IOC Report
berniesbooksdocument08.11.doc

loading gif

Files

File Path
Type
Category
Malicious
berniesbooksdocument08.11.doc
Zip archive data, at least v2.0 to extract
initial sample
malicious
C:\Users\user\AppData\Local\Temp\~DF94C757FE548F974F.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\berniesbooksdocument08.11.doc.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:46 2022, mtime=Fri Aug 12 01:41:20 2022, atime=Fri Aug 12 01:41:12 2022, length=2204163, window=hide
dropped
malicious
C:\Users\user\AppData\Local\Temp\~DF3A92CAFB515529E4.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\9776AE02-6E66-4695-8702-04ED8D3C50EB
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\52BE902B.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\FEF36052.png
PNG image data, 410 x 568, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{4A67762D-93FC-414F-B3FB-2E9A2A2CA3C8}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{DAD70EA0-457E-4A69-832F-387C53F7CCB5}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\Desktop\~$rniesbooksdocument08.11.doc
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2C8C6B7.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8B3E014C.png
PNG image data, 410 x 568, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{D69EE7C2-6FC9-4A05-9932-D4D73388F055}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E29B2BA9-2924-4F6F-8779-DE6D8CBEE673}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E5E145EA-C40A-4F3A-BAE3-C51B4A75339D}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\berniesbooksdocument08.11.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:58 2022, mtime=Tue Mar 8 15:45:58 2022, atime=Fri Aug 12 01:34:17 2022, length=2204163, window=hide
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding

URLs

Name
IP
Malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://my.microsoftpersonalcontent.com
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
https://api.powerbi.com/beta/myorg/imports
unknown
https://devnull.onenote.com
unknown
https://messaging.action.office.com/
unknown
https://ncus.pagecontentsync.
unknown
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
unknown
https://messaging.office.com/
unknown
https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.8.146.139
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
>a7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
?a7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
)d7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
)q7
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\1E8F4
1E8F4
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2DB05
2DB05
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2DB05
2DB05
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
!!-
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
x"-
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
6%-
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\674E2
674E2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\7A60F
7A60F
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\7A60F
7A60F
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 406 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
19EDD449000
heap
page read and write
22B69AC8000
trusted library allocation
page read and write
253EF84B000
heap
page read and write
22B6E745000
heap
page read and write
22B6E981000
heap
page read and write
22B6E8B0000
heap
page read and write
1FEECF02000
heap
page read and write
19EDDD13000
heap
page read and write
22B6E74B000
heap
page read and write
22B6E78D000
heap
page read and write
22B689ED000
heap
page read and write
22B6E62F000
heap
page read and write
2AB16EC0000
heap
page read and write
1FF06000000
heap
page read and write
22B6E849000
heap
page read and write
307937F000
stack
page read and write
23230B13000
heap
page read and write
22B6E735000
heap
page read and write
2771DE83000
heap
page read and write
22B6E0BC000
trusted library allocation
page read and write
22B6E661000
heap
page read and write
22B6E1A0000
trusted library allocation
page read and write
2ED327B000
stack
page read and write
22B6E9E2000
heap
page read and write
22B6E8E8000
heap
page read and write
22B6E7FC000
heap
page read and write
22B6E050000
trusted library allocation
page read and write
22B69167000
heap
page read and write
19EDD4E5000
heap
page read and write
1E96A402000
heap
page read and write
22B69DF0000
trusted library section
page readonly
22B6E9E2000
heap
page read and write
213F84E0000
trusted library allocation
page read and write
22B6E983000
heap
page read and write
2771DF02000
heap
page read and write
91B9877000
stack
page read and write
22B6E8F0000
heap
page read and write
22B6E030000
trusted library allocation
page read and write
22B6E734000
heap
page read and write
253EF849000
heap
page read and write
22B6E602000
heap
page read and write
307967B000
stack
page read and write
22B6E8E8000
heap
page read and write
22B6E600000
heap
page read and write
5BE38FF000
stack
page read and write
19EDDD86000
heap
page read and write
19EDE202000
heap
page read and write
22B6E042000
trusted library allocation
page read and write
2ED34FB000
stack
page read and write
22B6E669000
heap
page read and write
947CAFF000
stack
page read and write
19EDDAB0000
remote allocation
page read and write
1E109888000
heap
page read and write
2771DF13000
heap
page read and write
22B6E95B000
heap
page read and write
22B6E860000
heap
page read and write
307997E000
stack
page read and write
22B6E9E6000
heap
page read and write
22B6E62F000
heap
page read and write
19EDDD87000
heap
page read and write
22B6E650000
heap
page read and write
22B6E638000
heap
page read and write
1E96A440000
heap
page read and write
2771DE50000
heap
page read and write
238EB958000
heap
page read and write
1FF06010000
heap
page read and write
22B6DE70000
trusted library allocation
page read and write
22B6E96F000
heap
page read and write
22B6E82E000
heap
page read and write
1FF06202000
heap
page read and write
947CCFF000
stack
page read and write
22B6E932000
heap
page read and write
22B6E850000
heap
page read and write
213F8790000
trusted library allocation
page read and write
1E10A002000
heap
page read and write
238F0650000
trusted library allocation
page read and write
253EF82E000
heap
page read and write
253EF86B000
heap
page read and write
22B68F58000
heap
page read and write
22B6E891000
heap
page read and write
22B6E815000
heap
page read and write
213F8540000
trusted library allocation
page read and write
22B6E887000
heap
page read and write
22B69E70000
trusted library allocation
page read and write
22B6E8BC000
heap
page read and write
22B69000000
heap
page read and write
23230B00000
heap
page read and write
22B6E8F9000
heap
page read and write
238F0654000
trusted library allocation
page read and write
19EDE203000
heap
page read and write
22B6883C000
heap
page read and write
19EDDDAD000
heap
page read and write
238EAFE0000
