IOC Report
actionplan doc 08.11.doc

loading gif

Files

File Path
Type
Category
Malicious
actionplan doc 08.11.doc
Zip archive data, at least v2.0 to extract
initial sample
malicious
C:\Users\user\AppData\Local\Temp\~DFB9753BB74160ACC2.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\actionplan doc 08.11.doc.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:51 2022, mtime=Fri Aug 12 01:30:30 2022, atime=Fri Aug 12 01:30:23 2022, length=2255878, window=hide
dropped
malicious
C:\Users\user\AppData\Local\Temp\~DFDA86EB9FE88A2E3F.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\D87A3441-42E7-470D-8213-35F5C80D216F
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\541FF1C0.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\C0CEAFFB.png
PNG image data, 636 x 613, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{34D97BE2-6C3D-4A31-9A42-1C2930589F97}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{5481821B-5863-4C7A-B07B-A94021ED3E0F}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\Desktop\~$tionplan doc 08.11.doc
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A7C7EF0B.png
PNG image data, 636 x 613, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EBC662B2.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{5247F4D0-671C-4B5A-A163-EC9E0BA13D41}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{28B9B3A7-C636-414D-ACE1-7B74DE4F80F2}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{503DE3AF-4050-42E8-8E6B-EBBBB47830BA}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\actionplan doc 08.11.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:53 2022, mtime=Tue Mar 8 15:45:53 2022, atime=Fri Aug 12 01:24:12 2022, length=2255878, window=hide
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding

URLs

Name
IP
Malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://my.microsoftpersonalcontent.com
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
https://api.powerbi.com/beta/myorg/imports
unknown
https://devnull.onenote.com
unknown
https://messaging.action.office.com/
unknown
https://ncus.pagecontentsync.
unknown
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
unknown
https://messaging.office.com/
unknown
https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.8.146.139
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
wj9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
xj9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
>o9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
qv9
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\1FDC5
1FDC5
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2EAB5
2EAB5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Chart Tools
ChartToolsSuperTooltipHidden
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2EAB5
2EAB5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
+4.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
16.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
q8.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\65FBC
65FBC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\78CC5
78CC5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\78CC5
78CC5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 408 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
19FC458C000
heap
page read and write
23F327B000
stack
page read and write
19FC43C5000
heap
page read and write
19FC4354000
heap
page read and write
19FC932A000
trusted library allocation
page read and write
19FC99E4000
heap
page read and write
219899C0000
trusted library allocation
page read and write
19FC9861000
heap
page read and write
19FC9A40000
heap
page read and write
1A9AB568000
heap
page read and write
19FC9998000
heap
page read and write
19FC3A27000
heap
page read and write
19FC92F4000
trusted library allocation
page read and write
19FC4325000
heap
page read and write
1ED3402A000
heap
page read and write
19FC9869000
heap
page read and write
19FC9800000
heap
page read and write
19FC440A000
heap
page read and write
1A9AB565000
heap
page read and write
44400FF000
stack
page read and write
19FC9A8D000
heap
page read and write
413597F000
stack
page read and write
19FC9998000
heap
page read and write
19FC9ACF000
heap
page read and write
AA2237D000
stack
page read and write
19FC45E0000
heap
page read and write
1A9AACAD000
heap
page read and write
23F39FE000
stack
page read and write
19FC9826000
heap
page read and write
1ED33D90000
heap
page read and write
1A9AB5A4000
heap
page read and write
23F32FD000
stack
page read and write
21989A40000
heap
page read and write
19FC9B95000
heap
page read and write
198215F0000
trusted library allocation
page read and write
19FC9AAB000
heap
page read and write
19FC982D000
heap
page read and write
1981C2B9000
heap
page read and write
1A9AB50E000
heap
page read and write
19FC92EE000
trusted library allocation
page read and write
19FC45E8000
heap
page read and write
19FC4423000
heap
page read and write
19FC99DE000
heap
page read and write
198217A1000
trusted library allocation
page read and write
1ED34000000
heap
page read and write
1A9AAC5C000
heap
page read and write
19FC9A09000
heap
page read and write
19FC39D0000
trusted library allocation
page read and write
19821A00000
heap
page read and write
19FC92DC000
trusted library allocation
page read and write
666C47E000
stack
page read and write
19FC9BDB000
heap
page read and write
443FCFF000
stack
page read and write
19FC99CD000
heap
page read and write
2EBE97E000
stack
page read and write
19821780000
trusted library allocation
page read and write
203FE902000
heap
page read and write
19FC99F6000
heap
page read and write
19FC50B0000
trusted library section
page readonly
19FC9837000
heap
page read and write
19FC9A0F000
heap
page read and write
19FC9998000
heap
page read and write
19FC9AD7000
heap
page read and write
1A9AB566000
heap
page read and write
666BC7E000
stack
page read and write
19FC9A5C000
heap
page read and write
19FC9861000
heap
page read and write
44401FC000
stack
page read and write
1A7D3E55000
heap
page read and write
198218E0000
remote allocation
page read and write
19FC92F6000
trusted library allocation
page read and write
19FC94E0000
trusted library allocation
page read and write
203FE84F000
heap
page read and write
19FC9BC2000
heap
page read and write
19FC50F0000
trusted library section
page readonly
19FC982D000
heap
page read and write
1981D240000
trusted library section
page readonly
203FE86F000
heap
page read and write
19FC9A66000
heap
page read and write
1F259D10000
heap
page read and write
19FC9826000
heap
page read and write
19FC9B06000
heap
page read and write
1A7D4602000
trusted library allocation
page read and write
19FC9A02000
