IOC Report
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.2764.rtf

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.2764.rtf
Rich Text Format data, version 1, unknown character set
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Client.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Client.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{5A3C8D88-A016-4151-9911-DB6F195FA0DD}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\F79DE4CE-3D38-4A51-B300-A0A52CA0A936
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{C94F2438-4712-4EDB-BA13-F546C0F4C19F}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{D3E63778-DEB8-4D19-866C-1D5344BC51ED}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.2764.rtf.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:46 2022, mtime=Tue Aug 9 00:52:12 2022, atime=Tue Aug 9 00:52:07 2022, length=2920194, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\~$curiteInfo.com.Exploit.Rtf.Obfuscated.32.2764.rtf
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A951AE7E-D2D4-47F1-B4B4-2F2B249A12BF}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E3A4F74B-8D8B-4273-8507-885596050B2F}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.2764.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Aug 9 00:41:01 2022, mtime=Tue Aug 9 00:41:01 2022, atime=Tue Aug 9 00:41:11 2022, length=2920194, window=hide
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Windows\SysWOW64\cmd.exe
CmD.exe /C %tmp%\Client.exe A C
malicious
C:\Users\user\AppData\Local\Temp\Client.exe
C:\Users\user\AppData\Local\Temp\Client.exe A C
malicious
C:\Windows\SysWOW64\notepad.exe
C:\Windows\SysWOW64\notepad.exe /Processid:{E9404046-8D8A-4DD0-8368-370A12D9C21C}
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\SysWOW64\colorcpl.exe
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\SysWOW64\notepad.exe"
malicious
C:\Windows\explorer.exe
"C:\Windows\explorer.exe"
malicious
C:\Windows\SysWOW64\autochk.exe
C:\Windows\SysWOW64\autochk.exe
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
www.kambilemuntupan.space/sy31/
malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://my.microsoftpersonalcontent.com
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
https://api.powerbi.com/beta/myorg/imports
unknown
https://devnull.onenote.com
unknown
https://messaging.action.office.com/
unknown
https://ncus.pagecontentsync.
unknown
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
unknown
https://messaging.office.com/
unknown
https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
http://www.windows.com/pctv.
unknown
http://investor.msn.com
unknown
http://www.msnbc.com/news/ticker.txt
unknown
http://wellformedweb.org/CommentAPI/
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/cclean
unknown
http://www.iis.fhg.de/audioPA
unknown
http://www.piriform.com/ccleanerq
unknown
http://www.piriform.com/ccleaner1SPS0
unknown
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
unknown
http://www.hotmail.com/oe
unknown
http://treyresearch.net
unknown
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
unknown
http://java.sun.com
unknown
http://www.icra.org/vocabulary/.
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
http://www.piriform.com/ccleanerL
unknown
http://investor.msn.com/
unknown
http://www.piriform.com/ccleaner
unknown
http://computername/printers/printername/.printer
unknown
http://www.%s.comPA
unknown
http://www.autoitscript.com/autoit3
unknown
https://support.mozilla.org
unknown
http://www.piriform.com/ccleanerv
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://servername/isapibackend.dll
unknown
There are 117 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
ml9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
nl9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
;o9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
+t9
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\packager.dll,-2000
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\1CEF4
1CEF4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\247BE
247BE
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\247BE
247BE
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
(&+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
0'+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
!*+
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@%SystemRoot%\system32\packager.dll,-2000
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\67CFC
67CFC
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6F1CE
6F1CE
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6F1CE
6F1CE
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
Zoom
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
CustomZoom
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
ShowAll
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
Version
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
ForceOpen
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
ToolbarDocked
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
ToolbarShown
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
ToolbarDockPos
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\General
MTUpgradeDialog
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Sizes
Full
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Sizes
Script
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Sizes
ScriptScript
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Sizes
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Sizes
SubSymbol
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
LineSpacing
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
MatrixRowSpacing
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
MatrixColSpacing
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
SuperscriptHeight
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
SubscriptDepth
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
LimHeight
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
LimDepth
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
LimLineSpacing
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
NumerHeight
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
DenomDepth
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
FractBarOver
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
FractBarThick
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
SubFractBarThick
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
FenceOver
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
SpacingFactor
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
MinGap
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
RadicalGap
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
EmbellGap
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Spacing
PrimeHeight
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Text
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Function
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Variable
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