trusted library allocation
page read and write
22B6E8CF000
heap
page read and write
22B6DE80000
trusted library allocation
page read and write
A1A8C7E000
stack
page read and write
22B6E8E8000
heap
page read and write
22B6E8E8000
heap
page read and write
22B6E94C000
heap
page read and write
2AB17113000
heap
page read and write
22B68F1D000
heap
page read and write
22B6E2D0000
trusted library allocation
page read and write
22B6E763000
heap
page read and write
22B6E9D2000
heap
page read and write
22B68873000
heap
page read and write
B29D79E000
stack
page read and write
22B6E3E0000
remote allocation
page read and write
1E96A400000
heap
page read and write
B29DDFF000
stack
page read and write
22B6E8AF000
heap
page read and write
19EDD4C4000
heap
page read and write
22B6E74B000
heap
page read and write
22B6E07A000
trusted library allocation
page read and write
253EF84E000
heap
page read and write
22B6E8EB000
heap
page read and write
22B68FCF000
heap
page read and write
947C27E000
stack
page read and write
22B691E5000
heap
page read and write
22B6E850000
heap
page read and write
22B68879000
heap
page read and write
19EDD429000
heap
page read and write
22B69DE0000
trusted library section
page readonly
22B6E746000
heap
page read and write
1E1098BA000
heap
page read and write
22B6E902000
heap
page read and write
22B6E843000
heap
page read and write
22B6E74B000
heap
page read and write
238F0470000
trusted library allocation
page read and write
22B6E92C000
heap
page read and write
22B6E190000
trusted library allocation
page read and write
22B6E1A0000
trusted library allocation
page read and write
22B6E89B000
heap
page read and write
19EDDD92000
heap
page read and write
2AB17102000
heap
page read and write
22B6E095000
trusted library allocation
page read and write
1FAEABD0000
heap
page read and write
22B68889000
heap
page read and write
238F0902000
heap
page read and write
19EDE202000
heap
page read and write
1FEECD30000
heap
page read and write
22B68590000
heap
page read and write
22B6E93C000
heap
page read and write
22B6E714000
heap
page read and write
22B6E653000
heap
page read and write
22B6E99B000
heap
page read and write
22B6E662000
heap
page read and write
22B6885B000
heap
page read and write
22B6E818000
heap
page read and write
22B6E86A000
heap
page read and write
22B6E78A000
heap
page read and write
22B6E715000
heap
page read and write
22B6E715000
heap
page read and write
19EDDD77000
heap
page read and write
238EB802000
heap
page read and write
238EC0F0000
trusted library section
page readonly
253EF874000
heap
page read and write
22B6E714000
heap
page read and write
22B6E1A4000
trusted library allocation
page read and write
22B6E7AA000
heap
page read and write
2ED36FE000
stack
page read and write
1E109760000
heap
page read and write
213F78C1000
heap
page read and write
22B6E981000
heap
page read and write
238F08B5000
heap
page read and write
238F090A000
heap
page read and write
22B6E981000
heap
page read and write
1FEECCD0000
heap
page read and write
91B9A7D000
stack
page read and write
91B977B000
stack
page read and write
1FF06302000
heap
page read and write
22B6E881000
heap
page read and write
238F0888000
heap
page read and write
253EF860000
heap
page read and write
22B6E62D000
heap
page read and write
22B68F2E000
heap
page read and write
22B6E040000
trusted library allocation
page read and write
22B6E626000
heap
page read and write
238F08E1000
heap
page read and write
19EDDD52000
heap
page read and write
22B6E8B4000
heap
page read and write
22B691E5000
heap
page read and write
19EDD452000
heap
page read and write
238F08EE000
heap
page read and write
22B6E634000
heap
page read and write
22B6E63F000
heap
page read and write
238EB07A000
heap
page read and write
1E96A429000
heap
page read and write
22B6E8F4000
heap
page read and write
22B6E1A0000
trusted library allocation
page read and write
2ED37FC000
stack
page read and write
48F187E000
stack
page read and write
22B691B4000
heap
page read and write
19EDD44A000
heap
page read and write
1FAEABD0000
heap
page read and write
22B6E744000
heap
page read and write
19EDE244000
heap
page read and write
22B6E868000
heap
page read and write
22B6E7F4000
heap
page read and write
2771DF00000
heap
page read and write
857317B000
stack
page read and write
22B6E924000
heap
page read and write
22B6919C000
heap
page read and write
22B6E7AA000
heap
page read and write
22B6E669000
heap
page read and write
1FAEABB6000
heap
page read and write
22B6887B000
heap
page read and write
22B6E94D000
heap
page read and write
22B6E1A4000
trusted library allocation
page read and write
22B6E011000
trusted library allocation
page read and write
307927F000
stack
page read and write
22B6E8C1000
heap
page read and write
22B6E8DB000
heap
page read and write
22B6E82E000
heap
page read and write
253EF867000
heap
page read and write
238EC460000
trusted library allocation
page read and write
22B6E70C000
heap
page read and write
22B6E9CA000
heap
page read and write
253EF87A000
heap
page read and write
22B6E886000
heap
page read and write
22B6E84B000
heap
page read and write
2ED2E7C000
stack
page read and write
22B6E8EC000
heap
page read and write
2AB17053000
heap
page read and write
307957F000
stack
page read and write
22B6E779000
heap
page read and write
22B6E810000
heap
page read and write
22B6E04E000
trusted library allocation
page read and write
22B6E03E000
trusted library allocation
page read and write
238EBB01000
trusted library allocation
page read and write
22B6E947000
heap
page read and write
22B6E752000
heap
page read and write
22B6E772000
heap
page read and write
8EEDDFF000
stack
page read and write
22B6E0B0000
trusted library allocation
page read and write
22B6E8FD000
heap
page read and write
22B6E981000
heap
page read and write
CFC317D000
stack
page read and write
22B6900A000
heap
page read and write
2AB1703C000
heap
page read and write
22B6E200000
trusted library allocation
page read and write
22B6E7FA000
heap
page read and write
232307D0000
heap
page read and write
2771DE4D000
heap
page read and write
22B68FD9000
heap
page read and write
19EDDD75000
heap
page read and write
19EDDD81000
heap
page read and write
19EDDD89000
heap
page read and write
22B6E8E8000
heap
page read and write
22B6E9E2000
heap
page read and write
22B6E734000
heap
page read and write
22B6E8EB000
heap
page read and write
22B6E010000
trusted library allocation
page read and write
22B68865000
heap
page read and write
238EB102000
heap
page read and write
238F08EC000
heap
page read and write
22B6E9E6000
heap
page read and write
947C2F9000
stack
page read and write
22B6E714000
heap
page read and write
253EF83D000
heap
page read and write
22B6E9CA000
heap
page read and write
22B6E70C000
heap
page read and write
22B6E8EB000
heap
page read and write
238F0640000
trusted library allocation
page read and write
213F8550000
trusted library allocation
page read and write
238EC110000
trusted library section
page readonly
22B6E8C3000