heap
page read and write
1A7D3E49000
heap
page read and write
AA2297E000
stack
page read and write
19FC432D000
heap
page read and write
19FC92EC000
trusted library allocation
page read and write
1A9AAC5D000
heap
page read and write
21989B13000
heap
page read and write
1A9AB593000
heap
page read and write
19FC9570000
trusted library allocation
page read and write
19FC92F0000
trusted library allocation
page read and write
413577E000
stack
page read and write
1FC1702F000
heap
page read and write
1A9AB562000
heap
page read and write
19FC9B38000
heap
page read and write
19FC99F9000
heap
page read and write
1ED34102000
heap
page read and write
1F259E42000
heap
page read and write
19FC9B93000
heap
page read and write
2B29AEE0000
heap
page read and write
19FC43AE000
heap
page read and write
203FE7E0000
trusted library allocation
page read and write
1340F035000
heap
page read and write
666BCFF000
stack
page read and write
1A9AAC00000
heap
page read and write
19FC945C000
trusted library allocation
page read and write
1F259E16000
heap
page read and write
19FC99CD000
heap
page read and write
19FC9993000
heap
page read and write
1ED3403C000
heap
page read and write
1A9AB564000
heap
page read and write
1340F1F9000
heap
page read and write
19FC9998000
heap
page read and write
19FC9903000
heap
page read and write
19FC9975000
heap
page read and write
19FC9B4D000
heap
page read and write
19FC99BA000
heap
page read and write
19FC9A90000
heap
page read and write
19FC92FC000
trusted library allocation
page read and write
198215E0000
trusted library allocation
page read and write
1340F1F0000
heap
page read and write
19FC9AB7000
heap
page read and write
1E6570B000
stack
page read and write
19FC9BC1000
heap
page read and write
19FC45B0000
heap
page read and write
19FC9975000
heap
page read and write
1A9AACB2000
heap
page read and write
19FC3A5B000
heap
page read and write
19FC9924000
heap
page read and write
19821B00000
heap
page read and write
19FC982D000
heap
page read and write
19821A9C000
heap
page read and write
1E65F7D000
stack
page read and write
19FC9A34000
heap
page read and write
1F259E2E000
heap
page read and write
43F2F8A000
stack
page read and write
1981C0B0000
heap
page read and write
19FC9B14000
heap
page read and write
1A7D3D10000
heap
page read and write
19FC45C5000
heap
page read and write
1340EF30000
heap
page read and write
19FC91A0000
trusted library allocation
page read and write
19821A11000
heap
page read and write
19FC9975000
heap
page read and write
19FC9979000
heap
page read and write
1FC17045000
heap
page read and write
19FC94F0000
trusted library allocation
page read and write
1981D250000
trusted library section
page readonly
19FC9BD7000
heap
page read and write
23F37FF000
stack
page read and write
1A7D3E42000
heap
page read and write
19FC92E8000
trusted library allocation
page read and write
19FC9902000
heap
page read and write
1981D260000
trusted library section
page readonly
19FC92FC000
trusted library allocation
page read and write
21989920000
heap
page read and write
19FC982F000
heap
page read and write
19FC9AF7000
heap
page read and write
25BFA400000
heap
page read and write
25BFA665000
heap
page read and write
1981C0C0000
heap
page read and write
1A7D3F02000
heap
page read and write
19FC9B28000
heap
page read and write
19821A64000
heap
page read and write
1A9AB56C000
heap
page read and write
666B67B000
stack
page read and write
19FC9BFA000
heap
page read and write
19FC3A3C000
heap
page read and write
1A7D3E61000
heap
page read and write
19FC9826000
heap
page read and write
19FC9530000
trusted library allocation
page read and write
1981C278000
heap
page read and write
172A7A60000
heap
page read and write
19FC4543000
heap
page read and write
19FC9974000
heap
page read and write
1ED33FD0000
trusted library allocation
page read and write
19FC5101000
trusted library allocation
page read and write
F9E6CFC000
stack
page read and write
21989A00000
heap
page read and write
19FC9A3C000
heap
page read and write
19FC9B58000
heap
page read and write
19FC9A72000
heap
page read and write
19FC92E0000
trusted library allocation
page read and write
19FC9A16000
heap
page read and write
19821850000
trusted library allocation
page read and write
11FA8FF000
stack
page read and write
19FC4300000
heap
page read and write
1981CA02000
heap
page read and write
19FC4A80000
trusted library allocation
page read and write
41356FE000
stack
page read and write
19FC9A3A000
heap
page read and write
1A9AB593000
heap
page read and write
1A9ABA1A000
heap
page read and write
2B29B102000
heap
page read and write
19FC983F000
heap
page read and write
19FC9AC0000
heap
page read and write
19FC9BCA000
heap
page read and write
19FC9B4B000
heap
page read and write
19FC982F000
heap
page read and write
7EFC37B000
stack
page read and write
19FC9B62000
heap
page read and write
19FC9826000
heap
page read and write
19821A58000
heap
page read and write
19FC982F000
heap
page read and write
1E65B7B000
stack
page read and write
1981C229000
heap
page read and write
443FEF7000
stack
page read and write
1F259E3E000
heap
page read and write
1FC16EE0000
heap
page read and write
1A9AAD08000
heap
page read and write
19FC3840000
heap
page read and write
19FC945C000
trusted library allocation
page read and write
2B29B013000
heap
page read and write
19FC9869000
heap
page read and write
19FC982F000
heap
page read and write
F9E6C7E000
stack
page read and write
19FC3B13000
heap
page read and write
198218C0000
trusted library allocation
page read and write
666BAFB000
stack
page read and write
198218D0000
trusted library allocation
page read and write
19FC9450000
trusted library allocation
page read and write
19FC9B70000
heap
page read and write
19FC9A13000
heap
page read and write
41351FD000
stack
page read and write
19FC4340000
heap
page read and write
1981C2FC000
heap
page read and write
19FC9B53000
heap
page read and write
19FC3A8B000
heap
page read and write
1A7D3E56000
heap
page read and write
AA22B7E000
stack
page read and write
19FC9B05000
heap
page read and write
19FC9BD3000
heap
page read and write
19FC9A31000
heap
page read and write
203FE87F000
heap
page read and write
19FC92C0000
trusted library allocation
page read and write
19FC9B36000
heap
page read and write
19FC93B0000
remote allocation
page read and write
19FC9AA8000
heap
page read and write
19FC45A7000
heap
page read and write
19FC985C000
heap
page read and write
1F259E16000
heap
page read and write
19FC9928000
heap
page read and write
1A7D3E76000
heap
page read and write
19FC50A0000
trusted library section
page readonly
AA21D3B000
stack
page read and write
1A7D3E47000
heap
page read and write
1A9AACCD000
heap
page read and write