LCGreek
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
UCGreek
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Vector
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
Number
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
User1
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Fonts
User2
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Windows
EquationWindow
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Windows
SpacingWindow
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Windows
TextLanguage
HKEY_CURRENT_USER\Software\Microsoft\Equation Editor\3.0\Options\Windows
MathLanguage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{8a07945e-cd11-11ea-a1d0-806e6f6e6963}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{8049f197-1016-11e7-b87b-806e6f6e6963}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{8049f198-1016-11e7-b87b-806e6f6e6963}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage2
ProgramsCache
There are 435 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C853FDA000
heap
page read and write
2C853DCA000
heap
page read and write
2A3B3002000
heap
page read and write
1841068E000
heap
page read and write
4128AFF000
stack
page read and write
29DF8E00000
heap
page read and write
205C9821000
heap
page read and write
2C853D2B000
heap
page read and write
8BD947F000
stack
page read and write
179E5F02000
heap
page read and write
2C84E94C000
heap
page read and write
205C9386000
heap
page read and write
2C853E9A000
heap
page read and write
2C853E6E000
heap
page read and write
179E5D10000
heap
page read and write
16998FE000
stack
page read and write
2C853F80000
heap
page read and write
2C853C38000
heap
page read and write
2C853C5B000
heap
page read and write
2C853C26000
heap
page read and write
2C853D9B000
heap
page read and write
205C8B13000
heap
page read and write
9E3437F000
stack
page read and write
2C853C55000
heap
page read and write
2C853F3F000
heap
page read and write
179E5E67000
heap
page read and write
18415CD6000
heap
page read and write
2C853FDA000
heap
page read and write
2C853760000
trusted library allocation
page read and write
2C853D17000
heap
page read and write
2C853E90000
heap
page read and write
1953D7C000
stack
page read and write
2C853F7C000
heap
page read and write
2C853D17000
heap
page read and write
18129A50000
heap
page read and write
F2F59FD000
stack
page read and write
2A3B303C000
heap
page read and write
205C937F000
heap
page read and write
2C84E9CD000
heap
page read and write
2C853D93000
heap
page read and write
2C853D58000
heap
page read and write
2C84E95C000
heap
page read and write
25DFF2E0000
heap
page read and write
9E33F4E000
stack
page read and write
AE1A27F000
stack
page read and write
2C853C38000
heap
page read and write
18415CEC000
heap
page read and write
2C853C34000
heap
page read and write
2C853EA0000
heap
page read and write
2C853C61000
heap
page read and write
2C853EB9000
heap
page read and write
180F0A00000
heap
page read and write
2C8536EE000
trusted library allocation
page read and write
2C853DAD000
heap
page read and write
205C937C000
heap
page read and write
2C8536FE000
trusted library allocation
page read and write
2C853C69000
heap
page read and write
2C853F79000
heap
page read and write
2C853D1B000
heap
page read and write
2C853854000
trusted library allocation
page read and write
18415F00000
remote allocation
page read and write
18129BC0000
trusted library allocation
page read and write
2C853D13000
heap
page read and write
EC32D7F000
stack
page read and write
2C853840000
trusted library allocation
page read and write
23583150000
heap
page read and write
179E5E56000
heap
page read and write
2C853EF7000
heap
page read and write
F2F507F000
stack
page read and write
18410E15000
heap
page read and write
2C853700000
trusted library allocation
page read and write
16993FB000
stack
page read and write
18410DD0000
trusted library section
page readonly
2C853D07000
heap
page read and write
18129C7B000
heap
page read and write
205C939B000
heap
page read and write
2C853FBE000
heap
page read and write
8BD95FD000
stack
page read and write
2C853E7E000
heap
page read and write
2A3B3041000
heap
page read and write
18410E02000
heap
page read and write
2C853C2D000
heap
page read and write
2C84DE3D000
heap
page read and write
6B10DCE000
stack
page read and write
2C853DA4000
heap
page read and write
2C853C38000
heap
page read and write
F2F527E000
stack
page read and write
205C8B08000
heap
page read and write
2C853EE5000
heap
page read and write
2C853E35000
heap
page read and write
2C853E6E000
heap
page read and write
2C853D1B000
heap
page read and write
18129C52000
heap
page read and write
180F0C13000
heap
page read and write
2C853890000
trusted library allocation
page read and write
2C853C61000
heap
page read and write
2C853980000
trusted library allocation
page read and write
2C853A73000
trusted library allocation
page read and write
2C853F08000
heap
page read and write
2C853C61000
heap
page read and write
2C84E72B000
heap
page read and write
2C853FDA000
heap
page read and write
18415C3D000
heap
page read and write
2C8536E0000
trusted library allocation
page read and write
2C853F51000
heap
page read and write
2A3B3102000
heap
page read and write
2C853C34000
heap
page read and write
2C853745000
trusted library allocation
page read and write
205C9802000
heap
page read and write
2C84DE13000
heap
page read and write
2C853E6E000
heap
page read and write
25DFF47D000
heap
page read and write
2C853F9E000
heap
page read and write
2C853D36000
heap
page read and write
205C8A29000
heap
page read and write
180F0C22000
heap
page read and write
205C8AC0000
heap
page read and write
2C853F50000
heap
page read and write
2C84E995000
heap
page read and write
2C853EC3000
heap
page read and write
179E5E39000
heap
page read and write
2C8536F0000
trusted library allocation
page read and write
2C8536EE000
trusted library allocation
page read and write
179E5E2D000
heap
page read and write
2C853E5E000
heap
page read and write
2C84E800000
heap
page read and write
2C853C43000
heap
page read and write
2C853E6E000
heap
page read and write
205C9844000
heap
page read and write
2C853D74000
heap
page read and write
2C853C61000
heap
page read and write
2C853D42000
heap
page read and write
18129D08000
heap
page read and write
18415BE4000
trusted library allocation
page read and write
2A3B304A000
heap
page read and write
2C853FDA000
heap
page read and write
205C9381000
heap
page read and write
205C91E0000
remote allocation
page read and write
6B11377000
stack
page read and write
29DF8E56000
heap
page read and write
179E5E46000
heap
page read and write
205C938E000
heap
page read and write
1953E7B000
stack
page read and write
2C853C61000
heap
page read and write
AE1A07E000
stack
page read and write
2C853EFD000
heap
page read and write
2C853C34000
heap
page read and write
2C853C2F000
heap
page read and write
205C8AAE000
heap
page read and write
2C84E76F000
heap
page read and write
2C853DF8000
heap
page read and write