heap
page read and write
22B6E02C000
trusted library allocation
page read and write
22B6E095000
trusted library allocation
page read and write
22B68E02000
heap
page read and write
22B69AC0000
trusted library allocation
page read and write
22B6E921000
heap
page read and write
22B6E835000
heap
page read and write
1FF0623E000
heap
page read and write
23230A5F000
heap
page read and write
22B691A8000
heap
page read and write
22B6E744000
heap
page read and write
22B6E662000
heap
page read and write
22B6E98E000
heap
page read and write
22B6E77E000
heap
page read and write
22B6E990000
heap
page read and write
22B68FF0000
heap
page read and write
22B6E300000
trusted library allocation
page read and write
213F87A0000
heap
page readonly
22B6E8BE000
heap
page read and write
22B6E610000
heap
page read and write
1E109813000
heap
page read and write
22B6E9A3000
heap
page read and write
19EDDD9D000
heap
page read and write
22B6E714000
heap
page read and write
19EDD489000
heap
page read and write
238EC0E0000
trusted library section
page readonly
213F78FD000
heap
page read and write
22B6E967000
heap
page read and write
22B6E626000
heap
page read and write
22B6E8FD000
heap
page read and write
22B6E7C7000
heap
page read and write
2AB17088000
heap
page read and write
22B6E9E2000
heap
page read and write
22B6E035000
trusted library allocation
page read and write
91B94FE000
stack
page read and write
238F0913000
heap
page read and write
1FF0622F000
heap
page read and write
22B6E983000
heap
page read and write
2AB1704A000
heap
page read and write
23230A56000
heap
page read and write
1FAEAB90000
heap
page read and write
22B6E8F2000
heap
page read and write
22B6E661000
heap
page read and write
253EF842000
heap
page read and write
A1A8A7B000
stack
page read and write
1FEECE00000
heap
page read and write
CFC288B000
stack
page read and write
22B6E86E000
heap
page read and write
22B6E190000
trusted library allocation
page read and write
22B6E8D1000
heap
page read and write
22B6E62D000
heap
page read and write
22B6E867000
heap
page read and write
19EDDAB0000
remote allocation
page read and write
8572A7B000
stack
page read and write
22B6E180000
trusted library allocation
page read and write
22B68F00000
heap
page read and write
22B6E190000
trusted library allocation
page read and write
22B6E8E0000
heap
page read and write
2771DE7B000
heap
page read and write
22B68870000
heap
page read and write
22B691CF000
heap
page read and write
22B6E669000
heap
page read and write
22B6E62D000
heap
page read and write
22B6E9A0000
heap
page read and write
1FEECE65000
heap
page read and write
22B6E4A0000
trusted library allocation
page read and write
947C78A000
stack
page read and write
2771DE52000
heap
page read and write
2ED347D000
stack
page read and write
22B6E86C000
heap
page read and write
22B6E04A000
trusted library allocation
page read and write
23230A6A000
heap
page read and write
22B6E866000
heap
page read and write
22B697B0000
trusted library allocation
page read and write
22B6E638000
heap
page read and write
22B6E87E000
heap
page read and write
238F0900000
heap
page read and write
22B6E95A000
heap
page read and write
22B6E8E8000
heap
page read and write
253EF813000
heap
page read and write
22B6E64D000
heap
page read and write
22B68FE1000
heap
page read and write
22B6E634000
heap
page read and write
253EF670000
heap
page read and write
85734F9000
stack
page read and write
22B6F010000
heap
page read and write
22B6E1A4000
trusted library allocation
page read and write
22B6E8FD000
heap
page read and write
22B6E88D000
heap
page read and write
91B967B000
stack
page read and write
19EDD44D000
heap
page read and write
1E1098C2000
heap
page read and write
22B6E943000
heap
page read and write
253EF82D000
heap
page read and write
1FEECCC0000
heap
page read and write
23230A13000
heap
page read and write
22B6E868000
heap
page read and write
22B6E669000
heap
page read and write
213F78B9000
heap
page read and write
22B6E0D0000
trusted library allocation
page read and write
19959B00000
heap
page read and write
22B6E03C000
trusted library allocation
page read and write
22B691E5000
heap
page read and write
22B68FC8000
heap
page read and write
213F7C85000
heap
page read and write
1FF06213000
heap
page read and write
22B6E7F5000
heap
page read and write
2AB1704D000
heap
page read and write
22B6E810000
heap
page read and write
22B6F010000
heap
page read and write
22B6E863000
heap
page read and write
22B6E8EB000
heap
page read and write
22B6E953000
heap
page read and write
19959A64000
heap
page read and write
22B6E044000
trusted library allocation
page read and write
22B6E9B3000
heap
page read and write
19EDD450000
heap
page read and write
2771DE3C000
heap
page read and write
238F0866000
heap
page read and write
22B6E8E8000
heap
page read and write
22B6E9CA000
heap
page read and write
253EF84D000
heap
page read and write
22B6E850000
heap
page read and write
4FD98FE000
stack
page read and write
22B6E669000
heap
page read and write
238F04F0000
trusted library allocation
page read and write
253EF770000
trusted library allocation
page read and write
238EAF50000
heap
page read and write
22B6E752000
heap
page read and write
22B68843000
heap
page read and write
22B691FB000
heap
page read and write
22B6E74D000
heap
page read and write
19EDD413000
heap
page read and write
22B691E5000
heap
page read and write
48F167E000
stack
page read and write
253F0002000
trusted library allocation
page read and write
19EDE219000
heap
page read and write
22B6E230000
trusted library allocation
page read and write
238F0750000
trusted library allocation
page read and write
238F08F0000
heap
page read and write
22B6E714000
heap
page read and write
238F0630000
trusted library allocation
page read and write
3079B7F000
stack
page read and write
253EF882000
heap
page read and write
22B6E83E000
heap
page read and write
30794FF000
stack
page read and write
307987E000
stack
page read and write
2AB17029000
heap
page read and write
22B6E190000
trusted library allocation
page read and write
238EB025000
heap
page read and write
5BE357E000
stack
page read and write
22B6E62F000
heap
page read and write
22B6E74D000
heap
page read and write
8572C77000
stack
page read and write
1FEED602000
trusted library allocation
page read and write
1E96A390000
remote allocation
page read and write
19EDDD7D000
heap
page read and write
1FAEABC7000
heap
page read and write
19EDD458000
heap
page read and write
22B6E7E0000
heap
page read and write
22B6E9E6000
heap
page read and write
19EDDC02000
heap
page read and write
213F78FD000
heap
page read and write
22B6E8E9000
heap
page read and write
22B6E030000
trusted library allocation
page read and write
22B6E658000
heap
page read and write
22B6E052000
trusted library allocation
page read and write
22B6E7B7000
heap
page read and write
22B6E90B000
heap
page read and write
23230B08000
heap
page read and write
238EB913000
heap
page read and write
22B6E878000
heap
page read and write