19FC9A11000
heap
page read and write
41357FF000
stack
page read and write
2EBE52C000
stack
page read and write
19FC92FA000
trusted library allocation
page read and write
198217B0000
trusted library allocation
page read and write
19FC9826000
heap
page read and write
23F35FB000
stack
page read and write
1A9AB402000
heap
page read and write
1A9AACFC000
heap
page read and write
19FC9B2D000
heap
page read and write
19FC92F4000
trusted library allocation
page read and write
203FE851000
heap
page read and write
25BFA629000
heap
page read and write
19FC9826000
heap
page read and write
19FC993D000
heap
page read and write
1A7D3E74000
heap
page read and write
19FC92FE000
trusted library allocation
page read and write
1A9AB5D4000
heap
page read and write
19FC3A92000
heap
page read and write
19FC9B3D000
heap
page read and write
19FC9C03000
heap
page read and write
1A9AAAD0000
heap
page read and write
1340F000000
heap
page read and write
19FC945C000
trusted library allocation
page read and write
19FC99C2000
heap
page read and write
19FC9BB9000
heap
page read and write
19FC4597000
heap
page read and write
1981C29D000
heap
page read and write
19FC9A29000
heap
page read and write
21989A78000
heap
page read and write
1981C213000
heap
page read and write
19FC9AE6000
heap
page read and write
1ED3404E000
heap
page read and write
19FC99D9000
heap
page read and write
19FC9979000
heap
page read and write
19FC45F9000
heap
page read and write
19FC99F4000
heap
page read and write
19FC9861000
heap
page read and write
19FC9B17000
heap
page read and write
19FC9B73000
heap
page read and write
19FC4402000
heap
page read and write
19FC99C4000
heap
page read and write
19FC9BEE000
heap
page read and write
19FC9993000
heap
page read and write
413567F000
stack
page read and write
1340F03C000
heap
page read and write
19FC9838000
heap
page read and write
1ED34082000
heap
page read and write
1A7D3D80000
heap
page read and write
19FC9345000
trusted library allocation
page read and write
1A7D3E73000
heap
page read and write
203FE800000
heap
page read and write
1981C302000
heap
page read and write
19FC9869000
heap
page read and write
19FC9834000
heap
page read and write
19E21020000
heap
page read and write
1A9AB5B4000
heap
page read and write
19FC4563000
heap
page read and write
19FC441B000
heap
page read and write
19FC9440000
trusted library allocation
page read and write
19FC9834000
heap
page read and write
19FC9913000
heap
page read and write
19FC982F000
heap
page read and write
484C07E000
stack
page read and write
19FC9B15000
heap
page read and write
19FC9454000
trusted library allocation
page read and write
19FC9430000
trusted library allocation
page read and write
443FB7E000
stack
page read and write
19FC9A36000
heap
page read and write
1981C120000
heap
page read and write
19FC43EC000
heap
page read and write
19FC45E1000
heap
page read and write
19FC3850000
heap
page read and write
19FC9AE6000
heap
page read and write
1A9AAD13000
heap
page read and write
19FC9510000
trusted library allocation
page read and write
19FC9913000
heap
page read and write
19FC9B00000
heap
page read and write
19FC9BC2000
heap
page read and write
1A9AB582000
heap
page read and write
19FC9454000
trusted library allocation
page read and write
19FC9A29000
heap
page read and write
19821B02000
heap
page read and write
19FC92F0000
trusted library allocation
page read and write
19FC99F8000
heap
page read and write
19FC9A18000
heap
page read and write
19FC9B74000
heap
page read and write
19FC9B65000
heap
page read and write
19FC9B84000
heap
page read and write
19FC9A32000
heap
page read and write
19FC9A0D000
heap
page read and write
7EFC07C000
stack
page read and write
172A7A88000
heap
page read and write
1A9AB593000
heap
page read and write
1A9AB552000
heap
page read and write
19FC9855000
heap
page read and write
19FC993C000
heap
page read and write
19FC9926000
heap
page read and write
1340EFB0000
trusted library allocation
page read and write
19FC9A38000
heap
page read and write
1ED33E00000
heap
page read and write
19FC92FE000
trusted library allocation
page read and write
19FC9B21000
heap
page read and write
19FC9973000
heap
page read and write
19FC9A36000
heap
page read and write
19FC9AE6000
heap
page read and write
203FE84D000
heap
page read and write
19FC9AEF000
heap
page read and write
19FC9BD9000
heap
page read and write
172A7960000
trusted library allocation
page read and write
AA2277F000
stack
page read and write
172A7A64000
heap
page read and write
19FC993C000
heap
page read and write
2B29B03C000
heap
page read and write
19FC9975000
heap
page read and write
19FC993C000
heap
page read and write
1A9AB5A5000
heap
page read and write
19E21180000
trusted library allocation
page read and write
19E212E1000
heap
page read and write
19821670000
trusted library allocation
page read and write
19FC43CA000
heap
page read and write
19FC9302000
trusted library allocation
page read and write
11FAAFF000
stack
page read and write
666BFFA000
stack
page read and write
19FC9380000
trusted library allocation
page read and write
19FC92E0000
trusted library allocation
page read and write
19FC9BCD000
heap
page read and write
172A7A54000
heap
page read and write
1340F03E000
heap
page read and write
1ED34049000
heap
page read and write
19FC9B11000
heap
page read and write
19FC982D000
heap
page read and write
19FC9826000
heap
page read and write
19FC982D000
heap
page read and write
19FC43C8000
heap
page read and write
19821AD9000
heap
page read and write
1ED34602000
trusted library allocation
page read and write
19FC9B82000
heap
page read and write
1A9AAB70000
trusted library allocation
page read and write
19FC990C000
heap
page read and write
1A9ABA02000
heap
page read and write
41358FA000
stack
page read and write
19FC92E0000
trusted library allocation
page read and write
19FC9AAD000
heap
page read and write
19FC9BEC000
heap
page read and write
1E65CFF000
stack
page read and write
443FA7B000
stack
page read and write
19FC4333000
heap
page read and write
2B29B057000
heap
page read and write
19E21229000
heap
page read and write
19FC9A65000
heap
page read and write
1F259E44000
heap
page read and write
1A9AB510000
heap
page read and write
19821A4C000
heap
page read and write
19FC9A1D000
heap
page read and write
19FC9A93000
heap
page read and write
19FC43F8000
heap
page read and write
19FC9BC0000
heap
page read and write
19FC9826000
heap
page read and write
19FC43D2000
heap
page read and write
1A9AACDE000
heap
page read and write
19FC94B0000
trusted library allocation
page read and write
19FC4215000
heap
page read and write
19FC9ADC000
heap
page read and write
19FC9A29000
heap
page read and write
19FC9BD5000
heap
page read and write
