IOC Report
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.1905.19912

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.1905.rtf
Rich Text Format data, version 1, unknown character set
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{4F98E955-E40B-4BEE-AA1E-253D7E3CD6E7}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Local\Temp\Client.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Client.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{5E27A50A-FBC0-4F18-B35D-48F0F2347081}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{FD7AAECA-23CD-402D-9C50-48A29A5112A1}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.1905.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Aug 9 00:38:02 2022, mtime=Tue Aug 9 00:38:02 2022, atime=Tue Aug 9 00:38:12 2022, length=2870044, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\~$curiteInfo.com.Exploit.Rtf.Obfuscated.32.1905.rtf
data
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Windows\SysWOW64\cmd.exe
CmD.exe /C %tmp%\Client.exe A C
malicious
C:\Users\user\AppData\Local\Temp\Client.exe
C:\Users\user\AppData\Local\Temp\Client.exe A C
malicious
C:\Windows\SysWOW64\notepad.exe
C:\Windows\SysWOW64\notepad.exe /Processid:{2BA893A4-E786-4AE6-9111-3506DE199247}
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\ipconfig.exe
C:\Windows\SysWOW64\ipconfig.exe
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\SysWOW64\notepad.exe"
malicious

URLs

Name
IP
Malicious
www.lundadonate.xyz/nb30/
malicious
http://www.best-boy.net/nb30/?4hntpZ=WWLsvV61WazOGjhWPmK2zCox7nD1HU3ZrNfLe9lvYYokad8918qHb5Jmu9JsRIh/3onKEQ==&PPa=ApcXW2
104.167.67.175
malicious
http://www.thegoldencamel.online/nb30/?4hntpZ=HrFg7Zw77Q4AgN6xWDdwD99B0qzSSsTIjhXIVaLmDYdCsLEuJk5C8qRmA5PaAiVsBqYing==&PPa=ApcXW2
66.235.200.170
malicious
http://www.windows.com/pctv.
unknown
http://investor.msn.com
unknown
http://www.msnbc.com/news/ticker.txt
unknown
http://wellformedweb.org/CommentAPI/
unknown
http://www.piriform.com/ccleanerp
unknown
http://www.iis.fhg.de/audioPA
unknown
http://www.piriform.com/ccleanerq
unknown
http://www.piriform.com/ccleaner1SPS0
unknown
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
unknown
http://www.hotmail.com/oe
unknown
http://treyresearch.net
unknown
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
unknown
http://java.sun.com
unknown
http://www.icra.org/vocabulary/.
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
http://investor.msn.com/
unknown
http://www.piriform.com/ccleaner
unknown
http://computername/printers/printername/.printer
unknown
http://www.%s.comPA
unknown
http://www.autoitscript.com/autoit3
unknown
https://support.mozilla.org
unknown
http://www.piriform.com/ccleanerv
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://servername/isapibackend.dll
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
thegoldencamel.online
66.235.200.170
malicious
www.best-boy.net
104.167.67.175
malicious
www.thegoldencamel.online
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.167.67.175
www.best-boy.net
United States
malicious
66.235.200.170
thegoldencamel.online
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
h'+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
0(+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
?++
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@%SystemRoot%\system32\packager.dll,-2000
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\67F1E
67F1E
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6F518
6F518
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6F518
6F518
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
Zoom
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
CustomZoom
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
ShowAll
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
Version
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
ForceOpen
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
ToolbarDocked
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
ToolbarShown
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
ToolbarDockPos
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
MTUpgradeDialog
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Sizes
Full
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Sizes
Script
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Sizes
ScriptScript
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Sizes
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Sizes
SubSymbol
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
LineSpacing
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
MatrixRowSpacing
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
MatrixColSpacing
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
SuperscriptHeight
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
SubscriptDepth
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
LimHeight
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
LimDepth
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
LimLineSpacing
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
NumerHeight
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
DenomDepth
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
FractBarOver
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
FractBarThick
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
SubFractBarThick
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
FenceOver
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
SpacingFactor
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
MinGap
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
RadicalGap
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
EmbellGap
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
PrimeHeight
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Text
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Function
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Variable
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
LCGreek
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
UCGreek
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Vector
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Number
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
User1
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
User2
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Windows
EquationWindow
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Windows
SpacingWindow
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Windows
TextLanguage
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Windows
MathLanguage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
There are 360 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
150000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
260000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2C0000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
290000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3666000
trusted library allocation
page read and write
malicious
80000
unkown
page execute and read and write
malicious
2992000
unkown
page execute and read and write
malicious
2992000
unkown
page execute and read and write
malicious
4D0000
trusted library allocation
page read and write
300000
trusted library allocation
page read and write
3A6000
heap
page read and write
50000
unkown
page readonly
630000
trusted library allocation
page read and write
287A000
trusted library allocation
page read and write
2A3F000
trusted library allocation
page read and write
200A000
trusted library allocation
page read and write
730000
trusted library allocation
page read and write
4EB000
trusted library allocation
page read and write
88C0000
unkown
page read and write
240000
heap
page read and write
22A0000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
34D000
trusted library allocation
page read and write
D70000
trusted library allocation
page execute and read and write
4070000
unkown
page read and write
86C9000
unkown
page read and write
79FA000
heap
page read and write
26F0000
unkown
page read and write
28E1000
trusted library allocation
page read and write
7567000
heap
page read and write
73D000
trusted library allocation
page read and write
2B39000
trusted library allocation
page read and write
44F0000
unkown
page readonly
B793000
unkown
page read and write
4338000
unkown
page read and write
2B20000
unkown
page read and write
110000
unkown
page read and write
D10000
trusted library allocation
page execute and read and write
8558000
unkown
page read and write
2500000
trusted library allocation
page read and write
2769000
trusted library allocation
page read and write
2E0000
unkown
page readonly
7F7000
heap
page read and write
580000
unkown
page read and write
285B000
trusted library allocation
page read and write
3DE000
stack
page read and write
4C0000
trusted library allocation
page read and write
2410000
heap
page read and write
27B3000
trusted library allocation
page read and write
4D2000
trusted library allocation
page read and write
223F000
stack
page read and write
B6D2000
unkown
page read and write
6FC0000
heap
page read and write
7187000
stack
page read and write
2A39000
trusted library allocation
page read and write
640000
trusted library allocation
page read and write
886F000
unkown
page read and write
10000
unkown
page read and write
B853000
unkown
page read and write
83E2000
unkown
page read and write
6C78000
stack
page read and write
88BD000
unkown
page read and write
440D000
unkown
page read and write
82D5000
unkown
page read and write
8506000
unkown
page read and write
E0000
unkown
page read and write
6FC4000
heap
page read and write
271F000
unclassified section
page read and write
860000
trusted library allocation
page read and write
295F000
trusted library allocation
page read and write
3F10000
unkown
page read and write
8600000
unkown
page read and write
860000
trusted library allocation
page read and write
42AE000
stack
page read and write
3FD000
heap
page read and write
27A000
unkown
page read and write
4D1000
trusted library allocation
page read and write
B754000
unkown
page read and write
7930000
heap
page read and write
4B0000
trusted library allocation
page read and write
900000
trusted library allocation
page read and write
2857000
trusted library allocation
page read and write
4F60000
heap
page read and write
2320000
trusted library allocation
page execute and read and write
2B50000
unkown
page readonly
27D0000
trusted library allocation
page read and write
296E000
trusted library allocation
page read and write
2A6F000
trusted library allocation
page read and write
28B5000
trusted library allocation
page read and write
670000
trusted library allocation
page read and write
7083000
heap
page read and write
2910000
unkown
page readonly
39D0000
unkown
page read and write
5F0000
trusted library allocation
page read and write
82C0000
unkown
page read and write
8805000
unkown
page read and write
6DDE000
stack
page read and write
2A9F000
trusted library allocation
page read and write
840000
trusted library allocation
page read and write
620000
trusted library allocation
page read and write
5F9000
trusted library allocation
page read and write
582000
unkown
page read and write
3A60000
unkown
page read and write
2898000
trusted library allocation
page read and write
2B29000
trusted library allocation
page read and write
8675000
unkown
page read and write
3B10000
unkown
page readonly
29DA000
trusted library allocation
page read and write
2270000
trusted library allocation
page read and write
4138000
unkown
page read and write
510000
unkown
page readonly
8521000
unkown
page read and write
2842000
trusted library allocation
page read and write
28AF000
trusted library allocation
page read and write
4DF000
trusted library allocation
page read and write
2CB3000
unkown
page read and write
640000
trusted library allocation
page read and write
88BD000
unkown
page read and write
636000
heap
page read and write
517000
heap
page read and write
2B06000
trusted library allocation
page read and write
7060000
heap
page read and write
B80000
trusted library allocation
page execute and read and write
A7F000
stack
page read and write
790000
trusted library allocation
page read and write
6D0000
trusted library allocation
page read and write
650000
trusted library allocation
page read and write
4050000
unkown