22B6E734000
heap
page read and write
22B6E160000
trusted library allocation
page read and write
22B6E918000
heap
page read and write
22B691CE000
heap
page read and write
2AB16E50000
heap
page read and write
22B6E1AC000
trusted library allocation
page read and write
857337E000
stack
page read and write
213F84D0000
trusted library allocation
page read and write
2771E602000
trusted library allocation
page read and write
22B691CE000
heap
page read and write
22B6E62C000
heap
page read and write
48F1A77000
stack
page read and write
22B6E980000
heap
page read and write
22B68600000
heap
page read and write
23230840000
heap
page read and write
19EDDAB0000
remote allocation
page read and write
19EDD457000
heap
page read and write
22B6E050000
trusted library allocation
page read and write
1FEECE3C000
heap
page read and write
22B6E983000
heap
page read and write
1FAEABB1000
heap
page read and write
19EDDD77000
heap
page read and write
19EDDD87000
heap
page read and write
22B691EB000
heap
page read and write
22B6E735000
heap
page read and write
22B6E8C9000
heap
page read and write
22B691AB000
heap
page read and write
4FD99FE000
stack
page read and write
CFC2EFE000
stack
page read and write
253EF902000
heap
page read and write
22B6E889000
heap
page read and write
22B69002000
heap
page read and write
22B6E62F000
heap
page read and write
22B68F1D000
heap
page read and write
238F0740000
trusted library allocation
page read and write
238F082E000
heap
page read and write
22B6E048000
trusted library allocation
page read and write
22B6E210000
trusted library allocation
page read and write
22B6918F000
heap
page read and write
22B6E88B000
heap
page read and write
253EF861000
heap
page read and write
22B6E958000
heap
page read and write
22B6E1A4000
trusted library allocation
page read and write
22B6E74B000
heap
page read and write
22B6E752000
heap
page read and write
22B69E00000
trusted library section
page readonly
2771DE00000
heap
page read and write
22B69E30000
trusted library section
page readonly
19EDD471000
heap
page read and write
22B6E883000
heap
page read and write
22B6E87A000
heap
page read and write
22B6E7CD000
heap
page read and write
3079C7D000
stack
page read and write
19EDE200000
heap
page read and write
857367B000
stack
page read and write
22B6E9CA000
heap
page read and write
1E96A390000
remote allocation
page read and write
238F0610000
trusted library allocation
page read and write
22B6E626000
heap
page read and write
CFC2DFF000
stack
page read and write
2AB17000000
heap
page read and write
B29DAFB000
stack
page read and write
22B6E1A0000
trusted library allocation
page read and write
22B6E030000
trusted library allocation
page read and write
22B6E70D000
heap
page read and write
22B6E978000
heap
page read and write
22B68891000
heap
page read and write
22B6E626000
heap
page read and write
A1A858E000
stack
page read and write
22B6E9E6000
heap
page read and write
22B6E042000
trusted library allocation
page read and write
22B6E7AA000
heap
page read and write
22B6E845000
heap
page read and write
1E1097F0000
trusted library allocation
page read and write
238EB059000
heap
page read and write
238EB029000
heap
page read and write
238F090D000
heap
page read and write
857327F000
stack
page read and write
22B6E7E7000
heap
page read and write
22B6E62F000
heap
page read and write
22B68FCD000
heap
page read and write
22B6E871000
heap
page read and write
22B69D00000
trusted library allocation
page read and write
22B6E860000
heap
page read and write
22B6E270000
trusted library allocation
page read and write
22B6E8C1000
heap
page read and write
19EDD437000
heap
page read and write
22B6E638000
heap
page read and write
19EDD4AF000
heap
page read and write
23230B02000
heap
page read and write
238F06E0000
trusted library allocation
page read and write
22B6E8EC000
heap
page read and write
22B6E978000
heap
page read and write
B29DCF7000
stack
page read and write
22B691CD000
heap
page read and write
253EF829000
heap
page read and write
22B6E634000
heap
page read and write
19EDDD86000
heap
page read and write
1E109913000
heap
page read and write
22B6E62D000
heap
page read and write
1E1098CB000
heap
page read and write
238EB0A0000
heap
page read and write
22B6E1AC000
trusted library allocation
page read and write
22B6E833000
heap
page read and write
22B6E833000
heap
page read and write
22B6E70C000
heap
page read and write
22B6E83B000
heap
page read and write
22B6E661000
heap
page read and write
238EAF40000
heap
page read and write
2771DE89000
heap
page read and write
23231002000
trusted library allocation
page read and write
22B6E898000
heap
page read and write
22B6E9B1000
heap
page read and write
22B6E9AC000
heap
page read and write
22B6E870000
heap
page read and write
22B6E983000
heap
page read and write
19EDD290000
heap
page read and write
B29D69C000
stack
page read and write
22B6E885000
heap
page read and write
85732FF000
stack
page read and write
19EDD4DD000
heap
page read and write
CFC2FFD000
stack
page read and write
22B6E65C000
heap
page read and write
22B6E998000
heap
page read and write
238EB918000
heap
page read and write
238F0770000
remote allocation
page read and write
22B6E65F000
heap
page read and write
22B6E626000
heap
page read and write
22B6E260000
trusted library allocation
page read and write
22B6E86C000
heap
page read and write
253EF847000
heap
page read and write
22B6E7E9000
heap
page read and write
1FAEAA80000
heap
page read and write
22B6E669000
heap
page read and write
8EEDFFF000
stack
page read and write
22B6E8E5000
heap
page read and write
238F08AD000
heap
page read and write
22B68913000
heap
page read and write
22B69199000
heap
page read and write
22B6E7A6000
heap
page read and write
22B69198000
heap
page read and write
19EDDD95000
heap
page read and write
22B6E72C000
heap
page read and write
1FF0623C000
heap
page read and write
22B6E920000
heap
page read and write
5D364FF000
stack
page read and write
22B6E010000
trusted library allocation
page read and write
22B6E942000
heap
page read and write
19EDD483000
heap
page read and write
22B6E818000
heap
page read and write
19EDD44C000
heap
page read and write
238EB902000
heap
page read and write
1E96A502000
heap
page read and write
238F084E000
heap
page read and write
A1A8D7F000
stack
page read and write
22B6E803000
heap
page read and write
22B6915B000
heap
page read and write
2ED307C000
stack
page read and write
22B6E936000
heap
page read and write
22B6E634000
heap
page read and write
5D365FE000
stack
page read and write
238F0634000
trusted library allocation
page read and write
1E96A2C0000
heap
page read and write
22B6888C000
heap
page read and write
48F1B7E000
stack
page read and write
22B6E62D000
heap
page read and write
CFC2D7C000
stack
page read and write
22B6E929000
heap
page read and write
5BE347B000
stack
page read and write
22B6E7E3000
heap
page read and write
22B6E9E6000
heap
page read and write
238EB094000
heap
page read and write
22B6E1AC000
