IOC Report
ballfin,file,08.11.22.doc

loading gif

Files

File Path
Type
Category
Malicious
ballfin,file,08.11.22.doc
Zip archive data, at least v2.0 to extract
initial sample
malicious
C:\Users\user\AppData\Local\Temp\~DF6DF774C06FA1D429.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\ballfin,file,08.11.22.doc.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:49 2022, mtime=Fri Aug 12 02:04:24 2022, atime=Fri Aug 12 02:04:18 2022, length=2203323, window=hide
dropped
malicious
C:\Users\user\AppData\Local\Temp\~DF27019C8A44EA0B11.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\E800CA17-2BDC-4C6B-AA67-6F2CC214AA5A
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\856807D8.png
PNG image data, 410 x 568, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\FD8075F9.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{134F09C7-3DAB-4618-911F-C15286BF82DA}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{EB0BA440-0E83-4F25-A0A6-6F8E4E68B6EE}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\Desktop\~$llfin,file,08.11.22.doc
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\716DE73A.png
PNG image data, 410 x 568, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F0EE86DD.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{58C4EF1F-04F3-4354-8BF6-9BBC006F076D}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{26665CB6-3AE5-42B7-91CB-EC748341D57C}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{91B38337-A42B-48A7-8226-4B2D1129AFD6}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\ballfin,file,08.11.22.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:56 2022, mtime=Tue Mar 8 15:45:56 2022, atime=Fri Aug 12 01:56:17 2022, length=2203323, window=hide
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding

URLs

Name
IP
Malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://my.microsoftpersonalcontent.com
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
https://api.powerbi.com/beta/myorg/imports
unknown
https://devnull.onenote.com
unknown
https://messaging.action.office.com/
unknown
https://ncus.pagecontentsync.
unknown
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
unknown
https://messaging.office.com/
unknown
https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.8.146.139
unknown
Russian Federation
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
n`%
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
o`%
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
(d%
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
4m%
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\1E943
1E943
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2D856
2D856
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2D856
2D856
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
{v/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
?x/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
w{/
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\67771
67771
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\7A6AB
7A6AB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\7A6AB
7A6AB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 406 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1DFB0702000
heap
page read and write
A879FBE000
stack
page read and write
C56E47D000
stack
page read and write
1E9BFD10000
heap
page read and write
1CC21D8C000
heap
page read and write
1CC21F02000
heap
page read and write
8BF2678000
stack
page read and write
2F3F07B000
stack
page read and write
1CC21C69000
heap
page read and write
1CC2171A000
trusted library allocation
page read and write
1CC1BF13000
heap
page read and write
1CC21E7F000
heap
page read and write
1E0C99D0000
trusted library allocation
page read and write
1CC21C55000
heap
page read and write
1CC21C26000
heap
page read and write
1CC21C61000
heap
page read and write
1CC1C7CA000
heap
page read and write
1CC21D6B000
heap
page read and write
CAC93FE000
stack
page read and write
1CC21F14000
heap
page read and write
1CC21C34000
heap
page read and write
1CC21D4E000
heap
page read and write
14181B30000
heap
page read and write
8BF23DF000
stack
page read and write
13E54B00000
heap
page read and write
20AACA00000
heap
page read and write
A94897E000
stack
page read and write
A9486FB000
stack
page read and write
1CC21714000
trusted library allocation
page read and write
1CC21DDD000
heap
page read and write
1CC21D77000
heap
page read and write
1CC21D82000
heap