page read and write
D0000
unkown
page readonly
26EB000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
830000
unkown
page readonly
58D000
heap
page read and write
88F5000
unkown
page read and write
85F2000
unkown
page read and write
210000
unkown
page readonly
8669000
unkown
page read and write
22C0000
trusted library allocation
page read and write
46CC000
stack
page read and write
370000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
55A000
heap
page read and write
44F0000
unkown
page readonly
27D2000
trusted library allocation
page read and write
2CA2000
unkown
page read and write
2420000
heap
page read and write
794000
heap
page read and write
25F0000
unkown
page readonly
4EE000
trusted library allocation
page read and write
2861000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
2988000
trusted library allocation
page read and write
2C73000
unkown
page read and write
D80000
trusted library allocation
page execute and read and write
4D0000
trusted library allocation
page read and write
2A8A000
trusted library allocation
page read and write
8900000
unkown
page read and write
84D2000
unkown
page read and write
7E0000
trusted library allocation
page read and write
7180000
stack
page read and write
4D0000
trusted library allocation
page read and write
449B000
unkown
page read and write
2B1A000
trusted library allocation
page read and write
8864000
unkown
page read and write
6D0000
trusted library allocation
page read and write
3FB7000
stack
page read and write
2C28000
heap
page read and write
4620000
unkown
page read and write
44D0000
unkown
page readonly
2A23000
trusted library allocation
page read and write
5AF000
stack
page read and write
2400000
trusted library allocation
page execute and read and write
610000
trusted library allocation
page read and write
29B000
trusted library allocation
page execute and read and write
610000
trusted library allocation
page read and write
4E1000
trusted library allocation
page read and write
4423000
unkown
page read and write
410C000
stack
page read and write
86C9000
unkown
page read and write
85FD000
unkown
page read and write
886A000
unkown
page read and write
29D6000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
4B6E000
stack
page read and write
4560000
unkown
page readonly
7B0000
trusted library allocation
page read and write
26C6000
unkown
page read and write
2187000
trusted library allocation
page read and write
4EEC000
stack
page read and write
3FE0000
unkown
page read and write
30000
trusted library allocation
page read and write
100000
unkown
page read and write
2CA0000
unkown
page read and write
3B00000
unkown
page read and write
900000
trusted library allocation
page read and write
28D1000
trusted library allocation
page read and write
10000
heap
page read and write
300000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
2B69000
trusted library allocation
page read and write
2950000
unkown
page execute and read and write
6FC0000
heap
page read and write
841B000
unkown
page read and write
244000
heap
page read and write
3FE0000
unkown
page read and write
7EC0000
unkown
page read and write
74BE000
stack
page read and write
20000
unkown
page readonly
2ACC000
trusted library allocation
page read and write
B7D3000
unkown
page read and write
660000
trusted library allocation
page read and write
4000000
unkown
page read and write
860E000
unkown
page read and write
BD000
trusted library allocation
page execute and read and write
600000
trusted library allocation
page read and write
200000
heap
page read and write
600000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
7B0000
trusted library allocation
page read and write
296B000
trusted library allocation
page read and write
22B0000
trusted library allocation
page read and write
44E0000
unkown
page read and write
2B4D000
trusted library allocation
page read and write
84D2000
unkown
page read and write
352000
trusted library allocation
page read and write
7E0000
trusted library allocation
page read and write
39E0000
heap
page read and write
B754000
unkown
page read and write
46D0000
unkown
page readonly
37B000
heap
page read and write
4210000
unkown
page read and write
1D13000
unkown
page read and write
578000
unkown
page read and write
2CB0000
unkown
page read and write
2B1000
unkown
page read and write
2CBF000
unkown
page read and write
82FD000
unkown
page read and write
7408000
stack
page read and write
B4AE000
unkown
page read and write
29AB000
trusted library allocation
page read and write
6450000
unkown
page readonly
448F000
unkown
page read and write
329000
heap
page read and write
23F0000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
1D30000
unkown
page read and write
2898000
stack
page read and write
78D000
stack
page read and write
610000
trusted library allocation
page read and write
4A0000
trusted library allocation
page execute and read and write
41D0000
unkown
page readonly
4A0000
trusted library allocation
page read and write
2758000
trusted library allocation
page read and write
410000
unkown
page read and write
B4AE000
unkown
page read and write
5F0000
trusted library allocation
page read and write
632000
trusted library allocation
page read and write
C0E000
stack
page read and write
6FC4000
heap
page read and write
410000
unkown
page read and write
57F000
stack
page read and write
4D5E000
stack
page read and write
2910000
unkown
page readonly
840000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
4C0000
trusted library allocation
page read and write
4A3000
trusted library allocation
page read and write
B3000
trusted library allocation
page execute and read and write
88C0000
unkown
page read and write
1D50000
heap
page read and write
2954000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
1C30000
unkown
page readonly
45A0000
unkown
page readonly
2720000
trusted library allocation
page read and write
8569000
unkown
page read and write
7934000
heap
page read and write
2E9F000
stack
page read and write
5F0000
trusted library allocation
page read and write
85F4000
unkown
page read and write
2CA5000
unkown
page read and write
543000
heap
page read and write
300000
trusted library allocation
page read and write
4A0000
trusted library allocation
page read and write
280F000
trusted library allocation
page read and write
4B0000
trusted library allocation
page read and write
850F000
unkown
page read and write
2B1E000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
630000
trusted library allocation
page read and write
8807000
unkown
page read and write
370000
trusted library allocation
page execute and read and write
4D0000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
39D0000
unkown
page read and write
82D1000
unkown
page read and write
3AD000
stack
page read and write
3A60000
unkown
page read and write
8861000
unkown
page read and write
860B000
unkown
page read and write
869E000
unkown
page read and write
83E2000
unkown
page read and write
3FB5000
stack
page read and write
2B3F000
trusted library allocation
page read and write
631000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
2C21000
unkown
page read and write
278E000
trusted library allocation
page read and write
28FC000
trusted library allocation
page read and write
8F0000
trusted library allocation
page read and write
A4BC000
stack
page read and write
B793000
unkown
page read and write
3FD000
heap
page read and write
2220000
trusted library allocation
page execute and read and write
510000
unkown
page readonly
860B000
unkown
page read and write
2600000
unkown
page readonly
1A9000
stack
page read and write
8805000
unkown
page read and write
273D000
trusted library allocation
page read and write
2898000
stack
page read and write
8903000
unkown
page read and write
71A0000
heap
page read and write
377000
heap
page read and write
2A1D000
trusted library allocation
page read and write
2FC5000
heap
page read and write
2B7C000
trusted library allocation
page read and write
8608000
unkown
page read and write
230000
heap
page read and write
2CBF000
unkown
page read and write
4B0000
trusted library allocation
page read and write
3B0000
heap
page read and write
2737000
trusted library allocation
page read and write
2240000
trusted library allocation
page read and write
4570000
unkown
page readonly
841F000
unkown
page read and write
675000
trusted library allocation
page read and write
690000
unclassified section
page execute and read and write
2A06000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
2AA3000
trusted library allocation
page read and write
4040000
unkown
page readonly
27BD000
trusted library allocation
page read and write
84EE000
unkown
page read and write
650000
trusted library allocation
page read and write
200D000
trusted library allocation
page read and write
4530000
unkown
page readonly
4520000
unkown
page readonly
361000
trusted library allocation
page read and write
220000
unkown
page read and write
8844000
unkown
page read and write
7408000
stack
page read and write
42D0000
unkown
page read and write
3F10000
unkown
page read and write
814000
heap
page read and write
3FD0000
unkown
page read and write
2E9F000
stack
page read and write
26CA000
trusted library allocation
page read and write
5F7000
trusted library allocation
page read and write
44B8000
unkown
page read and write
4620000
unkown
page read and write
362000
trusted library allocation
page read and write
7A0000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
8BE000
stack
page read and write
1D55000
heap
page read and write
44F000
heap
page read and write
7953000
heap
page read and write
3CF7000
unkown
page readonly
43E000
heap
page read and write
81C000
heap
page read and write
4A60000
trusted library allocation
page read and write
7A0000
trusted library allocation
page read and write
3A4000
heap
page read and write
630000
trusted library allocation
page read and write
2CBC000
unkown
page read and write
590000
heap
page read and write
4C0000
trusted library allocation
page read and write
291A000
trusted library allocation
page read and write
2CA8000
unkown
page read and write
25F0000
unkown
page readonly
88FA000
unkown
page read and write
42AE000
stack
page read and write
3FC0000
unkown
page read and write
7895000
heap
page read and write
4E8000
trusted library allocation
page read and write
3A93000
unkown
page read and write
300000
trusted library allocation
page read and write
2C1000
unkown
page read and write
2706000
trusted library allocation
page read and write
2B92000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
2240000
trusted library allocation
page read and write
44B6000
unkown
page read and write
8861000
unkown
page read and write
8903000
unkown
page read and write
310000
heap
page read and write
27F0000
unkown
page read and write
6D0000
trusted library allocation
page read and write
4670000
trusted library allocation
page read and write
2722000
trusted library allocation
page read and write
770000
heap
page read and write
288000
stack
page read and write
7180000
stack
page read and write
584000
unkown
page read and write
750000
heap
page read and write
640000
trusted library allocation
page read and write
280B000
trusted library allocation
page read and write
602000
trusted library allocation
page read and write
2280000
trusted library allocation
page read and write
730000
trusted library allocation
page read and write
4030000
unkown
page execute read
220000
unkown
page read and write
B754000
unkown
page read and write
23E0000
trusted library allocation
page read and write
7895000
heap
page read and write
86C9000
unkown
page read and write
370000
trusted library allocation
page read and write
2510000
trusted library allocation
page execute and read and write
8558000
unkown
page read and write
7180000
stack
page read and write
5F0000
trusted library allocation
page read and write
2643000
unkown
page read and write
7BE0000
heap
page read and write
78B3000
heap
page read and write
350000
trusted library allocation
page read and write
85FA000
unkown
page read and write
810000
trusted library allocation
page read and write
8337000
unkown
page read and write
4570000
unkown
page readonly
A80000
trusted library allocation
page execute and read and write
650000
trusted library allocation
page read and write
8575000
unkown
page read and write
841B000
unkown
page read and write
360000
trusted library allocation