trusted library allocation
page read and write
22B69143000
heap
page read and write
19EDDDD3000
heap
page read and write
22B691E5000
heap
page read and write
1FEECE29000
heap
page read and write
22B6E9E6000
heap
page read and write
22B6E240000
trusted library allocation
page read and write
22B6DEB0000
trusted library allocation
page read and write
22B6E8D2000
heap
page read and write
1E109902000
heap
page read and write
8EEDEFF000
stack
page read and write
22B6E190000
trusted library allocation
page read and write
48F1979000
stack
page read and write
22B6E8E8000
heap
page read and write
22B6E81D000
heap
page read and write
22B6E63C000
heap
page read and write
22B6E70E000
heap
page read and write
22B6E7C5000
heap
page read and write
3078A7B000
stack
page read and write
22B6E9E6000
heap
page read and write
22B6E62F000
heap
page read and write
22B6E81B000
heap
page read and write
22B6E866000
heap
page read and write
4FD97FC000
stack
page read and write
1E96A413000
heap
page read and write
22B6E872000
heap
page read and write
199599E0000
trusted library allocation
page read and write
8572D7A000
stack
page read and write
1FF06229000
heap
page read and write
2ED38FE000
stack
page read and write
238EB072000
heap
page read and write
22B6E95E000
heap
page read and write
22B6E656000
heap
page read and write
19959A40000
heap
page read and write
1FAEABC6000
heap
page read and write
253EF830000
heap
page read and write
19EDD400000
heap
page read and write
22B6E634000
heap
page read and write
22B6E80C000
heap
page read and write
22B6E04E000
trusted library allocation
page read and write
22B6E946000
heap
page read and write
48F1D77000
stack
page read and write
22B6E9B6000
heap
page read and write
22B6E8DD000
heap
page read and write
22B6E74B000
heap
page read and write
22B6E8AB000
heap
page read and write
22B6E9EE000
heap
page read and write
22B6E7AE000
heap
page read and write
22B6E653000
heap
page read and write
253EF862000
heap
page read and write
22B6E89E000
heap
page read and write
857307D000
stack
page read and write
22B6E03E000
trusted library allocation
page read and write
1FEECE02000
heap
page read and write
22B6E65B000
heap
page read and write
19EDDD87000
heap
page read and write
22B6901C000
heap
page read and write
1FF06251000
heap
page read and write
213F7840000
heap
page read and write
22B6E8E3000
heap
page read and write
22B6E9CA000
heap
page read and write
22B6E9CA000
heap
page read and write
19EDDD7F000
heap
page read and write
22B6E180000
trusted library allocation
page read and write
22B6E915000
heap
page read and write
19EDD4EF000
heap
page read and write
238F0730000
trusted library allocation
page read and write
22B6E62D000
heap
page read and write
22B6E734000
heap
page read and write
22B6E9AA000
heap
page read and write
22B6E038000
trusted library allocation
page read and write
22B6E62F000
heap
page read and write
22B6E87C000
heap
page read and write
22B6E734000
heap
page read and write
213F78F5000
heap
page read and write
22B6E738000
heap
page read and write
238F08EE000
heap
page read and write
238F0770000
remote allocation
page read and write
1FAEAAA0000
heap
page read and write
22B6E669000
heap
page read and write
1E96A360000
trusted library allocation
page read and write
22B6E655000
heap
page read and write
238F0815000
heap
page read and write
22B6E0F0000
remote allocation
page read and write
22B6E7AA000
heap
page read and write
3078EFB000
stack
page read and write
22B6E74D000
heap
page read and write
22B6E7AC000
heap
page read and write
22B6E846000
heap
page read and write
22B6DF00000
trusted library allocation
page read and write
CFC2C7E000
stack
page read and write
1E109829000
heap
page read and write
22B6E92E000
heap
page read and write
22B691E5000
heap
page read and write
22B6E626000
heap
page read and write
CFC307E000
stack
page read and write
23230A64000
heap
page read and write
238EB057000
heap
page read and write
253EF845000
heap
page read and write
19EDDD77000
heap
page read and write
22B6E8E8000
heap
page read and write
22B6E8EC000
heap
page read and write
3078CFF000
stack
page read and write
19EDD44B000
heap
page read and write
22B687D0000
trusted library allocation
page read and write
22B6E95F000
heap
page read and write
2AB17802000
trusted library allocation
page read and write
238EB090000
heap
page read and write
19EDD4CB000
heap
page read and write
1FEECD60000
trusted library allocation
page read and write
22B6E62F000
heap
page read and write
19EDD453000
heap
page read and write
22B689C4000
heap
page read and write
2771DC60000
heap
page read and write
2AB17050000
heap
page read and write
22B6E872000
heap
page read and write
B29D71F000
stack
page read and write
1FAEABC3000
heap
page read and write
2AB17013000
heap
page read and write
238EB077000
heap
page read and write
22B6E9EB000
heap
page read and write
22B6E8A4000
heap
page read and write
22B6E7AB000
heap
page read and write
238F0631000
trusted library allocation
page read and write
22B6E9AF000
heap
page read and write
238F061E000
trusted library allocation
page read and write
22B6E9E6000
heap
page read and write
2ED35FE000
stack
page read and write
22B6E84E000
heap
page read and write
22B6E7B7000
heap
page read and write
947C3FE000
stack
page read and write
2AB17051000
heap
page read and write
19EDD455000
heap
page read and write
22B6E661000
heap
page read and write
22B6E64F000
heap
page read and write
22B6E7A6000
heap
page read and write
1FF06254000
heap
page read and write
2771DC70000
heap
page read and write
238EB900000
heap
page read and write
22B6E849000
heap
page read and write
22B6E8FF000
heap
page read and write
23230A7C000
heap
page read and write
19EDDD98000
heap
page read and write
19EDD4F8000
heap
page read and write
22B6E837000
heap
page read and write
91B947C000
stack
page read and write
22B6E98A000
heap
page read and write
22B6E7F8000
heap
page read and write
238EB013000
heap
page read and write
22B6E8C0000
heap
page read and write
1E10A100000
heap
page read and write
22B6E038000
trusted library allocation
page read and write
22B6E864000
heap
page read and write
253EF873000
heap
page read and write
22B6E734000
heap
page read and write
19EDDD00000
heap
page read and write
22B6E62D000
heap
page read and write
22B6E637000
heap
page read and write
238EB07C000
heap
page read and write
22B6E80E000
heap
page read and write
22B6E8E8000
heap
page read and write
22B6E9CA000
heap
page read and write
22B6E9DA000
heap
page read and write
22B6E9F3000
heap
page read and write
22B6E8EC000
heap
page read and write
22B691FD000
heap
page read and write
213F7AA0000
heap
page read and write
1FF06241000
heap
page read and write
238F0480000
trusted library allocation
page read and write
B29DBFB000
stack
page read and write
22B6E875000
heap
page read and write
22B6E71E000
heap
page read and write
22B6E1AC000
trusted library allocation
page read and write
253EF610000
heap
page read and write
22B6E978000
heap
page read and write
307947F000
stack