page read and write
A948C7F000
stack
page read and write
1E67C6F6000
heap
page read and write
1E67C600000
heap
page read and write
1DFB064F000
heap
page read and write
1CC21D23000
heap
page read and write
1CC21870000
trusted library allocation
page read and write
4DC0BFE000
stack
page read and write
1CC21C62000
heap
page read and write
1CC21F03000
heap
page read and write
1CC21D89000
heap
page read and write
3A8F37B000
stack
page read and write
1CC21D9E000
heap
page read and write
1CC21D8A000
heap
page read and write
1CC1C72C000
heap
page read and write
1CC22010000
heap
page read and write
1CC1C791000
heap
page read and write
29CA78F0000
heap
page read and write
29CA7A55000
heap
page read and write
1A345770000
trusted library allocation
page read and write
1CC21830000
trusted library allocation
page read and write
CAC947F000
stack
page read and write
A94907F000
stack
page read and write
1E67CF15000
heap
page read and write
1CC21718000
trusted library allocation
page read and write
1CC21C43000
heap
page read and write
20AAC9E0000
heap
page read and write
50DD9F7000
stack
page read and write
1E67C6B6000
heap
page read and write
13E5429D000
heap
page read and write
1CC21F3D000
heap
page read and write
1E9BFD52000
heap
page read and write
1CC1C9BE000
heap
page read and write
2F3EB3C000
stack
page read and write
1DFB0637000
heap
page read and write
19E16A10000
heap
page read and write
141826D0000
trusted library allocation
page read and write
1CC1C975000
heap
page read and write
4DC167D000
stack
page read and write
B2BCA7F000
stack
page read and write
13E54200000
heap
page read and write
29CA7A8A000
heap
page read and write
1CC21FD4000
heap
page read and write
1CC1C9EB000
heap
page read and write
50DD67F000
stack
page read and write
1CC21C2D000
heap
page read and write
1DFB0655000
heap
page read and write
1CC21D85000
heap
page read and write
1E9BFD4F000
heap
page read and write
16AA564F000
heap
page read and write
1CC21705000
trusted library allocation
page read and write
1CC1C9CD000
heap
page read and write
1CC21D8C000
heap
page read and write
1CC21880000
trusted library allocation
page read and write
1CC1C724000
heap
page read and write
1E0C9B02000
heap
page read and write
766DFE000
stack
page read and write
1CC21780000
trusted library allocation
page read and write
1CC1BE43000
heap
page read and write
CAC997A000
stack
page read and write
1CC21F24000
heap
page read and write
1CC1C839000
heap
page read and write
8BE2DFF000
stack
page read and write
1CC21F10000
heap
page read and write
4DC047C000
stack
page read and write
B2BCCFE000
stack
page read and write
1CC1C729000
heap
page read and write
29CA8202000
trusted library allocation
page read and write
13E5A000000
heap
page read and write
29CA7A4E000
heap
page read and write
1CC21C53000
heap
page read and write
1CC21860000
trusted library allocation
page read and write
1E9BFD26000
heap
page read and write
141826B0000
heap
page readonly
1CC1D4E0000
trusted library section
page readonly
1E67C670000
heap
page read and write
1E9BFC50000
heap
page read and write
1CC21B60000
trusted library allocation
page read and write
1CC1C9FE000
heap
page read and write
1CC21EA0000
heap
page read and write
1A345888000
heap
page read and write
14181760000
trusted library allocation
page read and write
1CC21DDE000
heap
page read and write
2D47C108000
heap
page read and write
1CC1C9EE000
heap
page read and write
1A2ED7B000
stack
page read and write
1CC21E58000
heap
page read and write
4DC107B000
stack
page read and write
1E67D400000
unkown
page read and write
1CC1D511000
trusted library allocation
page read and write
1CC21710000
trusted library allocation
page read and write
1CC1BFEB000
heap
page read and write
1CC21716000
trusted library allocation
page read and write
1CC21E85000
heap
page read and write
2D47C082000
heap
page read and write
1CC21874000
trusted library allocation
page read and write
1DFB0684000
heap
page read and write
766D79000
stack
page read and write
13E59960000
trusted library allocation
page read and write
1CC1C9D2000
heap
page read and write
1CC21708000
trusted library allocation
page read and write
A948D7F000
stack
page read and write
1CC21A90000
remote allocation
page read and write
1CC1C9CA000
heap
page read and write
F29127B000
stack
page read and write
2D47C03C000
heap
page read and write
1DFB0B90000
trusted library allocation
page read and write
1CC21D8A000
heap
page read and write
16AA5530000
heap
page read and write