2C853D96000
heap
page read and write
2C853D6D000
heap
page read and write
179E5E50000
heap
page read and write
2C853D19000
heap
page read and write
2C853D2C000
heap
page read and write
205C9317000
heap
page read and write
2C853F1D000
heap
page read and write
2C8536C0000
trusted library allocation
page read and write
2C853D6F000
heap
page read and write
2C84E9AC000
heap
page read and write
29DF8E3C000
heap
page read and write
2C853EE2000
heap
page read and write
18415C63000
heap
page read and write
2A3B3000000
heap
page read and write
2C853C02000
heap
page read and write
2C8536F2000
trusted library allocation
page read and write
179E5E6B000
heap
page read and write
18129C87000
heap
page read and write
2C84E9EA000
heap
page read and write
2C853E7E000
heap
page read and write
2C8536EC000
trusted library allocation
page read and write
205C9202000
heap
page read and write
2C853E6E000
heap
page read and write
2C853D93000
heap
page read and write
2C853F6F000
heap
page read and write
2C8536F2000
trusted library allocation
page read and write
2C853E7E000
heap
page read and write
2C853DF8000
heap
page read and write
205C9374000
heap
page read and write
2C853D1B000
heap
page read and write
18415CE6000
heap
page read and write
205C8A4A000
heap
page read and write
18411101000
trusted library allocation
page read and write
25DFF453000
heap
page read and write
18129AC0000
heap
page read and write
23583263000
heap
page read and write
2C853930000
trusted library allocation
page read and write
18410702000
heap
page read and write
1BB0D22A000
heap
page read and write
2C853A70000
trusted library allocation
page read and write
2C853E8F000
heap
page read and write
2C853DA6000
heap
page read and write
2C853D5F000
heap
page read and write
2C84DC40000
heap
page read and write
87521FC000
stack
page read and write
18129C61000
heap
page read and write
2C853EBC000
heap
page read and write
F2F49FA000
stack
page read and write
2850D3A0000
heap
page read and write
2C8536C0000
trusted library allocation
page read and write
2C853DB4000
heap
page read and write
6B1157F000
stack
page read and write
2C8535B0000
trusted library allocation
page read and write
2C853C61000
heap
page read and write
8BD937F000
stack
page read and write
2C85372A000
trusted library allocation
page read and write
2C853D9A000
heap
page read and write
2C853ED4000
heap
page read and write
2850D3B0000
heap
page read and write
2C85372A000
trusted library allocation
page read and write
29DF8C30000
heap
page read and write
205C8A33000
heap
page read and write
AE19AEB000
stack
page read and write
2C853F3D000
heap
page read and write
2850D676000
heap
page read and write
18410DF0000
trusted library allocation
page read and write
205C938B000
heap
page read and write
2C853C34000
heap
page read and write
683AA7B000
stack
page read and write
205C8A34000
heap
page read and write
2C853F35000
heap
page read and write
2C853F2E000
heap
page read and write
2C853FC4000
heap
page read and write
2C853C55000
heap
page read and write
2C853EFA000
heap
page read and write
2C853D2D000
heap
page read and write
18415A90000
trusted library allocation
page read and write
2C853D16000
heap
page read and write
2C853EA5000
heap
page read and write
2C85385C000
trusted library allocation
page read and write
2C853E6E000
heap
page read and write
2C8536FC000
trusted library allocation
page read and write
205C9379000
heap
page read and write
2C853E55000
heap
page read and write
2C853F83000
heap
page read and write
2C84DE29000
heap
page read and write
2850D600000
heap
page read and write
2C85385C000
trusted library allocation
page read and write
18410629000
heap
page read and write
4128BFE000
stack
page read and write
5465EFE000
stack
page read and write
2C853C26000
heap
page read and write
2C853F15000
heap
page read and write
205C9802000
heap
page read and write
2C853E94000
heap
page read and write
18129C29000
heap
page read and write
2C84E7B2000
heap
page read and write
1921BC3C000
heap
page read and write
1BB0D313000
heap
page read and write
1BB0D080000
heap
page read and write
D91BEFB000
stack
page read and write
2C853B40000
trusted library allocation
page read and write
2C853F6F000
heap
page read and write
2C84F4D0000
trusted library section
page readonly
2C8536F4000
trusted library allocation
page read and write
18415BAE000
trusted library allocation
page read and write
2A3B302E000
heap
page read and write
2C8536F4000
trusted library allocation
page read and write
4128D7E000
stack
page read and write
18417000000
heap
page read and write
2C853C2D000
heap
page read and write
2C853D20000
heap
page read and write
2C853790000
remote allocation
page read and write
205C8A55000
heap
page read and write
2C84DE95000
heap
page read and write
2C853E11000
heap
page read and write
2C853854000
trusted library allocation
page read and write
2C84F4C0000
trusted library section
page readonly
205C9389000
heap
page read and write
2C853F31000
heap
page read and write
2C853D62000
heap
page read and write
2C853DB4000
heap
page read and write
2C84E9C9000
heap
page read and write
2C853850000
trusted library allocation
page read and write
2C853850000
trusted library allocation
page read and write
23583265000
heap
page read and write
2C84F501000
trusted library allocation
page read and write
1921C260000
remote allocation
page read and write
1812A402000
trusted library allocation
page read and write
2C853E98000
heap
page read and write
2C85385C000
trusted library allocation
page read and write
2C84E7CF000
heap
page read and write
2C853FC2000
heap
page read and write
2C853EA4000
heap
page read and write
2C853C26000
heap
page read and write
2C853E73000
heap
page read and write
184104D0000
heap
page read and write
6B1107E000
stack
page read and write
2C853D93000
heap
page read and write
179E5E32000
heap
page read and write
2C853EA9000
heap
page read and write
2C853E6E000
heap
page read and write
EC32B7F000
stack
page read and write
F2F55F5000
stack
page read and write
2C84E723000
heap
page read and write
2C853C48000
heap
page read and write
180F0C58000
heap
page read and write
2C853C61000
heap
page read and write
5465CFE000
stack
page read and write
2C8536F0000
trusted library allocation
page read and write
F2F4F7E000
stack
page read and write
18415BE0000
trusted library allocation
page read and write
179E5E47000
heap
page read and write
2C853960000
trusted library allocation
page read and write
180F0C69000
heap
page read and write
2C853FCA000
heap
page read and write
2C853520000
trusted library allocation
page read and write
2C853F1F000
heap
page read and write
2850D658000
heap
page read and write
2C853E98000
heap
page read and write
18129C7C000
heap
page read and write
2C8536F6000
trusted library allocation
page read and write
2C853C2F000
heap
page read and write
180F1402000
trusted library allocation
page read and write
2C8536FC000
trusted library allocation
page read and write
179E5CB0000
heap
page read and write
2850D63D000
heap
page read and write
179E5E6A000
heap
page read and write
179E5E3D000
heap