page read and write
22B6E8FD000
heap
page read and write
23230A29000
heap
page read and write
22B6E490000
trusted library allocation
page read and write
19959A00000
heap
page read and write
19EDDDAD000
heap
page read and write
48F1C79000
stack
page read and write
213F78FD000
heap
page read and write
22B6E7E8000
heap
page read and write
22B6E877000
heap
page read and write
22B6E8CD000
heap
page read and write
22B6E613000
heap
page read and write
22B6E7AA000
heap
page read and write
22B6E662000
heap
page read and write
22B6E1F0000
trusted library allocation
page read and write
238F0720000
trusted library allocation
page read and write
19EDE202000
heap
page read and write
19EDDD84000
heap
page read and write
22B6E639000
heap
page read and write
22B6E70C000
heap
page read and write
2771DE7C000
heap
page read and write
22B6E978000
heap
page read and write
238EB918000
heap
page read and write
22B6E752000
heap
page read and write
22B6E819000
heap
page read and write
3078B7A000
stack
page read and write
1E10A112000
heap
page read and write
253EF864000
heap
page read and write
22B6E9D4000
heap
page read and write
22B6E752000
heap
page read and write
22B6E626000
heap
page read and write
19EDD4AE000
heap
page read and write
22B6E8E8000
heap
page read and write
4FD96F9000
stack
page read and write
19EDDD0E000
heap
page read and write
22B6E030000
trusted library allocation
page read and write
22B691E5000
heap
page read and write
22B6E030000
trusted library allocation
page read and write
A1A848B000
stack
page read and write
22B6E634000
heap
page read and write
238F0760000
trusted library allocation
page read and write
22B6E983000
heap
page read and write
19EDE202000
heap
page read and write
22B6E98D000
heap
page read and write
1FF0624C000
heap
page read and write
199599B0000
heap
page read and write
22B6E868000
heap
page read and write
238EB113000
heap
page read and write
238EC0D0000
trusted library section
page readonly
22B6E643000
heap
page read and write
22B6E62F000
heap
page read and write
22B68829000
heap
page read and write
22B69178000
heap
page read and write
22B691CE000
heap
page read and write
22B6E07E000
trusted library allocation
page read and write
A1A88FC000
stack
page read and write
2AB17054000
heap
page read and write
22B6E752000
heap
page read and write
307977D000
stack
page read and write
22B691CE000
heap
page read and write
2AB17100000
heap
page read and write
253EF600000
heap
page read and write
19EDD220000
heap
page read and write
22B6E8EE000
heap
page read and write
22B6E9E2000
heap
page read and write
22B6E74B000
heap
page read and write
22B6E7AC000
heap
page read and write
22B6E8D9000
heap
page read and write
22B6E752000
heap
page read and write
22B6E1A0000
trusted library allocation
page read and write
22B68D90000
trusted library allocation
page read and write
48F16FE000
stack
page read and write
19959B13000
heap
page read and write
22B6E9CB000
heap
page read and write
22B6E8E8000
heap
page read and write
22B6E940000
heap
page read and write
22B69152000
heap
page read and write
22B69159000
heap
page read and write
5D363FB000
stack
page read and write
22B6E926000
heap
page read and write
1FEECE13000
heap
page read and write
22B6E8FD000
heap
page read and write
22B6E850000
heap
page read and write
1E109750000
heap
page read and write
22B6E044000
trusted library allocation
page read and write
22B6E0F0000
remote allocation
page read and write
22B6E744000
heap
page read and write
947CA7F000
stack
page read and write
22B6E634000
heap
page read and write
238F1000000
heap
page read and write
22B6E863000
heap
page read and write
22B6E62D000
heap
page read and write
238EC100000
trusted library section
page readonly
22B6E74D000
heap
page read and write
22B6E1A0000
trusted library allocation
page read and write
22B6E951000
heap
page read and write
22B6E9FB000
heap
page read and write
238EB815000
heap
page read and write
22B6E170000
trusted library allocation
page read and write
22B6E655000
heap
page read and write
22B6E8A3000
heap
page read and write
22B6E8AD000
heap
page read and write
22B6E04C000
trusted library allocation
page read and write
238F0640000
trusted library allocation
page read and write
22B6E839000
heap
page read and write
22B6E9A2000
heap
page read and write
22B6E913000
heap
page read and write
22B69024000
heap
page read and write
22B6E87E000
heap
page read and write
947CBF8000
stack
page read and write
22B6E81F000
heap
page read and write
253EF839000
heap
page read and write
22B6E893000
heap
page read and write
22B6E992000
heap
page read and write
22B6E04A000
trusted library allocation
page read and write
1FF06246000
heap
page read and write
22B6DEF0000
trusted library allocation
page read and write
22B6E99A000
heap
page read and write
1FEECE6F000
heap
page read and write
22B6E90A000
heap
page read and write
19959A02000
heap
page read and write
22B69E60000
trusted library allocation
page read and write
22B6E983000
heap
page read and write
22B6E94A000
heap
page read and write
23230A3C000
heap
page read and write
1FEECE75000
heap
page read and write
22B68F71000
heap
page read and write
3079A77000
stack
page read and write
22B6919A000
heap
page read and write
19EDD4B8000
heap
page read and write
22B6E94F000
heap
page read and write
1E96A330000
heap
page read and write
22B6E9D8000
heap
page read and write
1FEECF13000
heap
page read and write
857357F000
stack
page read and write
22B6E04C000
trusted library allocation
page read and write
5BE36FF000
stack
page read and write
22B6905A000
heap
page read and write
22B6E7A6000
heap
page read and write
22B6E74D000
heap
page read and write
22B6E9E2000
heap
page read and write
22B6E9D6000
heap
page read and write
22B6E648000
heap
page read and write
22B6E1E0000
trusted library allocation
page read and write
22B6E02C000
trusted library allocation
page read and write
22B6914C000
heap
page read and write
5D35EFC000
stack
page read and write
22B6E1AC000
trusted library allocation
page read and write
22B68997000
heap
page read and write
238F0618000
trusted library allocation
page read and write
19EDD44F000
heap
page read and write
22B6E88F000
heap
page read and write
22B6E905000
heap
page read and write
22B6E983000
heap
page read and write
22B6E280000
trusted library allocation
page read and write
22B691E8000
heap
page read and write
1FF06160000
trusted library allocation
page read and write
22B6E040000
trusted library allocation
page read and write
22B6E07E000
trusted library allocation
page read and write
22B6E83E000
heap
page read and write
238F0820000
heap
page read and write
22B6E626000
heap
page read and write
22B6E874000
heap
page read and write
1E109800000
heap
page read and write
238F08F3000
heap
page read and write
4FD95FE000
stack
page read and write
22B6E794000
heap
page read and write
238EB000000
heap
page read and write
253EF87C000
heap
page read and write
22B6E997000
heap
page read and write
22B6E89A000
heap
page read and write
238EAFF0000