1E67C6EA000
heap
page read and write
1CC1C460000
trusted library allocation
page read and write
1E0CA202000
trusted library allocation
page read and write
1CC21C2D000
heap
page read and write
1CC21F28000
heap
page read and write
20AACA69000
heap
page read and write
1CC21D43000
heap
page read and write
20092E00000
heap
page read and write
13E59950000
trusted library allocation
page read and write
19E16D02000
heap
page read and write
1E67C63C000
heap
page read and write
1CC21860000
trusted library allocation
page read and write
2A17D302000
heap
page read and write
2F3EBBF000
stack
page read and write
4DC077E000
stack
page read and write
1CC21C53000
heap
page read and write
1CC21C5F000
heap
page read and write
1A345851000
heap
page read and write
1CC21D56000
heap
page read and write
1CC21EB5000
heap
page read and write
1CC21D5C000
heap
page read and write
1CC21EE4000
heap
page read and write
1CC21C34000
heap
page read and write
2D47C100000
heap
page read and write
20AACA52000
heap
page read and write
1CC215D0000
trusted library allocation
page read and write
1A345849000
heap
page read and write
13E59970000
trusted library allocation
page read and write
13E54258000
heap
page read and write
1CC2174E000
trusted library allocation
page read and write
3A8F8FE000
stack
page read and write
1CC21D9B000
heap
page read and write
1CC21EFC000
heap
page read and write
1CC1C951000
heap
page read and write
1CC21870000
trusted library allocation
page read and write
1CC21D3D000
heap
page read and write
1DFB067C000
heap
page read and write
1CC21DA6000
heap
page read and write
19E16C53000
heap
page read and write
50DD8FB000
stack
page read and write
16AA5644000
heap
page read and write
1CC1CE81000
trusted library allocation
page read and write
1CC21E63000
heap
page read and write
2D47BDC0000
heap
page read and write
1CC21F84000
heap
page read and write
1E9BFD52000
heap
page read and write
1CC2187C000
trusted library allocation
page read and write
1CC216E1000
trusted library allocation
page read and write
1CC1C96B000
heap
page read and write
1CC2178C000
trusted library allocation
page read and write
19E16D00000
heap
page read and write
1CC21F5D000
heap
page read and write
1E67C5F0000
trusted library allocation
page read and write
1CC21D67000
heap
page read and write
1CC21FBA000
heap
page read and write
1A345908000
heap
page read and write
13E54A15000
heap
page read and write
19E16C00000
heap
page read and write
1E9C0040000
heap
page read and write
1CC1C702000
heap
page read and write
1CC21F6F000
heap
page read and write
1CC21C10000
heap
page read and write
1CC21765000
trusted library allocation
page read and write
1E9BFD3F000
heap
page read and write
1A2F37E000
stack
page read and write
2D47C02A000
heap
page read and write
1A345900000
heap
page read and write
1CC21E74000
heap
page read and write
13E59AE8000
heap
page read and write
1CC21C38000
heap
page read and write
2F3F177000
stack
page read and write
1CC21D36000
heap
page read and write
13E59690000
trusted library allocation
page read and write
20092F02000
heap
page read and write
1CC219B0000
remote allocation
page read and write
13E542BB000
heap
page read and write
A94828B000
stack
page read and write
13E59710000
trusted library allocation
page read and write
1CC21D50000
heap
page read and write
1CC21EE7000
heap
page read and write
1CC1C836000
heap
page read and write
8BE25FB000
stack
page read and write
1CC21E56000
heap
page read and write
1CC21D75000
heap
page read and write
1DFB0648000
heap
page read and write
A87A87F000
stack
page read and write
F29157B000
stack
page read and write
1E0C9A67000
heap
page read and write
1CC1BFC2000
heap
page read and write
2D47C013000
heap
page read and write
1CC21D62000
heap
page read and write
1CC21C5C000
heap
page read and write
1CC21C34000
heap
page read and write
1CC1C9D2000
heap
page read and write
1CC21C13000
heap
page read and write
1CC21DA6000
heap
page read and write
1CC2171C000
trusted library allocation
page read and write
5BA84FE000
stack
page read and write
1CC21F13000
heap
page read and write
1A345902000
heap
page read and write
1CC21DE1000
heap
page read and write
20092E29000
heap
page read and write
4DC0CFB000
stack
page read and write
1CC21F86000
heap
page read and write
1CC21E2D000
heap
page read and write
1CC21D79000
heap
page read and write
13E54275000
heap
page read and write
1CC21F40000
heap
page read and write
2D47C590000
trusted library allocation
page read and write
1CC21F2C000