page read and write
82C0000
unkown
page read and write
18C000
stack
page read and write
4040000
unkown
page readonly
840000
trusted library allocation
page read and write
7182000
stack
page read and write
2902000
trusted library allocation
page read and write
4325000
unkown
page read and write
2A00000
trusted library allocation
page read and write
310000
heap
page read and write
10000
heap
page read and write
88FD000
unkown
page read and write
478E000
stack
page read and write
2ABC000
trusted library allocation
page read and write
620000
trusted library allocation
page read and write
2580000
trusted library allocation
page read and write
27F0000
unkown
page read and write
2952000
trusted library allocation
page read and write
27BB000
trusted library allocation
page read and write
2FC9000
heap
page read and write
620000
trusted library allocation
page read and write
4B29000
stack
page read and write
1DD0000
unkown
page readonly
900000
trusted library allocation
page read and write
4640000
trusted library allocation
page read and write
2497000
trusted library allocation
page execute and read and write
3A70000
unkown
page read and write
720000
trusted library allocation
page read and write
E0000
unkown
page read and write
2B20000
unkown
page read and write
7182000
stack
page read and write
20000
heap
page read and write
4060000
unkown
page read and write
44C3000
unkown
page read and write
4158000
unkown
page read and write
2B3D000
trusted library allocation
page read and write
2A82000
trusted library allocation
page read and write
316000
heap
page read and write
2270000
trusted library allocation
page read and write
60000
unkown
page readonly
240000
heap
page read and write
20000
trusted library allocation
page read and write
3FD000
heap
page read and write
5F6000
trusted library allocation
page read and write
640000
trusted library allocation
page read and write
256000
unkown
page read and write
270A000
trusted library allocation
page read and write
2560000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
361000
trusted library allocation
page read and write
4530000
unkown
page readonly
2FCE000
heap
page read and write
44F0000
unkown
page readonly
100000
unkown
page read and write
2777000
trusted library allocation
page read and write
3FB5000
stack
page read and write
449F000
unkown
page read and write
A4BC000
stack
page read and write
7F0000
trusted library allocation
page read and write
B793000
unkown
page read and write
26C6000
unkown
page read and write
790000
trusted library allocation
page read and write
851A000
unkown
page read and write
350000
trusted library allocation
page read and write
27B5000
trusted library allocation
page read and write
A22000
unkown
page execute and read and write
8675000
unkown
page read and write
5F0000
trusted library allocation
page read and write
2859000
trusted library allocation
page read and write
8512000
unkown
page read and write
79F0000
heap
page read and write
4E60000
trusted library allocation
page execute and read and write
6E5A000
stack
page read and write
841F000
unkown
page read and write
350000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
2FC9000
heap
page read and write
4BBF000
stack
page read and write
372000
trusted library allocation
page read and write
3FE0000
unkown
page read and write
26F1000
trusted library allocation
page read and write
4D0000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
4138000
unkown
page read and write
2E0000
unkown
page readonly
23D7000
trusted library allocation
page read and write
660000
trusted library allocation
page read and write
63E000
trusted library allocation
page read and write
830000
unkown
page readonly
4302000
unkown
page read and write
41C0000
unkown
page readonly
43F0000
unkown
page read and write
A0F000
stack
page read and write
AC8F000
stack
page read and write
2724000
trusted library allocation
page read and write
AC96000
stack
page read and write
2CA5000
unkown
page read and write
7540000
heap
page read and write
3FC0000
unkown
page read and write
810000
trusted library allocation
page read and write
28E3000
trusted library allocation
page read and write
449000
heap
page read and write
3FAF000
stack
page read and write
4C7000
trusted library allocation
page read and write
44B8000
unkown
page read and write
2CB9000
unkown
page read and write
8605000
unkown
page read and write
60000
unkown
page readonly
2A56000
trusted library allocation
page read and write
82C0000
unkown
page read and write
2A27000
trusted library allocation
page read and write
885B000
unkown
page read and write
210000
unkown
page readonly
720000
trusted library allocation
page read and write
61A000
trusted library allocation
page read and write
610000
trusted library allocation
page read and write
29CE000
trusted library allocation
page read and write
21E000
stack
page read and write
373000
heap
page read and write
5030000
heap
page read and write
7538000
stack
page read and write
2B67000
trusted library allocation
page read and write
3A60000
unkown
page read and write
4D2000
trusted library allocation
page read and write
28EC000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
7E39000
stack
page read and write
383000
heap
page read and write
4570000
unkown
page readonly
B0C000
unkown
page readonly
4A0000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
2771000
trusted library allocation
page read and write
2530000
trusted library allocation
page read and write
576000
unkown
page read and write
2CB3000
unkown
page read and write
4210000
unkown
page read and write
8F0000
trusted library allocation
page read and write
850D000
unkown
page read and write
370000
trusted library allocation
page read and write
2A2F000
stack
page read and write
2754000
trusted library allocation
page read and write
670000
trusted library allocation
page read and write
587000
unkown
page read and write
335000
heap
page read and write
329000
heap
page read and write
790000
trusted library allocation
page read and write
8691000
unkown
page read and write
AC96000
stack
page read and write
B84000
trusted library allocation
page execute and read and write
4D0000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
640000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
4550000
unkown
page readonly
2B37000
trusted library allocation
page read and write
377000
trusted library allocation
page read and write
28E9000
trusted library allocation
page read and write
87BB000
unkown
page read and write
610000
trusted library allocation
page read and write
2B1000
unkown
page read and write
8512000
unkown
page read and write
10000
heap
page read and write
6750000
unkown
page read and write
A74000
unkown
page execute read
87BB000
unkown
page read and write
2937000
trusted library allocation
page read and write
53F000
heap
page read and write
832000
trusted library allocation
page read and write
2CA2000
unkown
page read and write
620000
trusted library allocation
page read and write
88C0000
unkown
page read and write
2910000
unkown
page readonly
7060000
heap
page read and write
42E000
unkown
page read and write
575000
heap
page read and write
4C0000
trusted library allocation
page read and write
87FF000
unkown
page read and write
6F4A000
stack
page read and write
2741000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
4B0000
trusted library allocation
page read and write
4385000
unkown
page read and write
2CAE000
unkown
page read and write
4030000
unkown
page execute read
88F7000
unkown
page read and write
B810000
unkown
page read and write
60A000
trusted library allocation
page read and write
85F7000
unkown
page read and write
7CE000
trusted library allocation
page read and write
1C30000
unkown
page readonly
28FE000
trusted library allocation
page read and write
6D0000
trusted library allocation
page read and write
5030000
heap
page read and write
362000
trusted library allocation
page read and write
82D5000
unkown
page read and write
2A0000
trusted library allocation
page execute and read and write
2290000
trusted library allocation
page read and write
6E4E000
stack
page read and write
4A0000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
2CA0000
unkown
page read and write
2797000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
609000
trusted library allocation
page read and write
2491000
trusted library allocation
page execute and read and write
500000
heap
page read and write
4040000
unkown
page readonly
7230000
heap
page read and write
514000
heap
page read and write
7953000
heap
page read and write
8861000
unkown
page read and write
4210000
unkown
page read and write
650000
trusted library allocation
page read and write
2801000
unkown
page read and write
82B000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
292F000
trusted library allocation
page read and write
A20000
unkown
page readonly
7060000
heap
page read and write
21F0000
trusted library allocation
page read and write
690000
unkown
page readonly
448F000
unkown
page read and write
8575000
unkown
page read and write
785E000
stack
page read and write
72C0000
heap
page read and write
680000
trusted library allocation
page read and write
22B0000
trusted library allocation
page read and write
7C0000
trusted library allocation
page read and write
4B29000
stack
page read and write
74C000
stack
page read and write
100000
unkown
page read and write
42E000
unkown
page read and write
4D0000
trusted library allocation
page read and write
2708000
trusted library allocation
page read and write
785E000
stack
page read and write
2380000
trusted library allocation
page execute and read and write
29CF000
unkown
page execute and read and write
800000
trusted library allocation
page read and write
2F9E000
stack
page read and write
27FA000
trusted library allocation
page read and write
841B000
unkown
page read and write
2B18000
trusted library allocation
page read and write
28E5000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
8926000
unkown
page read and write
1DD0000
unkown
page readonly
2280000
trusted library allocation
page read and write
6D0000
trusted library allocation
page read and write
2A6D000
trusted library allocation
page read and write
210000
unkown
page readonly
30D000
stack
page read and write
26E9000
trusted library allocation
page read and write
4AF000
unclassified section
page execute and read and write
33EE000
stack
page read and write
4E0000
trusted library allocation
page read and write
450000
unkown
page read and write
4D5E000
stack
page read and write
36F000
trusted library allocation
page read and write
290000
unkown
page readonly
730000
trusted library allocation
page read and write
7934000
heap
page read and write
323000
heap
page read and write
777000
heap
page read and write
8636000
unkown
page read and write
1E30000
direct allocation
page read and write
5F0000
trusted library allocation
page read and write
27F0000
unkown
page read and write
41C0000
unkown
page readonly
2961000
trusted library allocation
page read and write
2AFA000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
298F000
trusted library allocation
page read and write
6D4B000
stack
page read and write
44CE000
unkown
page read and write
1E20000
heap
page read and write
278A000
trusted library allocation
page read and write
57F000
unkown
page read and write
8844000
unkown
page read and write
3FB5000
stack
page read and write
2641000
trusted library allocation
page read and write
660000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
506000
unkown
page read and write
609000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
610000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
2A69000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
2BFE000
stack
page read and write
31E000
stack
page read and write
E0000
unkown
page read and write
4D5E000
stack
page read and write
4620000
unkown
page read and write
4C0000
trusted library allocation
page read and write
8582000
unkown
page read and write
2CB0000
unkown
page read and write
7549000
heap
page read and write
7E0000
trusted library allocation
page read and write
377000
trusted library allocation
page read and write
8867000
unkown
page read and write
39E0000
heap
page read and write
7064000
heap
page read and write
1D50000
heap
page read and write
2711000
trusted library allocation
page read and write
275A000
trusted library allocation
page read and write