trusted library section
page read and write
22B6E93E000
heap
page read and write
22B6E83B000
heap
page read and write
22B6E7ED000
heap
page read and write
19EDD502000
heap
page read and write
23230FA0000
trusted library allocation
page read and write
22B6E8E8000
heap
page read and write
238EBFE0000
trusted library allocation
page read and write
253EF850000
heap
page read and write
1995A202000
trusted library allocation
page read and write
22B691CE000
heap
page read and write
22B68FB1000
heap
page read and write
22B6E84D000
heap
page read and write
307907B000
stack
page read and write
22B6E04C000
trusted library allocation
page read and write
22B6E046000
trusted library allocation
page read and write
2771DE57000
heap
page read and write
22B6E9CD000
heap
page read and write
22B6E8FA000
heap
page read and write
22B6E850000
heap
page read and write
23230A8E000
heap
page read and write
8EEE0FF000
stack
page read and write
22B6E62D000
heap
page read and write
22B6E8BA000
heap
page read and write
22B6E634000
heap
page read and write
213F7A80000
heap
page read and write
48F17FC000
stack
page read and write
22B6E8E8000
heap
page read and write
8EED8FE000
stack
page read and write
22B691CE000
heap
page read and write
A1A8B77000
stack
page read and write
22B6E052000
trusted library allocation
page read and write
22B6E74D000
heap
page read and write
2ED2FFE000
stack
page read and write
22B6E669000
heap
page read and write
22B6E83F000
heap
page read and write
2AB1707E000
heap
page read and write
2771DE8F000
heap
page read and write
22B6E897000
heap
page read and write
22B69100000
heap
page read and write
22B68893000
heap
page read and write
22B6E85F000
heap
page read and write
19EDD513000
heap
page read and write
22B6E983000
heap
page read and write
22B6E737000
heap
page read and write
22B6E8EC000
heap
page read and write
5BE37FE000
stack
page read and write
238EB7E1000
trusted library allocation
page read and write
22B6E74B000
heap
page read and write
22B68E15000
heap
page read and write
19959A29000
heap
page read and write
2AB16FC0000
trusted library allocation
page read and write
22B69E20000
trusted library section
page readonly
91B997E000
stack
page read and write
A1A850E000
stack
page read and write
213F87B0000
trusted library allocation
page read and write
857387E000
stack
page read and write
238F0770000
trusted library allocation
page read and write
22B6E8A7000
heap
page read and write
8EED31B000
stack
page read and write
5BE34FE000
stack
page read and write
213F7850000
trusted library allocation
page read and write
1FAEABDE000
heap
page read and write
22B6E8F6000
heap
page read and write
22B6E9CA000
heap
page read and write
22B691CE000
heap
page read and write
22B6E669000
heap
page read and write
22B6E655000
heap
page read and write
238EC470000
trusted library allocation
page read and write
232307E0000
heap
page read and write
22B6E044000
trusted library allocation
page read and write
22B6E962000
heap
page read and write
22B6E794000
heap
page read and write
22B6E74D000
heap
page read and write
1E1097C0000
heap
page read and write
22B6E863000
heap
page read and write
22B6E661000
heap
page read and write
22B6E8A8000
heap
page read and write
947CC7E000
stack
page read and write
1FAEABB6000
heap
page read and write
253EF800000
heap
page read and write
5D366FE000
stack
page read and write
22B68F94000
heap
page read and write
238EAFB0000
heap
page read and write
22B6E634000
heap
page read and write
22B6E839000
heap
page read and write
22B6E040000
trusted library allocation
page read and write
213F7C90000
trusted library allocation
page read and write
22B6E9E2000
heap
page read and write
4FD91DB000
stack
page read and write
22B6E745000
heap
page read and write
22B6E716000
heap
page read and write
22B6E714000
heap
page read and write
22B68894000
heap
page read and write
22B6E2B0000
trusted library allocation
page read and write
19EDDDAA000
heap
page read and write
213F7C80000
heap
page read and write
22B6E70C000
heap
page read and write
22B6E9E2000
heap
page read and write
22B6E752000
heap
page read and write
22B6E1A0000
trusted library allocation
page read and write
22B6E8D4000
heap
page read and write
19EDDD65000
heap
page read and write
8572F7F000
stack
page read and write
22B6E9E6000
heap
page read and write
213F8810000
trusted library allocation
page read and write
19959940000
heap
page read and write
22B6E8FD000
heap
page read and write
1E96A45C000
heap
page read and write
22B6E908000
heap
page read and write
22B6E9CA000
heap
page read and write
22B6E710000
heap
page read and write
22B69E41000
trusted library allocation
page read and write
2771DE71000
heap
page read and write
22B6E230000
trusted library allocation
page read and write
22B6E030000
trusted library allocation
page read and write
23230B26000
heap
page read and write
22B6E935000
heap
page read and write
22B69AB0000
trusted library allocation
page read and write
19EDDD87000
heap
page read and write
2ED337E000
stack
page read and write
238EB125000
heap
page read and write
22B6E978000
heap
page read and write
1E96A390000
remote allocation
page read and write
22B6E9C5000
heap
page read and write
947C47A000
stack
page read and write
22B6E876000
heap
page read and write
22B6E8B8000
heap
page read and write
22B6E7C7000
heap
page read and write
19EDDD9C000
heap
page read and write
22B6E8B6000
heap
page read and write
22B6E030000
trusted library allocation
page read and write
22B6E80C000
heap
page read and write
22B6E1AC000
trusted library allocation
page read and write
213F87C0000
trusted library allocation
page read and write
8EEDCFD000
stack
page read and write
22B6E012000
trusted library allocation
page read and write
253EF879000
heap
page read and write
22B6E1A4000
trusted library allocation
page read and write
1FAEABDD000
heap
page read and write
22B6E7F1000
heap
page read and write
2AB17056000
heap
page read and write
2AB1704B000
heap
page read and write
19959A79000
heap
page read and write
213F78B0000
heap
page read and write
3079A75000
stack
page read and write
22B6E661000
heap
page read and write
22B6E70C000
heap
page read and write
22B6E626000
heap
page read and write
22B6E87F000
heap
page read and write
22B6E661000
heap
page read and write
85733FF000
stack
page read and write
22B6E74B000
heap
page read and write
2AB1704E000
heap
page read and write
22B6E938000
heap
page read and write
23230A00000
heap
page read and write
22B6E8B2000
heap
page read and write
2771DDD0000
trusted library allocation
page read and write
1E10986E000
heap
page read and write
22B6E87E000
heap
page read and write
22B6E874000
heap
page read and write
947CB7C000
stack
page read and write
253EF840000
heap
page read and write
2AB17108000
heap
page read and write
22B6E86A000
heap
page read and write
19EDD230000
heap
page read and write
22B6E81B000
heap
page read and write
19EDDD8B000
heap
page read and write
2771DE29000
heap
page read and write
22B6E63C000
heap
page read and write