heap
page read and write
F29187F000
stack
page read and write
F29147C000
stack
page read and write
19E16B70000
trusted library allocation
page read and write
1CC21DA8000
heap
page read and write
2A17D090000
heap
page read and write
1CC21C2F000
heap
page read and write
1CC1BF8E000
heap
page read and write
1CC21FDB000
heap
page read and write
1CC21F2A000
heap
page read and write
1E67CF75000
heap
page read and write
13E59A2D000
heap
page read and write
1CC21F67000
heap
page read and write
1CC21F93000
heap
page read and write
1CC21F82000
heap
page read and write
1CC21D84000
heap
page read and write
16AA5702000
heap
page read and write
1CC216E0000
trusted library allocation
page read and write
1E0C9A5A000
heap
page read and write
766CF9000
stack
page read and write
2D47BE30000
heap
page read and write
1A345800000
heap
page read and write
1CC21D7A000
heap
page read and write
C56E1FC000
stack
page read and write
1CC21D7C000
heap
page read and write
13E59A62000
heap
page read and write
1CC1C943000
heap
page read and write
1CC21D5A000
heap
page read and write
1CC21F35000
heap
page read and write
13E59940000
trusted library allocation
page read and write
1CC21700000
trusted library allocation
page read and write
2D47C102000
heap
page read and write
13E59A13000
heap
page read and write
766EFF000
stack
page read and write
13E59A00000
heap
page read and write
1E67CF80000
heap
page read and write
1CC21F47000
heap
page read and write
1CC21C2D000
heap
page read and write
14182470000
trusted library allocation
page read and write
1E0C9A5C000
heap
page read and write
1CC21D41000
heap
page read and write
20AACA7B000
heap
page read and write
1E67C6AC000
heap
page read and write
1DFB0624000
heap
page read and write
1CC21F75000
heap
page read and write
1E0C9A3C000
heap
page read and write
1CC21C69000
heap
page read and write
13E59864000
trusted library allocation
page read and write
1DFB064C000
heap
page read and write
1CC21D8D000
heap
page read and write
1CC2174A000
trusted library allocation
page read and write
1CC21D7C000
heap
page read and write
1CC1C9C2000
heap
page read and write
1CC21C2C000
heap
page read and write
1CC21D43000
heap
page read and write
14181B10000
trusted library allocation
page read and write
1CC21DB0000
heap
page read and write
1CC1C800000
heap
page read and write
1CC1D4F0000
trusted library section
page readonly
4DC0DFF000
stack
page read and write
1CC1C9ED000
heap
page read and write
1DFB0630000
heap
page read and write
1CC21D2B000
heap
page read and write
1CC1C600000
heap
page read and write
1CC1BDD0000
trusted library allocation
page read and write
1CC216E0000
trusted library allocation
page read and write
14181750000
heap
page read and write
13E54150000
heap
page read and write
1CC21710000
trusted library allocation
page read and write
13E54224000
heap
page read and write
1CC21C26000
heap
page read and write
1A2F17B000
stack
page read and write
1E9BFD3F000
heap
page read and write
1CC21D5E000
heap
page read and write
4DC09FA000
stack
page read and write
29CA7A70000
heap
page read and write
1CC1C9CD000
heap
page read and write
13E59ADD000
heap
page read and write
1DFB0C02000
trusted library allocation
page read and write
1CC21EE5000
heap
page read and write
1CC21D74000
heap
page read and write
1CC21D43000
heap
page read and write
1CC21F1A000
heap
page read and write
1CC21765000
trusted library allocation
page read and write
766E79000
stack
page read and write
1CC21E13000
heap
page read and write
1CC21EAC000
heap
page read and write
13E59820000
trusted library allocation
page read and write
1CC21C2F000
heap
page read and write
2A17D23D000
heap
page read and write
13E59AF4000
heap
page read and write
29CA7A4A000
heap
page read and write
1CC21710000
trusted library allocation
page read and write
1A2EC7F000
stack
page read and write
14181890000
heap
page read and write
13E59980000
remote allocation
page read and write
1CC21710000
trusted library allocation
page read and write
13E59AEE000
heap
page read and write
1CC21F14000
heap
page read and write
1CC1C9A1000
heap
page read and write
1CC21F7C000
heap
page read and write
1CC1C9F9000
heap
page read and write
2D47C060000
heap
page read and write
5BA807C000
stack
page read and write
CAC937D000
stack
page read and write
1E67C629000
heap
page read and write
13E54229000
heap
page read and write
13E54A02000
heap
page read and write
1E67CF00000
heap
page read and write
1CC2171A000
trusted library allocation
page read and write