4030000
unkown
page execute read
B32F000
stack
page read and write
2892000
trusted library allocation
page read and write
2CBC000
unkown
page read and write
630000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
223F000
stack
page read and write
1A9000
stack
page read and write
360000
trusted library allocation
page read and write
2F0F000
stack
page read and write
41D0000
unkown
page readonly
53D000
heap
page read and write
4510000
unkown
page execute and read and write
39C0000
unkown
page read and write
2878000
trusted library allocation
page read and write
323000
heap
page read and write
2A41000
trusted library allocation
page read and write
685000
trusted library allocation
page read and write
83E2000
unkown
page read and write
630000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
3A6000
heap
page read and write
4650000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
448C000
unkown
page read and write
2B30000
unkown
page readonly
84EE000
unkown
page read and write
2AF7000
trusted library allocation
page read and write
4EC000
trusted library allocation
page read and write
29D8000
trusted library allocation
page read and write
2933000
trusted library allocation
page read and write
7E39000
stack
page read and write
4F60000
heap
page read and write
316000
heap
page read and write
60000
unkown
page readonly
1D13000
unkown
page read and write
4E0000
trusted library allocation
page read and write
8611000
unkown
page read and write
27DA000
trusted library allocation
page read and write
D07000
trusted library allocation
page execute and read and write
7F0000
trusted library allocation
page read and write
7E40000
heap
page read and write
1D50000
heap
page read and write
2450000
trusted library allocation
page read and write
4F7000
heap
page read and write
2931000
trusted library allocation
page read and write
660000
trusted library allocation
page read and write
2300000
trusted library allocation
page execute and read and write
110000
unkown
page read and write
2BFE000
stack
page read and write
841F000
unkown
page read and write
4D0000
trusted library allocation
page read and write
2965000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
2A84000
trusted library allocation
page read and write
4EEC000
stack
page read and write
4385000
unkown
page read and write
581000
heap
page read and write
670000
trusted library allocation
page read and write
886D000
unkown
page read and write
4060000
unkown
page read and write
883B000
unkown
page read and write
2643000
unkown
page read and write
640000
trusted library allocation
page read and write
85F7000
unkown
page read and write
2B20000
unkown
page read and write
82C5000
unkown
page read and write
B4AE000
unkown
page read and write
39C0000
unkown
page read and write
CF0000
trusted library allocation
page execute and read and write
730000
trusted library allocation
page read and write
89000
stack
page read and write
2290000
trusted library allocation
page read and write
2520000
trusted library allocation
page read and write
10000
heap
page read and write
886D000
unkown
page read and write
3CF7000
unkown
page readonly
8802000
unkown
page read and write
28B1000
trusted library allocation
page read and write
23D0000
trusted library allocation
page read and write
3AD0000
unkown
page readonly
630000
trusted library allocation
page read and write
2B4A000
trusted library allocation
page read and write
4680000
trusted library allocation
page read and write
7E39000
stack
page read and write
600000
trusted library allocation
page read and write
240000
heap
page read and write
4040000
unkown
page readonly
85F7000
unkown
page read and write
84C0000
unkown
page read and write
4660000
trusted library allocation
page read and write
4484000
unkown
page read and write
44B6000
unkown
page read and write
449F000
unkown
page read and write
29BE000
trusted library allocation
page read and write
29D2000
trusted library allocation
page read and write
2B50000
unkown
page readonly
A56F000
stack
page read and write
650000
trusted library allocation
page read and write
2B50000
unkown
page readonly
4130000
unkown
page read and write
8858000
unkown
page read and write
82C5000
unkown
page read and write
64D000
trusted library allocation
page read and write
2450000
trusted library allocation
page read and write
28B0000
unkown
page readonly
350000
trusted library allocation
page read and write
55F000
stack
page read and write
85FA000
unkown
page read and write
830000
trusted library allocation
page read and write
28DD000
trusted library allocation
page read and write
4DD000
trusted library allocation
page read and write
28B7000
trusted library allocation
page read and write
4423000
unkown
page read and write
7189000
stack
page read and write
2794000
trusted library allocation
page read and write
37F000
trusted library allocation
page read and write
11C000
stack
page read and write
660000
trusted library allocation
page read and write
450000
unkown
page read and write
84C0000
unkown
page read and write
587000
unkown
page read and write
2AA1000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
4BBF000
stack
page read and write
444000
heap
page read and write
289C000
trusted library allocation
page read and write
4338000
unkown
page read and write
600000
trusted library allocation
page read and write
7B0000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
879E000
unkown
page read and write
885B000
unkown
page read and write
2080000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
885F000
unkown
page read and write
356000
heap
page read and write
291F000
trusted library allocation
page read and write
43F0000
unkown
page read and write
7F0000
heap
page read and write
2B25000
trusted library allocation
page read and write
373000
trusted library allocation
page read and write
2AA7000
trusted library allocation
page read and write
2918000
trusted library allocation
page read and write
85F2000
unkown
page read and write
43F0000
unkown
page read and write
3FB7000
stack
page read and write
4D0000
trusted library allocation
page read and write
24A0000
trusted library allocation
page execute and read and write
830000
trusted library allocation
page read and write
BF0000
trusted library allocation
page execute and read and write
5A5000
unkown
page read and write
434F000
unkown
page read and write
B70000
trusted library allocation
page execute and read and write
A00000
trusted library allocation
page read and write
57F000
unkown
page read and write
8617000
unkown
page read and write
670000
trusted library allocation
page read and write
37B000
heap
page read and write
7890000
heap
page read and write
4158000
unkown
page read and write
2C21000
unkown
page read and write
7C0000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
6F3F000
stack
page read and write
5F0000
trusted library allocation
page read and write
4510000
unkown
page execute and read and write
37D000
heap
page read and write
23D0000
trusted library allocation
page read and write
7549000
heap
page read and write
280D000
trusted library allocation
page read and write
87F9000
unkown
page read and write
408000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
4060000
unkown
page read and write
AC8F000
stack
page read and write
43F0000
unkown
page read and write
2788000
trusted library allocation
page read and write
840000
trusted library allocation
page read and write
61A000
stack
page read and write
285D000
trusted library allocation
page read and write
2170000
trusted library allocation
page read and write
28CE000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
28EE000
trusted library allocation
page read and write
2AD4000
trusted library allocation
page read and write
4D0000
trusted library allocation
page read and write
87FC000
unkown
page read and write
879E000
unkown
page read and write
670000
trusted library allocation
page read and write
2D0000
trusted library allocation
page read and write
8605000
unkown
page read and write
370000
trusted library allocation
page read and write
4220000
unkown
page readonly
8903000
unkown
page read and write
83A7000
unkown
page read and write
620000
trusted library allocation
page read and write
8867000
unkown
page read and write
28AB000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
44F000
heap
page read and write
E0000
unkown
page read and write
36E000
trusted library allocation
page read and write
900000
trusted library allocation
page read and write
630000
heap
page read and write
3FB7000
stack
page read and write
27A3000
trusted library allocation
page read and write
570000
heap
page read and write
2480000
trusted library allocation
page read and write
8691000
unkown
page read and write
B4000
trusted library allocation
page read and write
57A000
unkown
page read and write
275C000
trusted library allocation
page read and write
4DE000
trusted library allocation
page read and write
B485000
heap
page read and write
4F60000
heap
page read and write
2184000
trusted library allocation
page read and write
2A1000
unkown
page read and write
3641000
trusted library allocation
page read and write
2CA0000
unkown
page read and write
4E0000
trusted library allocation
page read and write
2B63000
trusted library allocation
page read and write
28B0000
unkown
page readonly
4E0000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
4530000
unkown
page readonly
4F0000
heap
page read and write
2906000
trusted library allocation
page read and write
26BA000
unkown
page read and write
3B00000
unkown
page read and write
44C3000
unkown
page read and write
4484000
unkown
page read and write
4130000
unkown
page read and write
2AEF000
trusted library allocation
page read and write
3A93000
unkown
page read and write
3FAF000
stack
page read and write
7C0000
trusted library allocation
page read and write
2849000
trusted library allocation
page read and write
640000
trusted library allocation
page read and write
2210000
trusted library allocation
page execute and read and write
293C000
trusted library allocation
page read and write
6FE3000
heap
page read and write
350000
trusted library allocation
page read and write
3EE000
stack
page read and write
690000
unkown
page readonly
3A6000
heap
page read and write
28B9000
trusted library allocation
page read and write
4457000
unkown
page read and write
2A1000
unkown
page read and write
2B1000
unkown
page read and write
4A0000
trusted library allocation
page read and write
294E000
trusted library allocation
page read and write
2950000
unkown
page execute and read and write
6D0000
trusted library allocation
page read and write
7A0000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
2896000
trusted library allocation
page read and write
44D000
unkown
page read and write
270C000
trusted library allocation
page read and write
1D20000
unkown
page read and write
2999000
trusted library allocation
page read and write
7C0000
trusted library allocation
page read and write
37A000
trusted library allocation
page read and write
4C0000
trusted library allocation
page read and write
4E2000
trusted library allocation
page read and write
640000
trusted library allocation
page read and write
449B000
unkown
page read and write
82CC000
unkown
page read and write
2AD2000
trusted library allocation
page read and write
7540000
heap
page read and write
4A0000
trusted library allocation
page read and write
2CBC000
unkown
page read and write
323F000
stack
page read and write
4E0000
trusted library allocation
page read and write
2963000
trusted library allocation
page read and write
20000
unkown
page readonly
650000
trusted library allocation
page read and write
4AE000
trusted library allocation
page read and write
3AF0000
unkown
page read and write
4E0000
trusted library allocation
page read and write
1A9000
stack
page read and write
790000
trusted library allocation
page read and write
4A0000
trusted library allocation
page read and write
2A6F000
stack
page read and write
100000
unkown
page read and write
869E000
unkown
page read and write
2314000
trusted library allocation
page execute and read and write
600000
trusted library allocation
page read and write
2FCE000
heap
page read and write
2AE9000
trusted library allocation
page read and write
4130000
unkown
page read and write
41E0000
unkown
page read and write
7F0000
heap
page read and write
288D000
stack
page read and write
44B8000