19FC9843000
heap
page read and write
25BFA410000
heap
page read and write
21989A65000
heap
page read and write
1FC1703A000
heap
page read and write
19FC9440000
trusted library allocation
page read and write
1A9AB5A5000
heap
page read and write
19FC9B1C000
heap
page read and write
5D5D07C000
stack
page read and write
19FC9A29000
heap
page read and write
172A7A5E000
heap
page read and write
2B29B029000
heap
page read and write
1ED34108000
heap
page read and write
1A9AABE0000
remote allocation
page read and write
19FC92C0000
trusted library allocation
page read and write
1981D270000
trusted library section
page readonly
19FC9AC1000
heap
page read and write
1981C325000
heap
page read and write
19FC9454000
trusted library allocation
page read and write
19FC99E4000
heap
page read and write
1981D140000
trusted library allocation
page read and write
198218E0000
remote allocation
page read and write
172A7A13000
heap
page read and write
19FC982C000
heap
page read and write
19FC92C1000
trusted library allocation
page read and write
19FC99D9000
heap
page read and write
203FE880000
heap
page read and write
1A9AACF2000
heap
page read and write
19FC9B02000
heap
page read and write
19FC983C000
heap
page read and write
19FC43F1000
heap
page read and write
19821890000
trusted library allocation
page read and write
19FC3A91000
heap
page read and write
19FC9853000
heap
page read and write
19FC9869000
heap
page read and write
1A9AB593000
heap
page read and write
1A9AAC13000
heap
page read and write
19FC9B2F000
heap
page read and write
19E21285000
heap
page read and write
4135077000
stack
page read and write
19FC3A6C000
heap
page read and write
19821780000
trusted library allocation
page read and write
666B87C000
stack
page read and write
19FC92F0000
trusted library allocation
page read and write
19FC45FD000
heap
page read and write
19FC96D0000
trusted library allocation
page read and write
19FC9A9D000
heap
page read and write
AA2267D000
stack
page read and write
19E21B32000
heap
page read and write
2B29AE70000
heap
page read and write
19FC99B6000
heap
page read and write
19FC45B0000
heap
page read and write
1A9AABE0000
remote allocation
page read and write
1340EFC0000
trusted library allocation
page read and write
19FC985B000
heap
page read and write
19E21313000
heap
page read and write
19FC945C000
trusted library allocation
page read and write
19FC92E0000
trusted library allocation
page read and write
19FC4586000
heap
page read and write
19FC9BCB000
heap
page read and write
19821AF1000
heap
page read and write
666C67D000
stack
page read and write
19821A3F000
heap
page read and write
19E2126B000
heap
page read and write
19FC9869000
heap
page read and write
19FC9902000
heap
page read and write
25BFA470000
heap
page read and write
19FC432A000
heap
page read and write
19FC4B00000
trusted library allocation
page read and write
19FC997C000
heap
page read and write
19FC4394000
heap
page read and write
666C57E000
stack
page read and write
1A9AAC58000
heap
page read and write
19FC9730000
trusted library allocation
page read and write
1A7D3E7D000
heap
page read and write
19FC9AE2000
heap
page read and write
203FE802000
heap
page read and write
1ED3405B000
heap
page read and write
172A78D0000
heap
page read and write
E570B4C000
stack
page read and write
19822000000
heap
page read and write
19FC45F9000
heap
page read and write
19FC9B1F000
heap
page read and write
1A9AAC61000
heap
page read and write
1340EF10000
heap
page read and write
19FC45F9000
heap
page read and write
19FC45AC000
heap
page read and write
19FC4500000
heap
page read and write
19FC9AAD000
heap
page read and write
19FC9B6B000
heap
page read and write
19FC9979000
heap
page read and write
19FC982F000
heap
page read and write
19FC9BC0000
heap
page read and write
484C17C000
stack
page read and write
19FC9B56000
heap
page read and write
41355FB000
stack
page read and write
19FC9861000
heap
page read and write
19FC9AD3000
heap
page read and write
19FC99C2000
heap
page read and write
1ED34060000
heap
page read and write
203FE849000
heap
page read and write
19FC9B5A000
heap
page read and write
19FC45E3000
heap
page read and write
1A9ABA00000
heap
page read and write
203FE913000
heap
page read and write
19FC9977000
heap
page read and write
19FC9AD2000
heap
page read and write
19E21200000
heap
page read and write
19FC9454000
trusted library allocation
page read and write
19FC431D000
heap
page read and write
1F259E25000
heap
page read and write
2198A202000
trusted library allocation
page read and write
19FC9450000
trusted library allocation
page read and write
19821B04000
heap
page read and write
1981C2AC000
heap
page read and write
1FC17054000
heap
page read and write
19FC9A02000
heap
page read and write
1ED3406B000
heap
page read and write
19FC9998000
heap
page read and write
19FC9AD9000
heap
page read and write
19FC9AB8000
heap
page read and write
19FC9AEB000
heap
page read and write
2B29B047000
heap
page read and write
19FC9932000
heap
page read and write
1340EFF8000
heap
page read and write
19FC4200000
heap
page read and write
666C17D000
stack
page read and write
443FAFE000
stack
page read and write
198217C4000
trusted library allocation
page read and write
172A8202000
trusted library allocation
page read and write
1A7D3DB0000
trusted library allocation
page read and write
19FC9A4C000
heap
page read and write
19FC9B33000
heap
page read and write
19FC984F000
heap
page read and write
19FC9862000
heap
page read and write
4135AFC000
stack
page read and write
1FC1703E000
heap
page read and write
19FC9440000
trusted library allocation
page read and write
1A9ABA1A000
heap
page read and write
19FC45F3000
heap
page read and write
1FC16ED0000
heap
page read and write
19FC9B08000
heap
page read and write
19FC9A29000
heap
page read and write
19FC9A21000
heap
page read and write
19821A99000
heap
page read and write
19FC9826000
heap
page read and write
19FC9AE9000
heap
page read and write
19FC45B4000
heap
page read and write
21989B00000
heap
page read and write
1981D5E0000
trusted library allocation
page read and write
19FC9869000
heap
page read and write
1FC17029000
heap
page read and write
19FC9B86000
heap
page read and write
19FC45E0000
heap
page read and write
19FC9BF4000
heap
page read and write
1A7D3E46000
heap
page read and write
2EBEB7C000
stack
page read and write
41359FE000
stack
page read and write
19FC995A000
heap
page read and write
19FC9560000
trusted library allocation
page read and write
1F259E28000
heap
page read and write
198218E0000
trusted library allocation
page read and write
21989A7C000
heap
page read and write
19FC9848000
heap
page read and write
19FC9834000
heap
page read and write
19FC9A63000