page read and write
205C93D3000
heap
page read and write
2C853E89000
heap
page read and write
2C853D1B000
heap
page read and write
2C84E615000
heap
page read and write
2C853FDA000
heap
page read and write
2C84F4A0000
trusted library section
page readonly
2C853DC4000
heap
page read and write
2C8536E0000
trusted library allocation
page read and write
18415EB0000
trusted library allocation
page read and write
2C853F69000
heap
page read and write
184106FE000
heap
page read and write
205C93CF000
heap
page read and write
2358322D000
heap
page read and write
2C84F180000
trusted library allocation
page read and write
2C853F69000
heap
page read and write
2C853C69000
heap
page read and write
2C853D40000
heap
page read and write
875207F000
stack
page read and write
18410675000
heap
page read and write
F2F4FFF000
stack
page read and write
205C9386000
heap
page read and write
8751F78000
stack
page read and write
2C854010000
heap
page read and write
F2F53FB000
stack
page read and write
179E5E4B000
heap
page read and write
5465FFE000
stack
page read and write
2C853D3E000
heap
page read and write
2C853C00000
heap
page read and write
179E5E29000
heap
page read and write
18129C5E000
heap
page read and write
2C853F69000
heap
page read and write
2C853F18000
heap
page read and write
2C85385C000
trusted library allocation
page read and write
2C853D98000
heap
page read and write
2C853FA3000
heap
page read and write
2C853F6F000
heap
page read and write
2C853D17000
heap
page read and write
9E3427C000
stack
page read and write
2850D613000
heap
page read and write
2C853D62000
heap
page read and write
18415BC0000
trusted library allocation
page read and write
2C853C26000
heap
page read and write
2C853D35000
heap
page read and write
8751D77000
stack
page read and write
4128C7E000
stack
page read and write
25DFF340000
heap
page read and write
2C853C69000
heap
page read and write
2C853D62000
heap
page read and write
2C853702000
trusted library allocation
page read and write
1921BC2A000
heap
page read and write
29DF8E13000
heap
page read and write
205C9319000
heap
page read and write
205C93A4000
heap
page read and write
2C853C55000
heap
page read and write
2C853D95000
heap
page read and write
F2F4C79000
stack
page read and write
205C8A8B000
heap
page read and write
2C84DE70000
heap
page read and write
2C8536E5000
trusted library allocation
page read and write
18410600000
heap
page read and write
2C853F0F000
heap
page read and write
2C853EB9000
heap
page read and write
2C853DB4000
heap
page read and write
2C84DDD0000
trusted library allocation
page read and write
205C9800000
heap
page read and write
29DF8E7D000
heap
page read and write
1921BAD0000
heap
page read and write
2C853910000
trusted library allocation
page read and write
2C84E9A9000
heap
page read and write
8BD94FC000
stack
page read and write
2C853C2D000
heap
page read and write
2C853F13000
heap
page read and write
2C84E7CA000
heap
page read and write
2C84E9F5000
heap
page read and write
235834A0000
heap
page read and write
1BB0D213000
heap
page read and write
2C8536FE000
trusted library allocation
page read and write
2C853F8A000
heap
page read and write
1921BC5C000
heap
page read and write
1BB0DA02000
heap
page read and write
2C853C34000
heap
page read and write
184105E1000
trusted library allocation
page read and write
9E33FCF000
stack
page read and write
205C9371000
heap
page read and write
29DF8F13000
heap
page read and write
2C853C56000
heap
page read and write
25DFF44B000
heap
page read and write
2C853EE9000
heap
page read and write
2C853C26000
heap
page read and write
F2F487E000
stack
page read and write
2C853F56000
heap
page read and write
2A3B3013000
heap
page read and write
8751B7E000
stack
page read and write
D91BDFC000
stack
page read and write
2C853D59000
heap
page read and write
2C84E7F6000
heap
page read and write
205C8A53000
heap
page read and write
2C853D05000
heap
page read and write
87520FE000
unkown
page read and write
2C853D3B000
heap
page read and write
2C853EF9000
heap
page read and write
18410E00000
heap
page read and write
179E5E77000
heap
page read and write
2C853F92000
heap
page read and write
2C853D48000
heap
page read and write
2C853D17000
heap
page read and write
205C8AC9000
heap
page read and write
18415BD0000
trusted library allocation
page read and write
18129A60000
heap
page read and write
2C84E975000
heap
page read and write
179E5E65000
heap
page read and write
184106AF000
heap
page read and write
29DF9602000
trusted library allocation
page read and write
25DFF456000
heap
page read and write
2358322B000
heap
page read and write
25DFF508000
heap
page read and write
18415EC0000
trusted library allocation
page read and write
EC3257B000
stack
page read and write
2C853F43000
heap
page read and write
2C853DD5000
heap
page read and write
1953C7E000
stack
page read and write
2C853E80000
heap
page read and write
205C937D000
heap
page read and write
2C853C3C000
heap
page read and write
8BD8DBB000
stack
page read and write
2358325D000
heap
page read and write
205C9381000
heap
page read and write
25DFF370000
trusted library allocation
page read and write
2C853840000
trusted library allocation
page read and write
18415C4A000
heap
page read and write
2C853D5F000
heap
page read and write
2C853830000
trusted library allocation
page read and write
2C853C62000
heap
page read and write
2C853D3A000
heap
page read and write
2C853EE0000
heap
page read and write
2C853C2F000
heap
page read and write
205C8A81000
heap
page read and write
2C84E98D000
heap
page read and write
25DFF43C000
heap
page read and write
2C853EB9000
heap
page read and write
2C853D61000
heap
page read and write
2C853EB9000
heap
page read and write
2C853E96000
heap
page read and write
1BB0D245000
heap
page read and write
2C853FA5000
heap
page read and write
195417E000
stack
page read and write
EC3297D000
stack
page read and write
2C84E94E000
heap
page read and write
2C84E9BF000
heap
page read and write
2C853F95000
heap
page read and write
2C853F60000
heap
page read and write
2C853E00000
heap
page read and write
205C8AFB000
heap
page read and write
205C8A3C000
heap
page read and write
1921BA60000
heap
page read and write
8BD967B000
stack
page read and write
2C853EAA000
heap
page read and write
2C853DB1000
heap
page read and write
179E5E7E000
heap
page read and write
2C853FDA000
heap
page read and write
2850DC02000
trusted library allocation
page read and write
2C853D58000
heap
page read and write
205C9382000
heap
page read and write
9E33ECA000
stack
page read and write
2C84DFC2000
heap
page read and write
F2F4D7A000
stack
page read and write
2C853F5E000
heap
page read and write
2C84DE5C000
heap
page read and write
6B1127B000
stack
page read and write
2C853D93000
heap
page read and write
1921BC13000
heap
page read and write
2A3B3039000
heap
page read and write
2C853C69000
heap
page read and write
18415BA8000
trusted library allocation
page read and write
2C84E989000
heap
page read and write
2C853C69000
heap
page read and write
18415C00000
heap
page read and write
29DF8F08000
heap