unkown
page read and write
B485000
heap
page read and write
44B6000
unkown
page read and write
8E0000
trusted library allocation
page read and write
7540000
heap
page read and write
298C000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
40E000
stack
page read and write
4E0000
trusted library allocation
page read and write
2935000
trusted library allocation
page read and write
4464000
unkown
page read and write
2CAB000
unkown
page read and write
740000
trusted library allocation
page read and write
7BE0000
heap
page read and write
26E7000
trusted library allocation
page read and write
2F1B000
stack
page read and write
2846000
trusted library allocation
page read and write
4385000
unkown
page read and write
364000
trusted library allocation
page read and write
1D13000
unkown
page read and write
B480000
heap
page read and write
4464000
unkown
page read and write
88BD000
unkown
page read and write
2FE000
stack
page read and write
34F000
stack
page read and write
D0000
unkown
page readonly
27B7000
trusted library allocation
page read and write
300000
trusted library allocation
page read and write
37B000
heap
page read and write
850D000
unkown
page read and write
4220000
unkown
page readonly
2B6F000
stack
page read and write
730000
trusted library allocation
page read and write
27D8000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
720000
trusted library allocation
page read and write
2A88000
trusted library allocation
page read and write
6FB000
unclassified section
page execute and read and write
78B3000
heap
page read and write
448F000
unkown
page read and write
7930000
heap
page read and write
2F1B000
stack
page read and write
4D8000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
7D0000
heap
page read and write
4A3000
trusted library allocation
page read and write
250000
unkown
page read and write
2E9F000
stack
page read and write
7BE0000
heap
page read and write
2A08000
trusted library allocation
page read and write
182000
trusted library allocation
page read and write
84C0000
unkown
page read and write
490000
trusted library allocation
page read and write
46D0000
unkown
page readonly
2CAB000
unkown
page read and write
7930000
heap
page read and write
4A0000
trusted library allocation
page read and write
20000
unkown
page readonly
2950000
trusted library allocation
page read and write
2181000
trusted library allocation
page read and write
2948000
trusted library allocation
page read and write
620000
trusted library allocation
page read and write
85FA000
unkown
page read and write
1D55000
heap
page read and write
879E000
unkown
page read and write
44D0000
unkown
page readonly
B710000
unkown
page read and write
23E0000
trusted library allocation
page read and write
510000
unkown
page readonly
7189000
stack
page read and write
223F000
stack
page read and write
7E0000
trusted library allocation
page read and write
1A0000
heap
page read and write
830000
trusted library allocation
page read and write
26D9000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
4D3000
trusted library allocation
page read and write
4CB000
trusted library allocation
page read and write
2643000
unkown
page read and write
2813000
trusted library allocation
page read and write
37C000
trusted library allocation
page read and write
72C0000
heap
page read and write
6450000
unkown
page readonly
449F000
unkown
page read and write
4B29000
stack
page read and write
288D000
stack
page read and write
363000
trusted library allocation
page read and write
558000
heap
page read and write
3FD0000
unkown
page read and write
340000
trusted library allocation
page read and write
4A0000
trusted library allocation
page read and write
2A71000
trusted library allocation
page read and write
7083000
heap
page read and write
766B000
stack
page read and write
B810000
unkown
page read and write
3FB7000
stack
page read and write
62D000
trusted library allocation
page read and write
1B0000
unkown
page read and write
650000
trusted library allocation
page read and write
8820000
unkown
page read and write
244000
heap
page read and write
74BE000
stack
page read and write
27F0000
unkown
page read and write
851A000
unkown
page read and write
2FCE000
heap
page read and write
4C0000
trusted library allocation
page read and write
4A0000
trusted library allocation
page read and write
690000
unkown
page readonly
26F0000
unkown
page read and write
3FAF000
stack
page read and write
2FC5000
heap
page read and write
3FC0000
unkown
page read and write
1F0000
unkown
page readonly
640000
trusted library allocation
page read and write
88F7000
unkown
page read and write
4DF000
trusted library allocation
page read and write
C00000
trusted library allocation
page execute and read and write
810000
trusted library allocation
page read and write
6FE3000
heap
page read and write
10000
heap
page read and write
4D0000
trusted library allocation
page read and write
6D4B000
stack
page read and write
410C000
stack
page read and write
4540000
unkown
page readonly
610000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
18A000
trusted library allocation
page execute and read and write
7B0000
trusted library allocation
page read and write
19F000
stack
page read and write
800000
trusted library allocation
page read and write
3FB5000
stack
page read and write
2AAD000
trusted library allocation
page read and write
886A000
unkown
page read and write
19F000
stack
page read and write
820000
trusted library allocation
page read and write
2C1000
unkown
page read and write
587000
unkown
page read and write
6D49000
stack
page read and write
1DD0000
unkown
page readonly
4338000
unkown
page read and write
88F7000
unkown
page read and write
1B0000
unkown
page read and write
7064000
heap
page read and write
4302000
unkown
page read and write
2801000
unkown
page read and write
B480000
heap
page read and write
10000
heap
page read and write
46CC000
stack
page read and write
448F000
unkown
page read and write
2B61000
trusted library allocation
page read and write
8669000
unkown
page read and write
4D8000
trusted library allocation
page read and write
4BBF000
stack
page read and write
39C0000
unkown
page read and write
2FC9000
heap
page read and write
7567000
heap
page read and write
2CB0000
unkown
page read and write
7AE000
stack
page read and write
360000
trusted library allocation
page execute and read and write
2801000
unkown
page read and write
440D000
unkown
page read and write
8506000
unkown
page read and write
680000
trusted library allocation
page read and write
310000
heap
page read and write
34D000
heap
page read and write
B7D3000
unkown
page read and write
8864000
unkown
page read and write
2A3D000
trusted library allocation
page read and write
B6D2000
unkown
page read and write
29CF000
unkown
page execute and read and write
7FE000
heap
page read and write
2FC0000
heap
page read and write
4B5000
trusted library allocation
page read and write
88FD000
unkown
page read and write
2F9E000
stack
page read and write
8820000
unkown
page read and write
3AA000
heap
page read and write
2AEB000
trusted library allocation
page read and write
2C24000
heap
page read and write
2FC5000
heap
page read and write
630000
trusted library allocation
page read and write
4550000
unkown
page readonly
640000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
3FF0000
unkown
page read and write
2AF1000
trusted library allocation
page read and write
2CBF000
unkown
page read and write
2090000
trusted library allocation
page read and write
9E0000
trusted library allocation
page read and write
50000
unkown
page readonly
B853000
unkown
page read and write
449F000
unkown
page read and write
57D000
heap
page read and write
2A21000
trusted library allocation
page read and write
85F4000
unkown
page read and write
B7D3000
unkown
page read and write
2526000
unclassified section
page read and write
2CA2000
unkown
page read and write
2B5B000
trusted library allocation
page read and write
7EC0000
unkown
page read and write
41C0000
unkown
page readonly
2B1C000
trusted library allocation
page read and write
282C000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
610000
trusted library allocation
page read and write
690000
unkown
page readonly
60000
unkown
page readonly
4C0000
trusted library allocation
page read and write
2B94000
trusted library allocation
page read and write
2743000
trusted library allocation
page read and write
45A0000
unkown
page readonly
2B16000
trusted library allocation
page read and write
3A70000
unkown
page read and write
4E0000
trusted library allocation
page read and write
2CA8000
unkown
page read and write
650000
trusted library allocation
page read and write
380000
heap
page read and write
7567000
heap
page read and write
6E5A000
stack
page read and write
2FF000
stack
page read and write
850F000
unkown
page read and write
44D000
unkown
page read and write
1F30000
trusted library allocation
page execute and read and write
4060000
unkown
page read and write
41E0000
unkown
page read and write
8C0000
trusted library allocation
page read and write
2982000
trusted library allocation
page read and write
41C0000
unkown
page readonly
2510000
trusted library allocation
page read and write
8667000
unkown
page read and write
1F0000
unkown
page readonly
630000
trusted library allocation
page read and write
2ADB000
trusted library allocation
page read and write
630000
trusted library allocation
page read and write
278C000
trusted library allocation
page read and write
885F000
unkown
page read and write
720000
trusted library allocation
page read and write
603000
trusted library allocation
page read and write
8F0000
trusted library allocation
page read and write
297E000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
316000
heap
page read and write
2CB0000
unkown
page read and write
79FA000
heap
page read and write
8667000
unkown
page read and write
630000
trusted library allocation
page read and write
885F000
unkown
page read and write
4510000
unkown
page execute and read and write
1D73000
heap
page read and write
8864000
unkown
page read and write
300000
trusted library allocation
page read and write
3FD0000
unkown
page read and write
8858000
unkown
page read and write
886F000
unkown
page read and write
2A0A000
trusted library allocation
page read and write
87FF000
unkown
page read and write
2643000
unkown
page read and write
7660000
stack
page read and write
4B8000
trusted library allocation
page read and write
6E5A000
stack
page read and write
5F0000
trusted library allocation
page read and write
44CE000
unkown
page read and write
660000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
88F5000
unkown
page read and write
2F1B000
stack
page read and write
4000000
unkown
page read and write
B90000
trusted library allocation
page execute and read and write
30000
unclassified section
page execute and read and write
4CA000
trusted library allocation
page read and write
41E0000
unkown
page read and write
448C000
unkown
page read and write
B853000
unkown
page read and write
640000
trusted library allocation
page read and write
4530000
unkown
page readonly
23CE000
stack
page read and write | page guard
1D73000
heap
page read and write
8D0000
heap
page read and write
44C3000
unkown
page read and write
720000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
2D0000
unkown
page readonly
4457000
unkown
page read and write
C10000
trusted library allocation
page execute and read and write
71A0000
heap
page read and write
600000
trusted library allocation
page read and write
449B000
unkown
page read and write
2CA8000
unkown
page read and write
42D0000
unkown
page read and write
5F0000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
7890000
heap
page read and write
82D5000
unkown
page read and write
FB000
stack
page read and write
3CF7000
unkown
page readonly
2AB0000
trusted library allocation
page read and write
316000
heap
page read and write
2D0000
unkown
page readonly
640000
trusted library allocation
page read and write
2F0F000
stack
page read and write
60E000
stack
page read and write
2844000
trusted library allocation
page read and write
610000
trusted library allocation
page read and write
2A1F000
trusted library allocation
page read and write
2AD8000
trusted library allocation
page read and write
39E0000
heap
page read and write
4C10000
heap
page read and write
2AA5000
trusted library allocation