heap
page read and write
19FC92E0000
trusted library allocation
page read and write
19E21213000
heap
page read and write
19FC45FA000
heap
page read and write
19FC985F000
heap
page read and write
1981CB13000
heap
page read and write
19FC4575000
heap
page read and write
1981D220000
trusted library section
page readonly
203FE610000
heap
page read and write
19FC9834000
heap
page read and write
19FC39B0000
trusted library allocation
page read and write
1ED3405C000
heap
page read and write
1E660FC000
stack
page read and write
19FC982D000
heap
page read and write
19FC9B0C000
heap
page read and write
19FC3A29000
heap
page read and write
1981C9F3000
trusted library allocation
page read and write
19FC92F4000
trusted library allocation
page read and write
1E661FF000
stack
page read and write
19FC99BC000
heap
page read and write
19FC9B19000
heap
page read and write
19FC9AED000
heap
page read and write
19FC43F4000
heap
page read and write
1A9AB5A1000
heap
page read and write
19FC9839000
heap
page read and write
19FC9B8C000
heap
page read and write
19E21010000
heap
page read and write
19FC9A0B000
heap
page read and write
1A9AAC29000
heap
page read and write
19FC99B9000
heap
page read and write
1A9AACC6000
heap
page read and write
19E21B00000
heap
page read and write
7EFC47E000
stack
page read and write
25BFA602000
heap
page read and write
1ED34100000
heap
page read and write
19FC9120000
trusted library allocation
page read and write
19FC9826000
heap
page read and write
484C27B000
stack
page read and write
19FC43EF000
heap
page read and write
19FC9869000
heap
page read and write
198217C0000
trusted library allocation
page read and write
19FC4400000
heap
page read and write
1981CB00000
heap
page read and write
19FC92F0000
trusted library allocation
page read and write
19FC9856000
heap
page read and write
19FC9670000
trusted library allocation
page read and write
1A9AB5C8000
heap
page read and write
19FC9810000
heap
page read and write
19FC45F9000
heap
page read and write
1E65E7C000
stack
page read and write
19FC993C000
heap
page read and write
1340F055000
heap
page read and write
19FC9B1B000
heap
page read and write
19FC9A42000
heap
page read and write
19FC9AF3000
heap
page read and write
19FC9826000
heap
page read and write
19FC43B1000
heap
page read and write
19FC9862000
heap
page read and write
25BFA66F000
heap
page read and write
19FC9998000
heap
page read and write
2B29B802000
trusted library allocation
page read and write
19FC92FA000
trusted library allocation
page read and write
19FC9A02000
heap
page read and write
19FC99E7000
heap
page read and write
19FC9979000
heap
page read and write
19FC43F7000
heap
page read and write
666C07E000
stack
page read and write
1A9AAC60000
heap
page read and write
19FC92FC000
trusted library allocation
page read and write
19FC9A7E000
heap
page read and write
1A7D3E60000
heap
page read and write
19FC92EC000
trusted library allocation
page read and write
1F259E00000
heap
page read and write
19FC9A03000
heap
page read and write
19FC99C5000
heap
page read and write
1981C9F0000
trusted library allocation
page read and write
19821A76000
heap
page read and write
19FC9A1C000
heap
page read and write
19FC9951000
heap
page read and write
19E212D6000
heap
page read and write
19FC9862000
heap
page read and write
19FC9850000
heap
page read and write
1ED3406B000
heap
page read and write
19821A78000
heap
page read and write
23F36F7000
stack
page read and write
1FC16F30000
heap
page read and write
19FC9B88000
heap
page read and write
19FC9925000
heap
page read and write
19FC9A00000
heap
page read and write
666BDFF000
stack
page read and write
1ED34062000
heap
page read and write
19FC99B6000
heap
page read and write
19FC9998000
heap
page read and write
19FC94C0000
trusted library allocation
page read and write
19FC9AE7000
heap
page read and write
1A9AABE0000
remote allocation
page read and write
19FC99C7000
heap
page read and write
19FC4563000
heap
page read and write
19FC92F8000
trusted library allocation
page read and write
1A9AAC5E000
heap
page read and write
19FC43EB000
heap
page read and write
1FC17000000
heap
page read and write
19FC9A32000
heap
page read and write
1A7D3E50000
heap
page read and write
1A7D3E29000
heap
page read and write
19FC9A4D000
heap
page read and write
19FC9ADA000
heap
page read and write
1A7D3E62000
heap
page read and write
19FC9AF5000
heap
page read and write
1981C274000
heap
page read and write
19FC993B000
heap
page read and write
1A9AAD16000
heap
page read and write
1A7D3E4E000
heap
page read and write
1FC17802000
trusted library allocation
page read and write
19FC9410000
trusted library allocation
page read and write
1FC16F60000
trusted library allocation
page read and write
19FC4202000
heap
page read and write
1981C23D000
heap
page read and write
19FC982D000
heap
page read and write
1A9AACB8000
heap
page read and write
19FC9BDF000
heap
page read and write
19FC50D0000
trusted library section
page readonly
19FC9979000
heap
page read and write
2B29B670000
remote allocation
page read and write
19FC99B4000
heap
page read and write
1981CB18000
heap
page read and write
19FC9993000
heap
page read and write
1340F1F5000
heap
page read and write
1ED34044000
heap
page read and write
203FE5B0000
heap
page read and write
43F347E000
stack
page read and write
19FC9BB9000
heap
page read and write
19FC3A65000
heap
page read and write
484C3F7000
stack
page read and write
1ED3405E000
heap
page read and write
23F337F000
stack
page read and write
19FC9AE3000
heap
page read and write
19FC9A05000
heap
page read and write
1ED34013000
heap
page read and write
1F259D90000
heap
page read and write
1981CB18000
heap
page read and write
1A7D3E7A000
heap
page read and write
1A9AB582000
heap
page read and write
2B29B002000
heap
page read and write
1A7D3E3D000
heap
page read and write
7EFC57E000
stack
page read and write
19FC9BC0000
heap
page read and write
1ED3405D000
heap
page read and write
25BFA65A000
heap
page read and write
19FC9B40000
heap
page read and write
19FC99E4000
heap
page read and write
19FC99FC000
heap
page read and write
172A7A00000
heap
page read and write
19FC9AA4000
heap
page read and write
19FC9A02000
heap
page read and write
19FC9490000
trusted library allocation
page read and write
1FC17013000
heap
page read and write
19FC945C000
trusted library allocation
page read and write
11FAA7A000
stack
page read and write
666B8F9000
stack
page read and write
19FC9460000
trusted library allocation
page read and write
19FC9900000
heap
page read and write
203FE83C000
heap
page read and write
11FA97F000
stack
page read and write
19FC9B76000
heap
page read and write
19FC9B5E000
heap
page read and write
203FEE02000