page read and write
2C8536F8000
trusted library allocation
page read and write
6B1147E000
stack
page read and write
2C853D72000
heap
page read and write
205C9380000
heap
page read and write
2C853C50000
heap
page read and write
205C8B16000
heap
page read and write
2C853E7E000
heap
page read and write
2C853854000
trusted library allocation
page read and write
180F0D13000
heap
page read and write
25DFF413000
heap
page read and write
205C9392000
heap
page read and write
683AD7F000
stack
page read and write
2C853D5B000
heap
page read and write
F2F4E7A000
stack
page read and write
179E5E45000
heap
page read and write
2C84E702000
heap
page read and write
18129D13000
heap
page read and write
2C853EB9000
heap
page read and write
2C853F6F000
heap
page read and write
41290FD000
stack
page read and write
18415CF2000
heap
page read and write
2C853702000
trusted library allocation
page read and write
F2F57FE000
stack
page read and write
2C853D6B000
heap
page read and write
205C9386000
heap
page read and write
18410F18000
heap
page read and write
2C853EA7000
heap
page read and write
2C853D09000
heap
page read and write
2C853D23000
heap
page read and write
205C937F000
heap
page read and write
1BB0D2CB000
heap
page read and write
2C853EBB000
heap
page read and write
1921C260000
remote allocation
page read and write
29DF8E02000
heap
page read and write
2C853F98000
heap
page read and write
2C853F2B000
heap
page read and write
2C853D03000
heap
page read and write
179E5E63000
heap
page read and write
205C939C000
heap
page read and write
54661FF000
stack
page read and write
18410F02000
heap
page read and write
2C853FE2000
heap
page read and write
1BB0D2E0000
heap
page read and write
29DF8F02000
heap
page read and write
2C853C69000
heap
page read and write
2C853745000
trusted library allocation
page read and write
2C853F4D000
heap
page read and write
2C853E6E000
heap
page read and write
2C853D1F000
heap
page read and write
2C853EA3000
heap
page read and write
205C8AA4000
heap
page read and write
25DFF500000
heap
page read and write
205C91E0000
remote allocation
page read and write
2C853C39000
heap
page read and write
179E6470000
trusted library allocation
page read and write
5465D7E000
stack
page read and write
8BD9A7F000
stack
page read and write
2C853C2F000
heap
page read and write
2C853C26000
heap
page read and write
205C93AB000
heap
page read and write
18415C74000
heap
page read and write
2C853F41000
heap
page read and write
18415C77000
heap
page read and write
2C84E9EC000
heap
page read and write
1BB0D2BA000
heap
page read and write
2C853DAF000
heap
page read and write
18129D00000
heap
page read and write
180F0C7B000
heap
page read and write
23583000000
heap
page read and write
2C8536DC000
trusted library allocation
page read and write
2C853C61000
heap
page read and write
2C853F5E000
heap
page read and write
2C853D14000
heap
page read and write
2C8538E0000
trusted library allocation
page read and write
23583247000
heap
page read and write
2C85385C000
trusted library allocation
page read and write
2C853D22000
heap
page read and write
25DFF502000
heap
page read and write
2C853D40000
heap
page read and write
23583244000
heap
page read and write
184104E0000
heap
page read and write
2850D410000
heap
page read and write
2C853F48000
heap
page read and write
2C84E758000
heap
page read and write
18410DB0000
trusted library section
page readonly
1921BC00000
heap
page read and write
2C84F4E0000
trusted library section
page readonly
D91C1FE000
stack
page read and write
4128E7D000
stack
page read and write
2C8536F8000
trusted library allocation
page read and write
2C84DE8D000
heap
page read and write
2C853EBD000
heap
page read and write
29DF8E8B000
heap
page read and write
2C853D0F000
heap
page read and write
18129C00000
heap
page read and write
2C853D71000
heap
page read and write
2C853FDA000
heap
page read and write
2C84F4B0000
trusted library section
page readonly
2850D602000
heap
page read and write
18410580000
trusted library section
page read and write
2C84E81B000
heap
page read and write
16994FE000
stack
page read and write
2C853840000
trusted library allocation
page read and write
2C853C34000
heap
page read and write
2C84DE92000
heap
page read and write
2C853810000
trusted library allocation
page read and write
2C853FDA000
heap
page read and write
205C936F000
heap
page read and write
2C853700000
trusted library allocation
page read and write
2C853FDA000
heap
page read and write
2C853FC6000
heap
page read and write
2C84E9D0000
heap
page read and write
6B1117C000
stack
page read and write
2C8536EC000
trusted library allocation
page read and write
2C853D93000
heap
page read and write
2C853D02000
heap
page read and write
18415CF0000
trusted library allocation
page read and write
25DFF470000
heap
page read and write
205C939A000
heap
page read and write
2C853D38000
heap
page read and write
184106A0000
heap
page read and write
2C8536FA000
trusted library allocation
page read and write
9E342F9000
stack
page read and write
AE19EFE000
stack
page read and write
2C853DAB000
heap
page read and write
2C853F26000
heap
page read and write
2C853C69000
heap
page read and write
D91C0FF000
stack
page read and write
23583246000
heap
page read and write
2C853F1A000
heap
page read and write
2C84E9F1000
heap
page read and write
EC32C7F000
stack
page read and write
2C853C26000
heap
page read and write
2C853C26000
heap
page read and write
205C9376000
heap
page read and write
2C853F54000
heap
page read and write
2C84E9EC000
heap
page read and write
2C8536F6000
trusted library allocation
page read and write
18415BC1000
trusted library allocation
page read and write
2A3B2F30000
heap
page read and write
2C84E94D000
heap
page read and write
205C8AAB000
heap
page read and write
2C8535A0000
trusted library allocation
page read and write
205C8AEC000
heap
page read and write
2C84F520000
trusted library allocation
page read and write
2C84E9EF000
heap
page read and write
2C853D0B000
heap
page read and write
205C9380000
heap
page read and write
18410540000
heap
page read and write
2C853E97000
heap
page read and write
18415A00000
trusted library allocation
page read and write
2C853F57000
heap
page read and write
205C9381000
heap
page read and write
19539FE000
stack
page read and write
2C84E71D000
heap
page read and write
2C853ED5000
heap
page read and write
6B10D4C000
stack
page read and write
2C84F188000
trusted library allocation
page read and write
2C853E8F000
heap
page read and write
2C853C34000
heap
page read and write
2C84E9B5000
heap
page read and write
2358325C000
heap
page read and write
2C853C58000
heap
page read and write
2C84E9D2000
heap
page read and write
205C9350000
heap
page read and write
2C853F6F000
heap
page read and write
205C9380000
heap
page read and write
2C853DF8000
heap
page read and write
2C853E6E000
heap
page read and write
18415ED0000
trusted library allocation
page read and write
1BB0D090000
heap
page read and write
2C853E6E000
heap
page read and write
2C853D94000
heap
page read and write
1698AAC000
stack
page read and write