page read and write
7187000
stack
page read and write
27DE000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
530000
heap
page read and write
26BA000
unkown
page read and write
2C21000
unkown
page read and write
87F9000
unkown
page read and write
610000
trusted library allocation
page read and write
541000
heap
page read and write
590000
heap
page read and write
62E000
trusted library allocation
page read and write
2499000
trusted library allocation
page read and write
8608000
unkown
page read and write
2739000
trusted library allocation
page read and write
2C1000
unkown
page read and write
4CDD000
stack
page read and write
24A0000
trusted library allocation
page read and write
740000
trusted library allocation
page read and write
740000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
2390000
trusted library allocation
page execute and read and write
2CAB000
unkown
page read and write
4B0000
trusted library allocation
page read and write
44E0000
unkown
page read and write
860E000
unkown
page read and write
8667000
unkown
page read and write
10000
heap
page read and write
26F6000
trusted library allocation
page read and write
3B00000
unkown
page read and write
2CB6000
unkown
page read and write
19F000
stack
page read and write
250000
unkown
page read and write
4D0000
trusted library allocation
page read and write
2A0000
trusted library allocation
page read and write
3A70000
unkown
page read and write
2811000
trusted library allocation
page read and write
85D000
trusted library allocation
page read and write
720000
trusted library allocation
page read and write
26BA000
unkown
page read and write
740000
trusted library allocation
page read and write
8521000
unkown
page read and write
2CBF000
unkown
page read and write
7064000
heap
page read and write
2290000
trusted library allocation
page read and write
2FC5000
heap
page read and write
4000000
unkown
page read and write
2190000
trusted library allocation
page read and write
1D13000
unkown
page read and write
87FF000
unkown
page read and write
2A3B000
trusted library allocation
page read and write
2F0F000
stack
page read and write
8E0000
trusted library allocation
page read and write
4E2B000
stack
page read and write
2E0000
unkown
page readonly
2CB6000
unkown
page read and write
8371000
unkown
page read and write
8F0000
trusted library allocation
page read and write
4423000
unkown
page read and write
5F0000
trusted library allocation
page read and write
4E2B000
stack
page read and write
1D20000
unkown
page read and write
4464000
unkown
page read and write
4520000
unkown
page readonly
1F30000
trusted library allocation
page read and write
4D1000
trusted library allocation
page read and write
270E000
trusted library allocation
page read and write
2A0F000
trusted library allocation
page read and write
3AD0000
unkown
page readonly
650000
trusted library allocation
page read and write
85FD000
unkown
page read and write
510000
heap
page read and write
85F2000
unkown
page read and write
869E000
unkown
page read and write
29B1000
trusted library allocation
page read and write
335000
heap
page read and write
2480000
trusted library allocation
page execute and read and write
46CC000
stack
page read and write
2ACE000
trusted library allocation
page read and write
256000
unkown
page read and write
6EC0000
heap
page read and write
449000
heap
page read and write
41D0000
unkown
page readonly
7F0000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
3B10000
unkown
page readonly
2904000
trusted library allocation
page read and write
4EE000
trusted library allocation
page read and write
290000
unkown
page readonly
7549000
heap
page read and write
3A6000
heap
page read and write
4C6000
trusted library allocation
page read and write
720000
trusted library allocation
page read and write
866C000
unkown
page read and write
4484000
unkown
page read and write
340000
trusted library allocation
page read and write
1D30000
unkown
page read and write
2A04000
trusted library allocation
page read and write
2AF3000
trusted library allocation
page read and write
618000
trusted library allocation
page read and write
10C000
stack
page read and write
23F0000
trusted library allocation
page read and write
8844000
unkown
page read and write
506000
unkown
page read and write
2B5D000
trusted library allocation
page read and write
244000
heap
page read and write
292F000
stack
page read and write
6FC0000
heap
page read and write
3FE0000
unkown
page read and write
3AD0000
unkown
page readonly
2A5C000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
2CB6000
unkown
page read and write
660000
trusted library allocation
page read and write
740000
trusted library allocation
page read and write
71A0000
heap
page read and write
6E0000
heap
page execute and read and write
204000
heap
page read and write
300000
trusted library allocation
page read and write
883B000
unkown
page read and write
2C20000
heap
page read and write
4A0000
trusted library allocation
page read and write
26C6000
unkown
page read and write
2C73000
unkown
page read and write
2FC0000
heap
page read and write
44A000
heap
page read and write
7934000
heap
page read and write
6C78000
stack
page read and write
57A000
unkown
page read and write
640000
trusted library allocation
page read and write
2B0C000
trusted library allocation
page read and write
20000
unkown
page readonly
730000
trusted library allocation
page read and write
85D2000
unkown
page read and write
297000
trusted library allocation
page execute and read and write
44C3000
unkown
page read and write
7953000
heap
page read and write
85AC000
unkown
page read and write
8608000
unkown
page read and write
27B9000
trusted library allocation
page read and write
4B0000
trusted library allocation
page read and write
323000
heap
page read and write
670000
trusted library allocation
page read and write
886F000
unkown
page read and write
299B000
trusted library allocation
page read and write
56A000
heap
page read and write
3B10000
unkown
page readonly
10000
heap
page read and write
42D0000
unkown
page read and write
23F0000
trusted library allocation
page read and write
410000
unkown
page read and write
3AF0000
unkown
page read and write
557000
heap
page read and write
2450000
trusted library allocation
page read and write
610000
trusted library allocation
page read and write
730000
trusted library allocation
page read and write
6450000
unkown
page readonly
4325000
unkown
page read and write
2E0000
unkown
page readonly
4DD000
trusted library allocation
page read and write
620000
trusted library allocation
page read and write
650000
trusted library allocation
page read and write
10000
heap
page read and write
2470000
trusted library allocation
page read and write
2B9E000
trusted library allocation
page read and write
4050000
unkown
page read and write
4D0000
trusted library allocation
page read and write
790000
trusted library allocation
page read and write
276F000
trusted library allocation
page read and write
7E0000
trusted library allocation
page read and write
8675000
unkown
page read and write
B480000
heap
page read and write
27BF000
trusted library allocation
page read and write
6DDE000
stack
page read and write
4B0000
trusted library allocation
page read and write
26F3000
trusted library allocation
page read and write
870000
trusted library allocation
page execute and read and write
246000
heap
page read and write
290000
unkown
page readonly
2866000
trusted library allocation
page read and write
26F0000
unkown
page read and write
630000
trusted library allocation
page read and write
23D0000
trusted library allocation
page read and write
2876000
trusted library allocation
page read and write
AC8F000
stack
page read and write
220000
unkown
page read and write
900000
trusted library allocation
page read and write
610000
trusted library allocation
page read and write
43E000
heap
page read and write
4325000
unkown
page read and write
4C4000
trusted library allocation
page read and write
AC96000
stack
page read and write
7660000
stack
page read and write
2F9E000
stack
page read and write
4423000
unkown
page read and write
5F9000
trusted library allocation
page read and write
1B0000
unkown
page read and write
650000
trusted library allocation
page read and write
2B97000
trusted library allocation
page read and write
B6D2000
unkown
page read and write
1D30000
unkown
page read and write
720000
trusted library allocation
page read and write
851A000
unkown
page read and write
6750000
unkown
page read and write
85AC000
unkown
page read and write
4D0000
trusted library allocation
page read and write
582000
unkown
page read and write
610000
trusted library allocation
page read and write
4325000
unkown
page read and write
449B000
unkown
page read and write
4E0000
trusted library allocation
page read and write
4550000
unkown
page readonly
287C000
trusted library allocation
page read and write
256000
unkown
page read and write
7A0000
trusted library allocation
page read and write
2260000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
830000
unkown
page readonly
9F4000
trusted library allocation
page read and write
1D55000
heap
page read and write
630000
trusted library allocation
page read and write
310000
heap
page read and write
3F10000
unkown
page read and write
4457000
unkown
page read and write
250000
unkown
page read and write
7230000
heap
page read and write
4EA000
trusted library allocation
page read and write
663000
trusted library allocation
page read and write
79F0000
heap
page read and write
448C000
unkown
page read and write
6D0000
trusted library allocation
page read and write
740000
trusted library allocation
page read and write
830000
unkown
page readonly
5030000
heap
page read and write
244000
heap
page read and write
680000
trusted library allocation
page read and write
2A1000
unkown
page read and write
610000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
B490000
unkown
page read and write
2CB3000
unkown
page read and write
240000
heap
page read and write
7FF000
heap
page read and write
370000
trusted library allocation
page read and write
4000000
unkown
page read and write
2815000
trusted library allocation
page read and write
620000
trusted library allocation
page read and write
1D30000
unkown
page read and write
2CB9000
unkown
page read and write
3FD000
heap
page read and write
2870000
trusted library allocation
page read and write
88F5000
unkown
page read and write
7083000
heap
page read and write
A90000
trusted library allocation
page execute and read and write
4560000
unkown
page readonly
37D000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
28DF000
trusted library allocation
page read and write
82FD000
unkown
page read and write
6D0000
trusted library allocation
page read and write
371000
trusted library allocation
page read and write
860B000
unkown
page read and write
8F0000
trusted library allocation
page read and write
2756000
trusted library allocation
page read and write
240000
heap
page read and write
8569000
unkown
page read and write
3A4000
heap
page read and write
26F0000
unkown
page read and write
3FF0000
unkown
page read and write
375000
heap
page read and write
26BA000
unkown
page read and write
370000
system
page execute and read and write
2C1000
unkown
page read and write
506000
unkown
page read and write
A20000
unkown
page readonly
850D000
unkown
page read and write
450000
unkown
page read and write
50000
unkown
page readonly
27E1000
trusted library allocation
page read and write
3AF0000
unkown
page read and write
2801000
unkown
page read and write
374000
heap
page read and write
7F9000
heap
page read and write
B32F000
stack
page read and write
8371000
unkown
page read and write
2CB9000
unkown
page read and write
31AE000
stack
page read and write
2FC9000
heap
page read and write
4540000
unkown
page readonly
4520000
unkown
page readonly
27F6000
trusted library allocation
page read and write
8512000
unkown
page read and write
29B7000
trusted library allocation
page read and write
3A93000
unkown
page read and write
4050000
unkown
page read and write
4030000
unkown
page execute read
860000
trusted library allocation
page read and write
534000
heap
page read and write
2AED000
trusted library allocation
page read and write
250000
unkown
page read and write
46D0000
unkown
page readonly
2C73000
unkown
page read and write
360000
trusted library allocation