trusted library allocation
page read and write
1A9AB582000
heap
page read and write
203FE84A000
heap
page read and write
19FC9450000
trusted library allocation
page read and write
19FC932E000
trusted library allocation
page read and write
19FC9BEB000
heap
page read and write
19FC9440000
trusted library allocation
page read and write
1982178E000
trusted library allocation
page read and write
19FC99C8000
heap
page read and write
19821A2D000
heap
page read and write
19FC9C02000
heap
page read and write
172A7A3C000
heap
page read and write
19FC993D000
heap
page read and write
AA2257D000
stack
page read and write
19FC9A5A000
heap
page read and write
19FC9861000
heap
page read and write
F9E6F7F000
stack
page read and write
41352FA000
stack
page read and write
19FC92E0000
trusted library allocation
page read and write
19FC9A2C000
heap
page read and write
19FC92E0000
trusted library allocation
page read and write
21989A02000
heap
page read and write
19821788000
trusted library allocation
page read and write
19FC99E0000
heap
page read and write
19FC9BF6000
heap
page read and write
1340EFA0000
trusted library allocation
page read and write
19FC9ABC000
heap
page read and write
19FC4D80000
trusted library allocation
page read and write
19FC431D000
heap
page read and write
19FC997D000
heap
page read and write
19FC93B0000
remote allocation
page read and write
19FC993E000
heap
page read and write
19FC9B51000
heap
page read and write
19FC9B7A000
heap
page read and write
19FC9520000
trusted library allocation
page read and write
19FC9454000
trusted library allocation
page read and write
19FC9450000
trusted library allocation
page read and write
F9E707D000
stack
page read and write
19FC92F2000
trusted library allocation
page read and write
19FC9A29000
heap
page read and write
19FC9BC2000
heap
page read and write
19FC4577000
heap
page read and write
19FC45BE000
heap
page read and write
19FC99E4000
heap
page read and write
23F34FF000
stack
page read and write
19FC9A55000
heap
page read and write
19821A21000
heap
page read and write
23F347C000
stack
page read and write
19FC9440000
trusted library allocation
page read and write
1F25A125000
heap
page read and write
2B29AFE0000
trusted library allocation
page read and write
19FC41F0000
trusted library allocation
page read and write
19FC4371000
heap
page read and write
19FC9973000
heap
page read and write
1F259E40000
heap
page read and write
19FC9924000
heap
page read and write
19FC5120000
trusted library allocation
page read and write
172A7930000
heap
page read and write
19FC9A8A000
heap
page read and write
19FC9BF2000
heap
page read and write
11FA9F9000
stack
page read and write
1981D5C1000
trusted library allocation
page read and write
21989A59000
heap
page read and write
19FC9AE0000
heap
page read and write
1F259E23000
heap
page read and write
1981C28C000
heap
page read and write
AA22A7E000
stack
page read and write
25BFA650000
heap
page read and write
19FC9B77000
heap
page read and write
19FC9869000
heap
page read and write
1981C313000
heap
page read and write
443FC7B000
stack
page read and write
AA2227F000
stack
page read and write
19FC9B69000
heap
page read and write
19FC9B71000
heap
page read and write
172A7B02000
heap
page read and write
19FC9A29000
heap
page read and write
19FC9802000
heap
page read and write
1340F03C000
heap
page read and write
19FC45F9000
heap
page read and write
19FC45F9000
heap
page read and write
19FC92C0000
trusted library allocation
page read and write
1A9AB582000
heap
page read and write
1A7D3E67000
heap
page read and write
AA2287F000
stack
page read and write
19FC9A82000
heap
page read and write
1ED33DA0000
heap
page read and write
5D5D2FF000
stack
page read and write
19FC9855000
heap
page read and write
1A9ABA02000
heap
page read and write
19FC993C000
heap
page read and write
19E2123E000
heap
page read and write
19FC9B7C000
heap
page read and write
1A9AB500000
heap
page read and write
19821AF9000
heap
page read and write
666B57A000
stack
page read and write
1A7D3E39000
heap
page read and write
AA2217B000
stack
page read and write
1ED34113000
heap
page read and write
19FC982D000
heap
page read and write
172A7A62000
heap
page read and write
19821660000
trusted library allocation
page read and write
19FC3A76000
heap
page read and write
19FC945C000
trusted library allocation
page read and write
172A7B13000
heap
page read and write
19E21A02000
heap
page read and write
19FC9998000
heap
page read and write
11FAB7F000
stack
page read and write
19FC9A5E000
heap
page read and write
1981C291000
heap
page read and write
19FC9BF0000
heap
page read and write
19FC9AC2000
heap
page read and write
19FC45CB000
heap
page read and write
172A7A5C000
heap
page read and write
198217A0000
trusted library allocation
page read and write
19FC9360000
trusted library allocation
page read and write
1A7D3E63000
heap
page read and write
1A9AB582000
heap
page read and write
F9E67DB000
stack
page read and write
19FC9B6C000
heap
page read and write
19FC9450000
trusted library allocation
page read and write
25BFA664000
heap
page read and write
19FC9B0A000
heap
page read and write
1A7D3E4D000
heap
page read and write
19FC9A47000
heap
page read and write
19FC9BFC000
heap
page read and write
19FC9834000
heap
page read and write
F9E6EFE000
stack
page read and write
1E65FFB000
stack
page read and write
19FC9A6D000
heap
page read and write
1F259E11000
heap
page read and write
19FC3A13000
heap
page read and write
1A9ABA02000
heap
page read and write
21989A28000
heap
page read and write
19FC3A68000
heap
page read and write
19FC9B8A000
heap
page read and write
19FC92EE000
trusted library allocation
page read and write
1A7D3E40000
heap
page read and write
1981C26F000
heap
page read and write
19FC9B67000
heap
page read and write
666BBFE000
stack
page read and write
19FC9B47000
heap
page read and write
19FC9A29000
heap
page read and write
19FC99BA000
heap
page read and write
484C4FE000
stack
page read and write
2B29B000000
heap
page read and write
1981CA00000
heap
page read and write
19FC9927000
heap
page read and write
19FC459F000
heap
page read and write
19FC9942000
heap
page read and write
1A9AB564000
heap
page read and write
19FC99DC000
heap
page read and write
19FC9AA1000
heap
page read and write
1A7D3E4B000
heap
page read and write
19FC9979000
heap
page read and write
19FC9450000
trusted library allocation
page read and write
19FC993C000
heap
page read and write
484C5FA000
stack
page read and write
21989930000
heap
page read and write
19FC982F000
heap
page read and write
19FC9902000
heap
page read and write
1A9AAC62000
heap
page read and write
19FC9A3E000
heap
page read and write
19FC9834000
heap
page read and write
19FC9673000