2C853F0C000
heap
page read and write
2C853D00000
heap
page read and write
2C8536F0000
trusted library allocation
page read and write
2C853850000
trusted library allocation
page read and write
2C853DE5000
heap
page read and write
2A3B3045000
heap
page read and write
2C853EDC000
heap
page read and write
4128FFD000
stack
page read and write
205C938E000
heap
page read and write
205C8950000
heap
page read and write
2C853C34000
heap
page read and write
2C853DDB000
heap
page read and write
23583220000
heap
page read and write
205C8AC6000
heap
page read and write
2C853D2B000
heap
page read and write
1921C260000
remote allocation
page read and write
2C853FDA000
heap
page read and write
180F0C02000
heap
page read and write
1953F77000
stack
page read and write
2C853DF8000
heap
page read and write
23583251000
heap
page read and write
2C8536F4000
trusted library allocation
page read and write
2C853850000
trusted library allocation
page read and write
2C853C2F000
heap
page read and write
2C84DE44000
heap
page read and write
2C853E50000
heap
page read and write
2C853D1C000
heap
page read and write
2C853C2D000
heap
page read and write
179E5E7B000
heap
page read and write
23583251000
heap
page read and write
F2F4BFB000
stack
page read and write
2C853C55000
heap
page read and write
18415EE0000
trusted library allocation
page read and write
2C853F28000
heap
page read and write
2C853F5E000
heap
page read and write
180F0B70000
trusted library allocation
page read and write
2C8536E8000
trusted library allocation
page read and write
2C853C2F000
heap
page read and write
1BB0DB00000
heap
page read and write
EC32E7F000
stack
page read and write
2C853D2C000
heap
page read and write
179E5E32000
heap
page read and write
2C853D44000
heap
page read and write
2C8536E0000
trusted library allocation
page read and write
2C853D85000
heap
page read and write
18129C64000
heap
page read and write
2C854010000
heap
page read and write
2C853C5C000
heap
page read and write
EC3213B000
stack
page read and write
2C853FCC000
heap
page read and write
18415BA0000
trusted library allocation
page read and write
2C853C2D000
heap
page read and write
2C853920000
trusted library allocation
page read and write
2C853D1C000
heap
page read and write
2C853B50000
trusted library allocation
page read and write
2C84E600000
heap
page read and write
683AC7E000
stack
page read and write
205C8A4F000
heap
page read and write
2C8536FA000
trusted library allocation
page read and write
2C853FBA000
heap
page read and write
2C853D6E000
heap
page read and write
1921BC24000
heap
page read and write
2C853F60000
heap
page read and write
2C853C69000
heap
page read and write
2C853FDA000
heap
page read and write
2C8536F0000
trusted library allocation
page read and write
180F0C00000
heap
page read and write
2C853C2D000
heap
page read and write
2C853D1B000
heap
page read and write
2C84E998000
heap
page read and write
2C8538C0000
trusted library allocation
page read and write
205C9373000
heap
page read and write
2C853D1C000
heap
page read and write
1841063D000
heap
page read and write
205C938B000
heap
page read and write
2C853C38000
heap
page read and write
179E5E40000
heap
page read and write
29DF8E27000
heap
page read and write
18410D90000
trusted library section
page readonly
2C853C69000
heap
page read and write
18410670000
heap
page read and write
205C9802000
heap
page read and write
25DFFC02000
trusted library allocation
page read and write
2C84DE8A000
heap
page read and write
2C84E71D000
heap
page read and write
8751AFE000
stack
page read and write
2C853E80000
heap
page read and write
2C853EC7000
heap
page read and write
2A3B304E000
heap
page read and write
EC3287F000
stack
page read and write
2C853FDA000
heap
page read and write
2C853F0A000
heap
page read and write
2C85385C000
trusted library allocation
page read and write
2C84E700000
heap
page read and write
1921BC02000
heap
page read and write
29DF8DA0000
trusted library allocation
page read and write
2C853EA1000
heap
page read and write
2C84E9F7000
heap
page read and write
2C853E58000
heap
page read and write
2C853DA8000
heap
page read and write
2C853D62000
heap
page read and write
179E5E2E000
heap
page read and write
2C853C10000
heap
page read and write
1BB0D0F0000
heap
page read and write
2C853F72000
heap
page read and write
179E5E6D000
heap
page read and write
205C9383000
heap
page read and write
2C853EA4000
heap
page read and write
205C9386000
heap
page read and write
18410678000
heap
page read and write
23583251000
heap
page read and write
205C91E0000
remote allocation
page read and write
25DFF455000
heap
page read and write
2C853854000
trusted library allocation
page read and write
2C853C3C000
heap
page read and write
195407F000
stack
page read and write
2C853F46000
heap
page read and write
179E5CA0000
heap
page read and write
1698FFA000
stack
page read and write
2C853F99000
heap
page read and write
2C8536E0000
trusted library allocation
page read and write
2C853D17000
heap
page read and write
1BB0D289000
heap
page read and write
205C8960000
heap
page read and write
180F0A70000
heap
page read and write
16990FB000
stack
page read and write
2C853D60000
heap
page read and write
2C853FC8000
heap
page read and write
2C853F57000
heap
page read and write
205C8A4C000
heap
page read and write
2C853D93000
heap
page read and write
2C8536E8000
trusted library allocation
page read and write
2C853EB5000
heap
page read and write
2C853D93000
heap
page read and write
2C853C3F000
heap
page read and write
2850D713000
heap
page read and write
2C853D02000
heap
page read and write
2C84E7E2000
heap
page read and write
2C853E89000
heap
page read and write
18415A80000
trusted library allocation
page read and write
2C853F87000
heap
page read and write
2C84E9ED000
heap
page read and write
18410713000
heap
page read and write
2C8536E0000
trusted library allocation
page read and write
2C853854000
trusted library allocation
page read and write
18129C13000
heap
page read and write
2C853840000
trusted library allocation
page read and write
2C85372E000
trusted library allocation
page read and write
2C853F02000
heap
page read and write
2C853850000
trusted library allocation
page read and write
412877C000
stack
page read and write
29DF8E71000
heap
page read and write
2C853D67000
heap
page read and write
2850D702000
heap
page read and write
2C84DDB0000
trusted library allocation
page read and write
2C84DE85000
heap
page read and write
8BD977C000
stack
page read and write
2850D5E0000
trusted library allocation
page read and write
2C853E6F000
heap
page read and write
29DF8CA0000
heap
page read and write
2C853C5F000
heap
page read and write
2C853820000
trusted library allocation
page read and write
1921BA70000
heap
page read and write
8BD91FC000
stack
page read and write
18129C5A000
heap
page read and write
2C853ED4000
heap
page read and write
2C853C69000
heap
page read and write
2C8538E0000
trusted library allocation
page read and write
2C853E9C000
heap
page read and write
23583236000
heap
page read and write
2C853DB4000
heap