page read and write
87BB000
unkown
page read and write
82D1000
unkown
page read and write
630000
trusted library allocation
page read and write
4A0000
trusted library allocation
page read and write
19F000
stack
page read and write
A10000
trusted library allocation
page read and write
8802000
unkown
page read and write
4D6000
trusted library allocation
page read and write
2A2A000
trusted library allocation
page read and write
8617000
unkown
page read and write
26D6000
trusted library allocation
page read and write
2B30000
unkown
page readonly
20B000
heap
page read and write
2B78000
trusted library allocation
page read and write
39D0000
unkown
page read and write
42AE000
stack
page read and write
3FC0000
unkown
page read and write
85D2000
unkown
page read and write
14D000
stack
page read and write
88FA000
unkown
page read and write
7EC0000
unkown
page read and write
600000
trusted library allocation
page read and write
9F7000
trusted library allocation
page read and write
4540000
unkown
page readonly
4C0000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
3FF0000
unkown
page read and write
605000
trusted library allocation
page read and write
27ED000
trusted library allocation
page read and write
72C0000
heap
page read and write
85F4000
unkown
page read and write
6F4A000
stack
page read and write
5F9000
trusted library allocation
page read and write
294C000
trusted library allocation
page read and write
2400000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
2910000
unkown
page readonly
434000
heap
page read and write
340000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
2822000
trusted library allocation
page read and write
3B00000
unkown
page read and write
680000
trusted library allocation
page read and write
2984000
trusted library allocation
page read and write
4570000
unkown
page readonly
3A4000
heap
page read and write
8900000
unkown
page read and write
327F000
stack
page read and write
8582000
unkown
page read and write
7890000
heap
page read and write
2775000
trusted library allocation
page read and write
28AD000
trusted library allocation
page read and write
42E000
unkown
page read and write
4220000
unkown
page readonly
B710000
unkown
page read and write
276B000
trusted library allocation
page read and write
7E0000
trusted library allocation
page read and write
50000
unkown
page readonly
510000
unkown
page readonly
17C000
trusted library allocation
page read and write
B32F000
stack
page read and write
27C2000
trusted library allocation
page read and write
2CB6000
unkown
page read and write
1F0000
unkown
page readonly
46D0000
unkown
page readonly
2A58000
trusted library allocation
page read and write
44B8000
unkown
page read and write
4E2B000
stack
page read and write
329000
heap
page read and write
640000
trusted library allocation
page execute and read and write
4D0000
trusted library allocation
page execute and read and write
822000
heap
page read and write
1F0000
unkown
page readonly
2600000
heap
page execute and read and write
28FA000
trusted library allocation
page read and write
292D000
trusted library allocation
page read and write
2950000
unkown
page execute and read and write
410C000
stack
page read and write
800000
trusted library allocation
page read and write
1C30000
unkown
page readonly
82D1000
unkown
page read and write
60000
unkown
page readonly
288D000
stack
page read and write
8611000
unkown
page read and write
2BFE000
stack
page read and write
29CF000
unkown
page execute and read and write
255F000
stack
page read and write
4130000
unkown
page read and write
41D0000
unkown
page readonly
2C73000
unkown
page read and write
4D0000
trusted library allocation
page read and write
620000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
410C000
stack
page read and write
22C0000
trusted library allocation
page read and write
660000
trusted library allocation
page read and write
4D7000
trusted library allocation
page read and write
240000
trusted library allocation
page execute and read and write
29C8000
trusted library allocation
page read and write
29AF000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
273F000
stack
page read and write
288D000
stack
page read and write
27A000
unkown
page read and write
6D0000
trusted library allocation
page read and write
87E8000
unkown
page read and write
6D49000
stack
page read and write
1A9000
stack
page read and write
2D0000
unkown
page readonly
640000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
85FD000
unkown
page read and write
44D000
unkown
page read and write
610000
trusted library allocation
page read and write
400000
remote allocation
page read and write
4E0000
trusted library allocation
page read and write
23A0000
trusted library allocation
page execute and read and write
2746000
trusted library allocation
page read and write
78B3000
heap
page read and write
7408000
stack
page read and write
2969000
trusted library allocation
page read and write
740000
trusted library allocation
page read and write
850F000
unkown
page read and write
620000
trusted library allocation
page read and write
640000
trusted library allocation
page read and write
6DDE000
stack
page read and write
2310000
trusted library allocation
page execute and read and write
320000
heap
page read and write
6EC0000
heap
page read and write
5F0000
trusted library allocation
page read and write
B810000
unkown
page read and write
630000
trusted library allocation
page read and write
87E8000
unkown
page read and write
610000
trusted library allocation
page read and write
2898000
stack
page read and write
410000
heap
page read and write
3B10000
unkown
page readonly
2B65000
trusted library allocation
page read and write
26ED000
trusted library allocation
page read and write
1A0000
trusted library allocation
page execute and read and write
34E000
trusted library allocation
page read and write
291C000
trusted library allocation
page read and write
1DD0000
unkown
page readonly
4C0000
trusted library allocation
page read and write
87F9000
unkown
page read and write
340000
trusted library allocation
page read and write
323000
heap
page read and write
2773000
trusted library allocation
page read and write
440000
heap
page read and write
478000
heap
page read and write
5FD000
trusted library allocation
page read and write
27D4000
trusted library allocation
page read and write
8636000
unkown
page read and write
2CB9000
unkown
page read and write
2939000
trusted library allocation
page read and write
110000
unkown
page read and write
82C5000
unkown
page read and write
39C0000
unkown
page read and write
4210000
unkown
page read and write
4158000
unkown
page read and write
8521000
unkown
page read and write
276D000
trusted library allocation
page read and write
22C0000
trusted library allocation
page read and write
2280000
trusted library allocation
page read and write
2E9F000
stack
page read and write
44E0000
unkown
page read and write
410000
unkown
page read and write
6D4B000
stack
page read and write
273F000
trusted library allocation
page read and write
27D6000
trusted library allocation
page read and write
288A000
trusted library allocation
page read and write
44F0000
unkown
page readonly
2540000
trusted library allocation
page read and write
7895000
heap
page read and write
689000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
74BE000
stack
page read and write
8820000
unkown
page read and write
A56F000
stack
page read and write
5F0000
trusted library allocation
page read and write
B490000
unkown
page read and write
7182000
stack
page read and write
6FE3000
heap
page read and write
2CA8000
unkown
page read and write
4385000
unkown
page read and write
4A7000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
12D000
stack
page read and write
6EC0000
heap
page read and write
340000
trusted library allocation
page read and write
2B30000
unkown
page readonly
B490000
unkown
page read and write
27F2000
trusted library allocation
page read and write
4FF0000
heap
page execute and read and write
27F8000
trusted library allocation
page read and write
2A52000
trusted library allocation
page read and write
85AC000
unkown
page read and write
85D2000
unkown
page read and write
830000
trusted library allocation
page read and write
4CDD000
stack
page read and write
1B0000
unkown
page read and write
1D73000
heap
page read and write
5FF000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
4464000
unkown
page read and write
2500000
trusted library allocation
page execute and read and write
87FC000
unkown
page read and write
45A0000
unkown
page readonly
220E000
stack
page read and write
8506000
unkown
page read and write
8602000
unkown
page read and write
2B22000
trusted library allocation
page read and write
2ABA000
trusted library allocation
page read and write
4AB000
trusted library allocation
page read and write
28B0000
unkown
page readonly
2250000
trusted library allocation
page read and write
7660000
stack
page read and write
7230000
heap
page read and write
2460000
trusted library allocation
page read and write
2CB3000
unkown
page read and write
24C0000
trusted library allocation
page read and write
4D8000
trusted library allocation
page read and write
440D000
unkown
page read and write
282E000
trusted library allocation
page read and write
620000
trusted library allocation
page read and write
866C000
unkown
page read and write
3DD000
trusted library allocation
page read and write
2B50000
unkown
page readonly
830000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
723000
trusted library allocation
page read and write
2A25000
trusted library allocation
page read and write
1D20000
unkown
page read and write
4A0000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
A4BC000
stack
page read and write
4070000
unkown
page read and write
4D4000
trusted library allocation
page read and write
8600000
unkown
page read and write
2CAE000
unkown
page read and write
28E7000
trusted library allocation
page read and write
2260000
trusted library allocation
page read and write
2AA9000
trusted library allocation
page read and write
210000
unkown
page readonly
25A0000
trusted library allocation
page read and write
23CF000
stack
page read and write
4620000
unkown
page read and write
2898000
stack
page read and write
670000
trusted library allocation
page read and write
D0000
unkown
page readonly
4E6000
trusted library allocation
page read and write
2B84000
trusted library allocation
page read and write
2600000
unkown
page readonly
28A7000
trusted library allocation
page read and write
7538000
stack
page read and write
4E80000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
6D0000
trusted library allocation
page read and write
2B82000
trusted library allocation
page read and write
2890000
trusted library allocation
page read and write
180000
trusted library allocation
page execute and read and write
8337000
unkown
page read and write
2A54000
trusted library allocation
page read and write
1C30000
unkown
page readonly
379000
trusted library allocation
page read and write
6D0000
trusted library allocation
page read and write
7E40000
heap
page read and write
600000
trusted library allocation
page read and write
2828000
trusted library allocation
page read and write
7F0000
trusted library allocation
page read and write
2D0000
unkown
page readonly
8691000
unkown
page read and write
22A0000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
2FC0000
heap
page read and write
4C10000
heap
page read and write
2BA0000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
44D0000
unkown
page readonly
2B1000
unkown
page read and write
3A70000
unkown
page read and write
335000
heap
page read and write
350000
trusted library allocation
page read and write
25F0000
unkown
page readonly
582000
unkown
page read and write
294A000
trusted library allocation
page read and write
6FC4000
heap
page read and write
1D20000
unkown
page read and write
430000
unclassified section
page execute and read and write
4520000
unkown
page readonly
4138000
unkown
page read and write
4D0000
trusted library allocation
page read and write
2A91000
trusted library allocation
page read and write
335000
heap
page read and write
1690000
heap
page read and write
26C6000
unkown
page read and write
25C000
stack
page read and write
273B000
trusted library allocation
page read and write
22A0000
trusted library allocation
page read and write
