
250000
unkown
page read and write
D0000
unkown
page readonly
1C30000
unkown
page readonly
4DC0000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
6450000
unkown
page readonly
27B6000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
4BBF000
stack
page read and write
390000
heap
page read and write
3A0000
trusted library allocation
page read and write
2B0F000
trusted library allocation
page read and write
29FD000
trusted library allocation
page read and write
4338000
unkown
page read and write
BB62000
unkown
page read and write
3B0000
trusted library allocation
page read and write
380000
trusted library allocation
page read and write
6D4B000
stack
page read and write
2B0000
unkown
page read and write
4E10000
trusted library allocation
page read and write
33B000
trusted library allocation
page read and write
2997000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
2A81000
trusted library allocation
page read and write
7BE0000
heap
page read and write
B40000
trusted library allocation
page read and write
330000
trusted library allocation
page read and write
210000
unkown
page readonly
2CAE000
unkown
page read and write
295C000
trusted library allocation
page read and write
85FA000
unkown
page read and write
There are 2265 hidden memdumps, click here to show them.