page read and write
18415CFA000
heap
page read and write
205C8A49000
heap
page read and write
2C84DF13000
heap
page read and write
2C853D1F000
heap
page read and write
2A3B3029000
heap
page read and write
2C853FA0000
heap
page read and write
2C853C2F000
heap
page read and write
205C8A00000
heap
page read and write
2C853F36000
heap
page read and write
2C853F77000
heap
page read and write
2C853E8D000
heap
page read and write
2C853FDA000
heap
page read and write
184115E0000
trusted library allocation
page read and write
205C8AE3000
heap
page read and write
8BD997C000
stack
page read and write
205C8A4B000
heap
page read and write
205C89F0000
trusted library allocation
page read and write
2C84E9F9000
heap
page read and write
2C853D3C000
heap
page read and write
205C9803000
heap
page read and write
2C853F0D000
heap
page read and write
29DF8E50000
heap
page read and write
179E6602000
trusted library allocation
page read and write
2C853FA2000
heap
page read and write
2C853D93000
heap
page read and write
2C853E0F000
heap
page read and write
2C853DDE000
heap
page read and write
25DFF449000
heap
page read and write
2850D62A000
heap
page read and write
205C9819000
heap
page read and write
2C853E73000
heap
page read and write
2C853EB9000
heap
page read and write
179E5E42000
heap
page read and write
2C853D69000
heap
page read and write
2C853E4B000
heap
page read and write
2C853EB4000
heap
page read and write
2C84DF8E000
heap
page read and write
2C853F9C000
heap
page read and write
2C853C62000
heap
page read and write
2A3B3037000
heap
page read and write
2C853F72000
heap
page read and write
23583130000
heap
page read and write
2C853E7E000
heap
page read and write
2C853C4F000
heap
page read and write
2C84E9CE000
heap
page read and write
D91B9BB000
stack
page read and write
2C84DE00000
heap
page read and write
2C8536E0000
trusted library allocation
page read and write
2C8538A0000
trusted library allocation
page read and write
2C84E858000
heap
page read and write
25DFF489000
heap
page read and write
18129D02000
heap
page read and write
16995FF000
stack
page read and write
2C853ECC000
heap
page read and write
2C853C3C000
heap
page read and write
2C853D91000
heap
page read and write
2C853F69000
heap
page read and write
18410DF3000
trusted library allocation
page read and write
179E5E7A000
heap
page read and write
2C853EFB000
heap
page read and write
2C853E41000
heap
page read and write
18410F13000
heap
page read and write
23583242000
heap
page read and write
205C8A71000
heap
page read and write
2C853C69000
heap
page read and write
2C8536E0000
trusted library allocation
page read and write
18415F00000
remote allocation
page read and write
2C853C2D000
heap
page read and write
179E5E49000
heap
page read and write
8751E78000
stack
page read and write
EC32A7E000
stack
page read and write
2C853FDA000
heap
page read and write
2C84E997000
heap
page read and write
2C853840000
trusted library allocation
page read and write
2C853D97000
heap
page read and write
180F0D02000
heap
page read and write
2C853FDA000
heap
page read and write
2C84E9FB000
heap
page read and write
179E5E3A000
heap
page read and write
2C853E6E000
heap
page read and write
2C853D62000
heap
page read and write
2C853EF6000
heap
page read and write
2C853FDA000
heap
page read and write
8BD987E000
stack
page read and write
2C84E5F0000
trusted library allocation
page read and write
2C853E6E000
heap
page read and write
18410690000
heap
page read and write
2C853530000
trusted library allocation
page read and write
169967F000
stack
page read and write
2C8536C0000
trusted library allocation
page read and write
4128EFF000
stack
page read and write
205C9321000
heap
page read and write
683A52B000
stack
page read and write
2C853F24000
heap
page read and write
2C8536E5000
trusted library allocation
page read and write
205C9802000
heap
page read and write
18410F18000
heap
page read and write
2C853D93000
heap
page read and write
2C84EF00000
trusted library allocation
page read and write
2C853E7E000
heap
page read and write
2C85376C000
trusted library allocation
page read and write
2C84E728000
heap
page read and write
25DFF451000
heap
page read and write
2C84E967000
heap
page read and write
205C9374000
heap
page read and write
2C84E9F3000
heap
page read and write
2C84E943000
heap
page read and write
205C93AB000
heap
page read and write
2C853F03000
heap
page read and write
16991FE000
stack
page read and write
2C853D67000
heap
page read and write
2C853C26000
heap
page read and write
2C853FDA000
heap
page read and write
2C853D35000
heap
page read and write
2C853C26000
heap
page read and write
2C84E602000
heap
page read and write
2C84DE65000
heap
page read and write
2C853F30000
heap
page read and write
1921C402000
trusted library allocation
page read and write
205C9802000
heap
page read and write
2C853E9E000
heap
page read and write
2C853C2C000
heap
page read and write
F2F4AFF000
stack
page read and write
2C853FDB000
heap
page read and write
2A3B2F80000
heap
page read and write
2C853D1D000
heap
page read and write
18410F00000
heap
page read and write
18415E70000
trusted library allocation
page read and write
16996FF000
stack
page read and write
18410570000
trusted library allocation
page read and write
2C84E794000
heap
page read and write
2C853F86000
heap
page read and write
2C853F39000
heap
page read and write
205C8A13000
heap
page read and write
2C853D0D000
heap
page read and write
2C853EB9000
heap
page read and write
2C853C2F000
heap
page read and write
2C853FC0000
heap
page read and write
2C853E7E000
heap
page read and write
2C853F2D000
heap
page read and write
179E5E60000
heap
page read and write
2C853560000
trusted library allocation
page read and write
18410656000
heap
page read and write
2C853FBC000
heap
page read and write
169947F000
stack
page read and write
2C84F3C0000
trusted library allocation
page read and write
2C853C53000
heap
page read and write
F2F51FF000
stack
page read and write
2C853FB9000
heap
page read and write
2C853D17000
heap
page read and write
54660FE000
stack
page read and write
2C8536DC000
trusted library allocation
page read and write
179E5E84000
heap
page read and write
2C853ED1000
heap
page read and write
2C84DC50000
heap
page read and write
2C853E89000
heap
page read and write
195397C000
stack
page read and write
2C853830000
trusted library allocation
page read and write
2C84F4F0000
trusted library section
page readonly
25DFF2D0000
heap
page read and write
205C8AB6000
heap
page read and write
180F0D00000
heap
page read and write
2C853C2D000
heap
page read and write
2C853780000
trusted library allocation
page read and write
2C84E85A000
heap
page read and write
180F0C28000
heap
page read and write
2C853E89000
heap
page read and write
2C853EB9000
heap
page read and write
18410613000
heap
page read and write
2C853C53000
heap
page read and write
2C853D53000
heap
page read and write
2C84DE2F000
heap
page read and write
29DF8F00000
heap
page read and write
2C84E802000
heap
page read and write
1698EF7000
stack
page read and write
2C853E92000
heap