300000
trusted library allocation
page read and write
37B000
heap
page read and write
42AE000
stack
page read and write
8926000
unkown
page read and write
44B6000
unkown
page read and write
83A7000
unkown
page read and write
50000
unkown
page readonly
81C000
trusted library allocation
page read and write
4540000
unkown
page readonly
4E0000
trusted library allocation
page read and write
2C2B000
heap
page read and write
27A000
unkown
page read and write
8867000
unkown
page read and write
3A60000
unkown
page read and write
4C10000
heap
page read and write
2600000
unkown
page readonly
582000
unkown
page read and write
7F0000
trusted library allocation
page read and write
2CA5000
unkown
page read and write
8605000
unkown
page read and write
329000
heap
page read and write
27A000
unkown
page read and write
650000
trusted library allocation
page read and write
7E40000
heap
page read and write
285F000
trusted library allocation
page read and write
4A0000
trusted library allocation
page read and write
378000
trusted library allocation
page read and write
22B0000
trusted library allocation
page read and write
4510000
unkown
page execute and read and write
A0000
trusted library allocation
page read and write
8900000
unkown
page read and write
4220000
unkown
page readonly
29B9000
trusted library allocation
page read and write
6CE000
stack
page read and write
4D0000
trusted library allocation
page read and write
576000
unkown
page read and write
370000
trusted library allocation
page read and write
26EF000
trusted library allocation
page read and write
2726000
trusted library allocation
page read and write
2786000
trusted library allocation
page read and write
2818000
trusted library allocation
page read and write
29EF000
trusted library allocation
page read and write
2FC0000
heap
page read and write
373000
trusted library allocation
page read and write
110000
unkown
page read and write
4D0000
trusted library allocation
page read and write
370000
system
page execute and read and write
620000
trusted library allocation
page read and write
330000
trusted library allocation
page read and write
44E0000
unkown
page read and write
450000
unkown
page read and write
B0000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
4550000
unkown
page readonly
4338000
unkown
page read and write
2317000
trusted library allocation
page execute and read and write
B485000
heap
page read and write
2CAE000
unkown
page read and write
210000
heap
page read and write
4E0000
trusted library allocation
page read and write
10000
heap
page read and write
2A1000
unkown
page read and write
82CC000
unkown
page read and write
36E000
stack
page read and write
2826000
trusted library allocation
page read and write
573000
unkown
page read and write
4302000
unkown
page read and write
2CAB000
unkown
page read and write
45A0000
unkown
page readonly
670000
trusted library allocation
page read and write
4D4000
trusted library allocation
page read and write
885B000
unkown
page read and write
3A4000
heap
page read and write
4AF000
trusted library allocation
page read and write
670000
trusted library allocation
page read and write
9F1000
trusted library allocation
page read and write
2A8C000
trusted library allocation
page read and write
579000
heap
page read and write
29B3000
trusted library allocation
page read and write
6750000
unkown
page read and write
8807000
unkown
page read and write
44CE000
unkown
page read and write
670000
trusted library allocation
page read and write
8582000
unkown
page read and write
7189000
stack
page read and write
860000
trusted library allocation
page read and write
220000
unkown
page read and write
866C000
unkown
page read and write
766B000
stack
page read and write
766B000
stack
page read and write
4DB000
trusted library allocation
page read and write
87E8000
unkown
page read and write
2B20000
unkown
page read and write
4E0000
trusted library allocation
page read and write
2967000
trusted library allocation
page read and write
B710000
unkown
page read and write
860000
trusted library allocation
page read and write
2F0F000
stack
page read and write
B6F000
stack
page read and write
2442000
heap
page read and write
2729000
trusted library allocation
page read and write
2A0C000
trusted library allocation
page read and write
785E000
stack
page read and write
3CF7000
unkown
page readonly
25F0000
trusted library allocation
page read and write
D0000
unkown
page readonly
44D0000
unkown
page readonly
310000
heap
page read and write
2B7E000
trusted library allocation
page read and write
2B5F000
trusted library allocation
page read and write
41E0000
unkown
page read and write
366000
trusted library allocation
page read and write
8858000
unkown
page read and write
2A75000
trusted library allocation
page read and write
6E4E000
stack
page read and write
2B30000
unkown
page readonly
4B0000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
3AF0000
unkown
page read and write
2600000
unkown
page readonly
2CA2000
unkown
page read and write
8C0000
trusted library allocation
page read and write
2A5A000
trusted library allocation
page read and write
8807000
unkown
page read and write
2B3B000
trusted library allocation
page read and write
1D50000
heap
page read and write
8669000
unkown
page read and write
170000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
317000
heap
page read and write
4A0000
trusted library allocation
page read and write
4EEC000
stack
page read and write
2CA5000
unkown
page read and write
300000
trusted library allocation
page read and write
8371000
unkown
page read and write
7187000
stack
page read and write
288E000
trusted library allocation
page read and write
8636000
unkown
page read and write
820000
trusted library allocation
page read and write
4CDD000
stack
page read and write
82FD000
unkown
page read and write
290000
unkown
page readonly
2570000
trusted library allocation
page read and write
2704000
trusted library allocation
page read and write
223F000
stack
page read and write
8805000
unkown
page read and write
820000
trusted library allocation
page read and write
6F3F000
stack
page read and write
8602000
unkown
page read and write
4484000
unkown
page read and write
190000
trusted library allocation
page read and write
734000
trusted library allocation
page read and write
29F2000
trusted library allocation
page read and write
29BB000
trusted library allocation
page read and write
7EFE0000
unkown
page readonly
8569000
unkown
page read and write
886A000
unkown
page read and write
8611000
unkown
page read and write
2894000
trusted library allocation
page read and write
84D2000
unkown
page read and write
79FA000
heap
page read and write
29B5000
trusted library allocation
page read and write
6F3F000
stack
page read and write
2A02000
trusted library allocation
page read and write
232F000
stack
page read and write
4E0000
trusted library allocation
page execute and read and write
660000
trusted library allocation
page read and write
2FCE000
heap
page read and write
370000
trusted library allocation
page read and write
2F9E000
stack
page read and write
29CC000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
4138000
unkown
page read and write
84EE000
unkown
page read and write
3F10000
unkown
page read and write
660000
trusted library allocation
page read and write
587000
unkown
page read and write
4E9000
trusted library allocation
page read and write
2C0F000
unclassified section
page read and write
370000
trusted library allocation
page read and write
8602000
unkown
page read and write
434F000
unkown
page read and write
6F4A000
stack
page read and write
4158000
unkown
page read and write
60000
unkown
page readonly
1D73000
heap
page read and write
2B7A000
trusted library allocation
page read and write
37C000
heap
page read and write
586000
heap
page read and write
B87000
trusted library allocation
page execute and read and write
340000
trusted library allocation
page read and write
57B000
unkown
page read and write
4050000
unkown
page read and write
506000
unkown
page read and write
2550000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
82CC000
unkown
page read and write
60000
unkown
page readonly
2CA0000
unkown
page read and write
88FD000
unkown
page read and write
2A73000
trusted library allocation
page read and write
50000
unkown
page readonly
4DB000
trusted library allocation
page read and write
860E000
unkown
page read and write
2BFE000
stack
page read and write
79F0000
heap
page read and write
88FA000
unkown
page read and write
790000
trusted library allocation
page read and write
46CC000
stack
page read and write
2B48000
trusted library allocation
page read and write
8558000
unkown
page read and write
39E0000
heap
page read and write
2424000
heap
page read and write
3FD0000
unkown
page read and write
2B9A000
trusted library allocation
page read and write
26C2000
trusted library allocation
page read and write
8926000
unkown
page read and write
360000
trusted library allocation
page read and write
7C0000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
2B80000
trusted library allocation
page read and write
417000
heap
page read and write
8600000
unkown
page read and write
A22000
unkown
page execute and write copy
7538000
stack
page read and write
D04000
trusted library allocation
page execute and read and write
3FF0000
unkown
page read and write
434F000
unkown
page read and write
87FC000
unkown
page read and write
8617000
unkown
page read and write
256000
unkown
page read and write
2809000
trusted library allocation
page read and write
886D000
unkown
page read and write
4070000
unkown
page read and write
448C000
unkown
page read and write
3B6000
heap
page read and write
63A000
trusted library allocation
page read and write
30000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
2270000
trusted library allocation
page read and write
4560000
unkown
page readonly
960000
heap
page read and write
620000
trusted library allocation
page read and write
630000
trusted library allocation
page read and write
2CBC000
unkown
page read and write
42E000
unkown
page read and write
4457000
unkown
page read and write
39D0000
unkown
page read and write
4B0000
trusted library allocation
page read and write
25B0000
trusted library allocation
page read and write
50000
unkown
page readonly
2F1B000
stack
page read and write
434F000
unkown
page read and write
27F4000
trusted library allocation
page read and write
2863000
trusted library allocation
page read and write
720000
trusted library allocation
page read and write
3FAF000
stack
page read and write
3A93000
unkown
page read and write
4302000
unkown
page read and write
6E4E000
stack
page read and write
44CE000
unkown
page read and write
6D49000
stack
page read and write
6C78000
stack
page read and write
44D000
unkown
page read and write
42D0000
unkown
page read and write
23E0000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
29B000
stack
page read and write
186000
trusted library allocation
page execute and read and write
28B0000
unkown
page readonly
320000
trusted library allocation
page execute and read and write
600000
trusted library allocation
page read and write
300000
heap
page read and write
282A000
trusted library allocation
page read and write
883B000
unkown
page read and write
8337000
unkown
page read and write
289A000
trusted library allocation
page read and write
2750000
trusted library allocation
page read and write
4070000
unkown
page read and write
740000
trusted library allocation
page read and write
D01000
trusted library allocation
page execute and read and write
1D55000
heap
page read and write
4560000
unkown
page readonly
2250000
trusted library allocation
page read and write
2CAE000
unkown
page read and write
25F0000
unkown
page readonly
620000
trusted library allocation
page read and write
8575000
unkown
page read and write
2494000
trusted library allocation
page execute and read and write
2874000
trusted library allocation
page read and write
440D000
unkown
page read and write
83A7000
unkown
page read and write
2B9C000
trusted library allocation
page read and write
56E000
heap
page read and write
8802000
unkown
page read and write
7F0000
trusted library allocation
page read and write
2C21000
unkown
page read and write
36F000
heap
page read and write
4B4000
trusted library allocation
page read and write
There are 2253 hidden memdumps, click here to show them.