trusted library allocation
page read and write
19FC9869000
heap
page read and write
1340F200000
trusted library allocation
page read and write
19FC99F2000
heap
page read and write
19FC9A02000
heap
page read and write
19FC9A92000
heap
page read and write
19FC9BC0000
heap
page read and write
203FE84E000
heap
page read and write
198218E0000
remote allocation
page read and write
19FCA010000
heap
page read and write
19FC9A29000
heap
page read and write
1981C200000
heap
page read and write
2EBEA79000
stack
page read and write
203FE88A000
heap
page read and write
19FC9A02000
heap
page read and write
19FC9979000
heap
page read and write
1A9AAD02000
heap
page read and write
19FC9858000
heap
page read and write
2B29B670000
remote allocation
page read and write
5D5D17E000
stack
page read and write
19FC456A000
heap
page read and write
1A9AB582000
heap
page read and write
19FC92F2000
trusted library allocation
page read and write
19FC93B0000
remote allocation
page read and write
19FC9A8A000
heap
page read and write
1981C880000
trusted library allocation
page read and write
19FC9BF8000
heap
page read and write
19821AF6000
heap
page read and write
19FC9975000
heap
page read and write
1ED3409D000
heap
page read and write
19FC9BB9000
heap
page read and write
198217A4000
trusted library allocation
page read and write
19FC9924000
heap
page read and write
1981D230000
trusted library section
page readonly
19FC932E000
trusted library allocation
page read and write
1981CA15000
heap
page read and write
19FC9A07000
heap
page read and write
19FC9AE6000
heap
page read and write
172A7A27000
heap
page read and write
19FC9A02000
heap
page read and write
1A9AB566000
heap
page read and write
19FC456A000
heap
page read and write
1A7D3E00000
heap
page read and write
19E212CD000
heap
page read and write
19FC982F000
heap
page read and write
41353FE000
stack
page read and write
172A7A67000
heap
page read and write
19FC9B42000
heap
page read and write
1A9AACE7000
heap
page read and write
19FC9B90000
heap
page read and write
19FC982D000
heap
page read and write
444027F000
unkown
page read and write
19FC9A29000
heap
page read and write
172A7B00000
heap
page read and write
19FC9976000
heap
page read and write
19FC982F000
heap
page read and write
666C275000
stack
page read and write
19FC9ADE000
heap
page read and write
19FC9A9D000
heap
page read and write
19FC9B49000
heap
page read and write
203FE829000
heap
page read and write
1A7D3E30000
heap
page read and write
666B47B000
stack
page read and write
19FC9B13000
heap
page read and write
19FC9993000
heap
page read and write
25BFA570000
trusted library allocation
page read and write
1F259D70000
heap
page read and write
198217B0000
trusted library allocation
page read and write
1340F03C000
heap
page read and write
2B29AE80000
heap
page read and write
19FC9300000
trusted library allocation
page read and write
E571177000
stack
page read and write
19FC45E9000
heap
page read and write
19FC9A29000
heap
page read and write
19FC9B31000
heap
page read and write
19FC9834000
heap
page read and write
19FC9A09000
heap
page read and write
19FC9B35000
heap
page read and write
2B29B670000
remote allocation
page read and write
666B9FA000
stack
page read and write
19FC9B5B000
heap
page read and write
19FC99CF000
heap
page read and write
25BFA63D000
heap
page read and write
1981C256000
heap
page read and write
1340FDA0000
trusted library allocation
page read and write
19E212C5000
heap
page read and write
19FC50C0000
trusted library section
page readonly
19FC9BA9000
heap
page read and write
19FC92F8000
trusted library allocation
page read and write
21989B02000
heap
page read and write
19FC99CF000
heap
page read and write
19FC9861000
heap
page read and write
19FC99E7000
heap
page read and write
2EBEC7E000
stack
page read and write
1340F1E0000
heap
page readonly
1A9AB566000
heap
page read and write
19FC9905000
heap
page read and write
1340EDD0000
heap
page read and write
666C37E000
stack
page read and write
25BFA675000
heap
page read and write
19FC9838000
heap
page read and write
19FC983C000
heap
page read and write
484C2FE000
stack
page read and write
1A9AAB40000
heap
page read and write
1ED34074000
heap
page read and write
19FC9A74000
heap
page read and write
19FC3B8E000
heap
page read and write
484BD1C000
stack
page read and write
19FC9302000
trusted library allocation
page read and write
19FC9975000
heap
page read and write
E57127F000
stack
page read and write
19FC9A29000
heap
page read and write
19FC9AF1000
heap
page read and write
5D5D5FF000
stack
page read and write
19FC50E0000
trusted library section
page readonly
19FC94A0000
trusted library allocation
page read and write
443FDF7000
stack
page read and write
19FC9B03000
heap
page read and write
19FC9B3B000
heap
page read and write
19FC9A79000
heap
page read and write
1A7D3E64000
heap
page read and write
19FC992C000
heap
page read and write
19FC92F6000
trusted library allocation
page read and write
19FC9975000
heap
page read and write
25BFA702000
heap
page read and write
5D5D4FE000
stack
page read and write
19FC9861000
heap
page read and write
19FC9720000
trusted library allocation
page read and write
19FC9B0F000
heap
page read and write
19FC9853000
heap
page read and write
19FC982D000
heap
page read and write
19FC9A78000
heap
page read and write
19FC3A43000
heap
page read and write
1FC17002000
heap
page read and write
1A9AB513000
heap
page read and write
F9E6B7E000
stack
page read and write
19FC45F9000
heap
page read and write
1A7D3E13000
heap
page read and write
172A7A5A000
heap
page read and write
19FC9A4F000
heap
page read and write
19FC9A1A000
heap
page read and write
19FC9BE1000
heap
page read and write
19FC9924000
heap
page read and write
19FC9B2B000
heap
page read and write
19FC993E000
heap
page read and write
1A9AB5A4000
heap
page read and write
198218B0000
trusted library allocation
page read and write
19FCA010000
heap
page read and write
19FC9A45000
heap
page read and write
1A7D3E6B000
heap
page read and write
1A9AB575000
heap
page read and write
19FC9A07000
heap
page read and write
19FC38B0000
heap
page read and write
19FC9B7F000
heap
page read and write
19FC9B26000
heap
page read and write
21989990000
heap
page read and write
19FC92F0000
trusted library allocation
page read and write
19FC92E5000
trusted library allocation
page read and write
19FC99E7000
heap
page read and write
43F327F000
stack
page read and write
19FC9454000
trusted library allocation
page read and write
19FC9834000
heap
page read and write
25BFA600000
heap
page read and write
19E212BC000
heap
page read and write
19FC91B0000
trusted library allocation
page read and write
666B77F000
stack
page read and write
19FC9A2A000