page read and write
1841067A000
heap
page read and write
1BB0D302000
heap
page read and write
205C8A50000
heap
page read and write
2C853C2D000
heap
page read and write
18410DC0000
trusted library section
page readonly
2C853D24000
heap
page read and write
23583236000
heap
page read and write
2C84EE80000
trusted library allocation
page read and write
2C853C13000
heap
page read and write
2C853C62000
heap
page read and write
2C853DFD000
heap
page read and write
2C853C62000
heap
page read and write
AE1A17A000
stack
page read and write
EC3277F000
stack
page read and write
9E343FE000
stack
page read and write
25DFF429000
heap
page read and write
F2F45CB000
stack
page read and write
2C853EB9000
heap
page read and write
1921BBD0000
trusted library allocation
page read and write
2C85372E000
trusted library allocation
page read and write
2C853EDE000
heap
page read and write
2C84DE72000
heap
page read and write
2C853840000
trusted library allocation
page read and write
205C9300000
heap
page read and write
2C853C34000
heap
page read and write
F2F54FD000
stack
page read and write
8751A7B000
stack
page read and write
2C853FDB000
heap
page read and write
2C853EB9000
heap
page read and write
18410DE0000
trusted library section
page readonly
2C853D2B000
heap
page read and write
18415C2F000
heap
page read and write
2C853D5D000
heap
page read and write
1BB0D271000
heap
page read and write
2C853F05000
heap
page read and write
2C853D1C000
heap
page read and write
2C853DEA000
heap
page read and write
18129C7B000
heap
page read and write
25DFF44E000
heap
page read and write
205C93AD000
heap
page read and write
2C853C2F000
heap
page read and write
205C938B000
heap
page read and write
2C853FDA000
heap
page read and write
2C853C34000
heap
page read and write
2C853DDB000
heap
page read and write
2C853850000
trusted library allocation
page read and write
2850D678000
heap
page read and write
18415D00000
trusted library allocation
page read and write
5465C7B000
stack
page read and write
169957E000
stack
page read and write
2C853FE2000
heap
page read and write
2C84DE58000
heap
page read and write
2C8536F0000
trusted library allocation
page read and write
18415CF0000
heap
page read and write
2C853EBA000
heap
page read and write
2C853F57000
heap
page read and write
2C853C69000
heap
page read and write
2A3B2FB0000
trusted library allocation
page read and write
179E5E00000
heap
page read and write
2C853C2F000
heap
page read and write
2C853C2D000
heap
page read and write
2850D65A000
heap
page read and write
18411A00000
trusted library allocation
page read and write
18415C22000
heap
page read and write
2C853D62000
heap
page read and write
205C937C000
heap
page read and write
16992FA000
stack
page read and write
2C853C4D000
heap
page read and write
205C937F000
heap
page read and write
29DF8E29000
heap
page read and write
2C853EDA000
heap
page read and write
18415F00000
remote allocation
page read and write
683AB7F000
stack
page read and write
205C8A4E000
heap
page read and write
18129C3C000
heap
page read and write
18415BC4000
trusted library allocation
page read and write
18415CF9000
heap
page read and write
2C853C2F000
heap
page read and write
1BB0D2C2000
heap
page read and write
205C9373000
heap
page read and write
2C853D99000
heap
page read and write
18415C12000
heap
page read and write
2C853D49000
heap
page read and write
F2F56FE000
stack
page read and write
2C853D17000
heap
page read and write
2C853C2D000
heap
page read and write
2C853D11000
heap
page read and write
25DFF481000
heap
page read and write
2C84E900000
heap
page read and write
180F0C41000
heap
page read and write
179E5E62000
heap
page read and write
2C8538B0000
trusted library allocation
page read and write
2C853D27000
heap
page read and write
25DFF513000
heap
page read and write
EC3267C000
stack
page read and write
2C84E80A000
heap
page read and write
2C853854000
trusted library allocation
page read and write
2C853C26000
heap
page read and write
18415BA0000
trusted library allocation
page read and write
D91BFF7000
stack
page read and write
2C8536FC000
trusted library allocation
page read and write
179E5E30000
heap
page read and write
2C853E6E000
heap
page read and write
179E5E13000
heap
page read and write
2C84E823000
heap
page read and write
25DFF402000
heap
page read and write
2C84E9D3000
heap
page read and write
2C84DFEB000
heap
page read and write
18415C57000
heap
page read and write
2C853A80000
remote allocation
page read and write
205C9391000
heap
page read and write
2C853E4B000
heap
page read and write
2C84DCB0000
heap
page read and write
18129C59000
heap
page read and write
2C853D18000
heap
page read and write
205C9361000
heap
page read and write
205C89C0000
heap
page read and write
1BB0D1F0000
trusted library allocation
page read and write
180F0A10000
heap
page read and write
2C8538F0000
trusted library allocation
page read and write
2A3B3051000
heap
page read and write
2C853860000
trusted library allocation
page read and write
2C853EB9000
heap
page read and write
2C853C2F000
heap
page read and write
2C853C34000
heap
page read and write
2A3B2F20000
heap
page read and write
2C853E7D000
heap
page read and write
2C84E960000
heap
page read and write
205C8B02000
heap
page read and write
1921BD02000
heap
page read and write
2C853EC5000
heap
page read and write
D91BC7E000
stack
page read and write
2C853C2D000
heap
page read and write
2C853D1F000
heap
page read and write
2A3B3802000
trusted library allocation
page read and write
23583231000
heap
page read and write
2C853EFE000
heap
page read and write
205C9379000
heap
page read and write
18410DA0000
trusted library section
page readonly
2C853C37000
heap
page read and write
2C853E6E000
heap
page read and write
2C853C26000
heap
page read and write
2C853C34000
heap
page read and write
D91BCFE000
stack
page read and write
2C853D4F000
heap
page read and write
205C936E000
heap
page read and write
180F0C77000
heap
page read and write
18415A10000
trusted library allocation
page read and write
205C9821000
heap
page read and write
2C853D82000
heap
page read and write
1BB0D200000
heap
page read and write
F2F517A000
stack
page read and write
2C853F20000
heap
page read and write
18410694000
heap
page read and write
2C8539B0000
trusted library allocation
page read and write
2C84F190000
trusted library allocation
page read and write
2C853C26000
heap
page read and write
235834A5000
heap
page read and write
2C853F70000
heap
page read and write
29DF8C40000
heap
page read and write
25DFF400000
heap
page read and write
2C853E89000
heap
page read and write
F2F52FF000
stack
page read and write
2C853EBA000
heap
page read and write
205C8A52000
heap
page read and write
2C853D1B000
heap
page read and write
2C853E9A000
heap
page read and write
2C853850000
trusted library allocation
page read and write
2C853A80000
remote allocation
page read and write
18415CDB000
heap
page read and write
18415BD0000
trusted library allocation
page read and write
18129C67000
heap
page read and write
There are 1181 hidden memdumps, click here to show them.