22B6E7E1000
heap
page read and write
22B6E7A6000
heap
page read and write
22B691E5000
heap
page read and write
19EDD390000
trusted library allocation
page read and write
22B6E8C5000
heap
page read and write
22B6E988000
heap
page read and write
85731FF000
stack
page read and write
2771DE13000
heap
page read and write
30792FF000
stack
page read and write
22B69174000
heap
page read and write
22B6E040000
trusted library allocation
page read and write
5BE39FF000
stack
page read and write
22B6E837000
heap
page read and write
22B6E8C7000
heap
page read and write
253EF876000
heap
page read and write
1FEECE5A000
heap
page read and write
22B691E5000
heap
page read and write
8EED9FD000
stack
page read and write
22B6E8E8000
heap
page read and write
1E96A2D0000
heap
page read and write
22B6E040000
trusted library allocation
page read and write
238EB03D000
heap
page read and write
22B6E1B0000
trusted library allocation
page read and write
22B6E782000
heap
page read and write
238EB800000
heap
page read and write
253EF846000
heap
page read and write
22B6E74D000
heap
page read and write
253EF856000
heap
page read and write
22B6E669000
heap
page read and write
19959A13000
heap
page read and write
1E1098E1000
heap
page read and write
19EDDDD9000
heap
page read and write
22B6E9CA000
heap
page read and write
22B6E035000
trusted library allocation
page read and write
947C379000
stack
page read and write
48F13EC000
stack
page read and write
22B6E956000
heap
page read and write
22B68F24000
heap
page read and write
22B6E9B4000
heap
page read and write
22B6E70E000
heap
page read and write
22B6E70C000
heap
page read and write
22B68F2B000
heap
page read and write
238F0800000
heap
page read and write
22B6E978000
heap
page read and write
1FAEABA0000
heap
page read and write
22B6E86E000
heap
page read and write
22B6E841000
heap
page read and write
8EED77B000
stack
page read and write
22B6E864000
heap
page read and write
22B6E626000
heap
page read and write
22B6E9E2000
heap
page read and write
19959A5A000
heap
page read and write
8EEE1FF000
stack
page read and write
22B6E895000
heap
page read and write
1FAEAB95000
heap
page read and write
23230A89000
heap
page read and write
22B6E8E8000
heap
page read and write
22B6E77E000
heap
page read and write
22B6E8E8000
heap
page read and write
22B6E9A5000
heap
page read and write
3078F79000
stack
page read and write
3078DFF000
stack
page read and write
22B69AB8000
trusted library allocation
page read and write
8EEDBFE000
stack
page read and write
22B691CE000
heap
page read and write
22B6E8A6000
heap
page read and write
213F7C89000
heap
page read and write
22B6E86B000
heap
page read and write
238F0770000
remote allocation
page read and write
253EF83A000
heap
page read and write
1FF06A02000
trusted library allocation
page read and write
1E109840000
heap
page read and write
22B6E7E0000
heap
page read and write
22B69E10000
trusted library section
page readonly
22B6E8EB000
heap
page read and write
22B6E78B000
heap
page read and write
2771DF08000
heap
page read and write
22B6E93A000
heap
page read and write
22B6E8FD000
heap
page read and write
19EDD43C000
heap
page read and write
2AB17055000
heap
page read and write
22B6E010000
trusted library allocation
page read and write
2771DCD0000
heap
page read and write
238F080F000
heap
page read and write
22B6E8E8000
heap
page read and write
22B6E961000
heap
page read and write
22B6E9D3000
heap
page read and write
22B68FC6000
heap
page read and write
22B68813000
heap
page read and write
22B6E981000
heap
page read and write
22B6E62F000
heap
page read and write
22B6E634000
heap
page read and write
22B6E8CC000
heap
page read and write
22B6E7A6000
heap
page read and write
213F7917000
heap
page read and write
947BF8E000
stack
page read and write
22B6E048000
trusted library allocation
page read and write
22B6E9A9000
heap
page read and write
19EDD516000
heap
page read and write
23230A5D000
heap
page read and write
238EB0FE000
heap
page read and write
1E96A456000
heap
page read and write
19959B02000
heap
page read and write
22B6E9CA000
heap
page read and write
19EDDD73000
heap
page read and write
947BF0C000
stack
page read and write
19959950000
heap
page read and write
22B6E91D000
heap
page read and write
22B6E7FE000
heap
page read and write
22B68E00000
heap
page read and write
22B6E700000
heap
page read and write
1FAEABC5000
heap
page read and write
22B6E190000
trusted library allocation
page read and write
22B6E807000
heap
page read and write
22B685A0000
heap
page read and write
A1A897E000
stack
page read and write
19959A68000
heap
page read and write
19EDDD7C000
heap
page read and write
22B68FF6000
heap
page read and write
22B6E800000
heap
page read and write
22B6E626000
heap
page read and write
22B6E866000
heap
page read and write
238F0610000
trusted library allocation
page read and write
22B6E72B000
heap
page read and write
238EC463000
trusted library allocation
page read and write
8572E7B000
stack
page read and write
22B68F02000
heap
page read and write
1E96AC02000
trusted library allocation
page read and write
22B6E07A000
trusted library allocation
page read and write
3078C7A000
stack
page read and write
1FF06200000
heap
page read and write
22B6E983000
heap
page read and write
238EB08E000
heap
page read and write
2AB16E60000
heap
page read and write
22B6E99D000
heap
page read and write
22B691F2000
heap
page read and write
22B6E8D7000
heap
page read and write
3079179000
stack
page read and write
22B6E9CA000
heap
page read and write
22B6E03C000
trusted library allocation
page read and write
22B6E7AD000
heap
page read and write
22B6E62D000
heap
page read and write
22B6E9EC000
heap
page read and write
22B6E88F000
heap
page read and write
238F0841000
heap
page read and write
B29DEFF000
stack
page read and write
22B68800000
heap
page read and write
91B957E000
stack
page read and write
22B6E8A0000
heap
page read and write
2AB17049000
heap
page read and write
1FAEABD0000
heap
page read and write
22B6E046000
trusted library allocation
page read and write
1FF06060000
heap
page read and write
22B6E1A4000
trusted library allocation
page read and write
22B6E72B000
heap
page read and write
22B6E89C000
heap
page read and write
1FAEA950000
heap
page read and write
22B69173000
heap
page read and write
22B6E870000
heap
page read and write
22B6E9CA000
heap
page read and write
22B6905C000
heap
page read and write
19EDD436000
heap
page read and write
238F08E6000
heap
page read and write
238EC0C0000
trusted library section
page readonly
22B6E911000
heap
page read and write
19EDD508000
heap
page read and write
238F0500000
trusted library allocation
page read and write
22B6E795000
heap
page read and write
2AB17070000
heap
page read and write
48F1DFE000
unkown
page read and write
22B6E813000
heap
page read and write
30793FE000
stack
page read and write
22B6E7E5000
heap
page read and write
22B691C1000
heap
page read and write
There are 1289 hidden memdumps, click here to show them.