heap
page read and write
19FC99C2000
heap
page read and write
1981CB02000
heap
page read and write
19FC9B4F000
heap
page read and write
19FC9993000
heap
page read and write
19FC9A02000
heap
page read and write
1340FD40000
trusted library allocation
page read and write
203FE5A0000
heap
page read and write
25BFAE02000
trusted library allocation
page read and write
1F259E2E000
heap
page read and write
19FC9A9A000
heap
page read and write
19FC99FE000
heap
page read and write
19FC9A02000
heap
page read and write
19FC9B6E000
heap
page read and write
19FC9B24000
heap
page read and write
1A9AB56A000
heap
page read and write
7EFC67F000
stack
page read and write
1340FB30000
trusted library allocation
page read and write
19FC9979000
heap
page read and write
172A78C0000
heap
page read and write
19FC45B0000
heap
page read and write
1F259E27000
heap
page read and write
43F3378000
stack
page read and write
1340FD50000
trusted library allocation
page read and write
19FC99CF000
heap
page read and write
1A9AAAE0000
heap
page read and write
1981C288000
heap
page read and write
19FC9B89000
heap
page read and write
19FC9855000
heap
page read and write
E570F7B000
stack
page read and write
19FC984D000
heap
page read and write
19FC9BCF000
heap
page read and write
19FC9A0D000
heap
page read and write
19FC9813000
heap
page read and write
1A9ABA02000
heap
page read and write
19FC9430000
trusted library allocation
page read and write
19FC9A43000
heap
page read and write
19FC99EB000
heap
page read and write
19821B02000
heap
page read and write
19FC9A03000
heap
page read and write
19E21302000
heap
page read and write
4134E7B000
stack
page read and write
19FC4302000
heap
page read and write
19FC9834000
heap
page read and write
19FC993F000
heap
page read and write
19FC9993000
heap
page read and write
1981C990000
trusted library section
page read and write
1FC1704E000
heap
page read and write
19FC9130000
trusted library allocation
page read and write
19FC9420000
trusted library allocation
page read and write
19FC9B43000
heap
page read and write
19821AEA000
heap
page read and write
1A9AB571000
heap
page read and write
21989A7A000
heap
page read and write
19FC9B3E000
heap
page read and write
19FC9A2E000
heap
page read and write
19FC9B8E000
heap
page read and write
19E21080000
heap
page read and write
19FC9834000
heap
page read and write
1F25A120000
heap
page read and write
19FC9940000
heap
page read and write
19FC936C000
trusted library allocation
page read and write
5D5D3FE000
stack
page read and write
1FC17102000
heap
page read and write
19FC4FC0000
trusted library allocation
page read and write
19FC92E8000
trusted library allocation
page read and write
203FE908000
heap
page read and write
43F34FC000
stack
page read and write
19FC3A74000
heap
page read and write
172A7A93000
heap
page read and write
19FC9BC2000
heap
page read and write
19FC9BD1000
heap
page read and write
41354FA000
stack
page read and write
19FC92E5000
trusted library allocation
page read and write
19FC9838000
heap
page read and write
19FC9A02000
heap
page read and write
19FC982F000
heap
page read and write
E57137F000
stack
page read and write
E570BCE000
stack
page read and write
172A7A29000
heap
page read and write
19FC9A05000
heap
page read and write
19FC9345000
trusted library allocation
page read and write
1E65DFE000
stack
page read and write
19FC94E0000
trusted library allocation
page read and write
19FC9B46000
heap
page read and write
19FC9A38000
heap
page read and write
1A7D3E45000
heap
page read and write
1A7D3E82000
heap
page read and write
19FC9BDD000
heap
page read and write
25BFA677000
heap
page read and write
19FC45DA000
heap
page read and write
1E662FE000
stack
page read and write
19FC9A34000
heap
page read and write
1340EDE0000
trusted library allocation
page read and write
E570E7E000
stack
page read and write
1A9ABA44000
heap
page read and write
43F33FF000
stack
page read and write
1A7D3D20000
heap
page read and write
19FC3A00000
heap
page read and write
19FC45A8000
heap
page read and write
25BFA613000
heap
page read and write
666BEFE000
stack
page read and write
19FC9B61000
heap
page read and write
4135CFE000
stack
page read and write
484BD9E000
stack
page read and write
19FC45F9000
heap
page read and write
198218A0000
trusted library allocation
page read and write
19FC3BC2000
heap
page read and write
19FC45FC000
heap
page read and write
19FC445A000
heap
page read and write
19FC3BEB000
heap
page read and write
1A7D3E23000
heap
page read and write
443FFFA000
stack
page read and write
19FC4458000
heap
page read and write
19FC9975000
heap
page read and write
23F38FD000
stack
page read and write
1A9AAC3C000
heap
page read and write
19FC932A000
trusted library allocation
page read and write
25BFA713000
heap
page read and write
19FC4552000
heap
page read and write
19FC3A88000
heap
page read and write
21989A13000
heap
page read and write
666C277000
stack
page read and write
19FC9A0B000
heap
page read and write
19FC9A15000
heap
page read and write
172A7B08000
heap
page read and write
F9E6DFE000
stack
page read and write
11FABF9000
stack
page read and write
666BD7E000
stack
page read and write
19FC99F1000
heap
page read and write
43F32FE000
stack
page read and write
203FE813000
heap
page read and write
19FC9993000
heap
page read and write
19FC9450000
trusted library allocation
page read and write
19E21264000
heap
page read and write
19FC9914000
heap
page read and write
19FC9924000
heap
page read and write
19FC9A29000
heap
page read and write
19FC9967000
heap
page read and write
19FC9440000
trusted library allocation
page read and write
5D5D0FE000
stack
page read and write
11FA87C000
stack
page read and write
1A9AAC82000
heap
page read and write
172A7A81000
heap
page read and write
1A9AACA6000
heap
page read and write
19FC9300000
trusted library allocation
page read and write
1A9AB5A1000
heap
page read and write
19821AF7000
heap
page read and write
19FC9869000
heap
page read and write
19FC9A1E000
heap
page read and write
E57107B000
stack
page read and write
666BE7E000
stack
page read and write
203FE900000
heap
page read and write
203FE84B000
heap
page read and write
19FC9906000
heap
page read and write
1A7D3E79000
heap
page read and write
19FC9A3A000
heap
page read and write
19FC99E4000
heap
page read and write
19FC993C000
heap
page read and write
19FC9A20000
heap
page read and write
19FC9993000
heap
page read and write
1340EFF0000
heap
page read and write
19FC99FB000
heap
page read and write
19FC92DC000
trusted library allocation
page read and write
19FC9B5D000
heap
page read and write
1340EFE0000
trusted library allocation
page read and write
There are 1231 hidden memdumps, click here to show them.