1CC21F2E000
heap
page read and write
1A345813000
heap
page read and write
13E55680000
trusted library allocation
page read and write
1CC21D91000
heap
page read and write
1CC21C58000
heap
page read and write
1CC21F14000
heap
page read and write
20AACB13000
heap
page read and write
1A2EB79000
stack
page read and write
1CC21F5E000
heap
page read and write
20AACA75000
heap
page read and write
13E598F0000
trusted library allocation
page read and write
1E0C9A54000
heap
page read and write
13E5428B000
heap
page read and write
20092E13000
heap
page read and write
1CC21F60000
heap
page read and write
4DC05FE000
stack
page read and write
1CC21F55000
heap
page read and write
29CA7B00000
heap
page read and write
13E55100000
trusted library section
page readonly
1E9BFD3F000
heap
page read and write
13E59860000
trusted library allocation
page read and write
1CC21DCB000
heap
page read and write
CAC987A000
stack
page read and write
1CC21860000
trusted library allocation
page read and write
1CC21E2D000
heap
page read and write
4DC117D000
stack
page read and write
2A17D22A000
heap
page read and write
1CC21F53000
heap
page read and write
8BE2CFB000
stack
page read and write
13E59828000
trusted library allocation
page read and write
1CC1C9E8000
heap
page read and write
1CC21E54000
heap
page read and write
1CC21C39000
heap
page read and write
1CC21D4B000
heap
page read and write
1E67C6ED000
heap
page read and write
1CC21714000
trusted library allocation
page read and write
1CC2170C000
trusted library allocation
page read and write
2A17D880000
remote allocation
page read and write
1E9BFD37000
heap
page read and write
13E54292000
heap
page read and write
1A2EDFE000
stack
page read and write
1CC216FC000
trusted library allocation
page read and write
1CC1BE58000
heap
page read and write
141826C0000
trusted library allocation
page read and write
1CC21714000
trusted library allocation
page read and write
1CC21710000
trusted library allocation
page read and write
1CC21D7F000
heap
page read and write
1DFB0637000
heap
page read and write
5BA85FE000
stack
page read and write
1CC1C80A000
heap
page read and write
1E9C0045000
heap
page read and write
1CC1C9F8000
heap
page read and write
1CC1C802000
heap
page read and write
1CC1C7CF000
heap
page read and write
1DFB0676000
heap
page read and write
13E541C0000
heap
page read and write
1CC21D54000
heap
page read and write
1CC218C0000
trusted library allocation
page read and write
20093602000
heap
page read and write
1CC21DA2000
heap
page read and write
2A17D1F0000
trusted library allocation
page read and write
1A2EFFE000
stack
page read and write
1CC21850000
trusted library allocation
page read and write
1CC2187C000
trusted library allocation
page read and write
16AA562F000
heap
page read and write
1DFB064A000
heap
page read and write
13E59AD8000
heap
page read and write
1E9BFD35000
heap
page read and write
1CC1D4D0000
trusted library section
page readonly
1CC21700000
trusted library allocation
page read and write
1E9BFBF0000
heap
page read and write
5BA817E000
stack
page read and write
16AA5629000
heap
page read and write
1CC21700000
trusted library allocation
page read and write
1CC21E93000
heap
page read and write
14181B40000
trusted library allocation
page read and write
1CC21F51000
heap
page read and write
1CC2171E000
trusted library allocation
page read and write
1CC21F88000
heap
page read and write
2D47C06A000
heap
page read and write
1CC1C7C7000
heap
page read and write
1CC215C0000
trusted library allocation
page read and write
1CC1BE76000
heap
page read and write
1CC21870000
trusted library allocation
page read and write
13E54B13000
heap
page read and write
5BA80FE000
stack
page read and write
2A17D213000
heap
page read and write
1CC1BE85000
heap
page read and write
13E54930000
trusted library section
page read and write
1CC2171C000
trusted library allocation
page read and write
4DC1475000
stack
page read and write
1CC21D5C000
heap
page read and write
2A17D200000
heap
page read and write
20092E3D000
heap
page read and write
1CC21D89000
heap
page read and write
1CC21EA9000
heap
page read and write
1E9BFC70000
heap
page read and write
1CC21D75000
heap
page read and write
13E55130000
trusted library section
page readonly
1E0C9A60000
heap
page read and write
20093732000
heap
page read and write
1E67C490000
heap
page read and write
1A2EA7A000
stack
page read and write
1CC21D3D000
heap
page read and write
1DFB0646000
heap
page read and write
1E9BFD4E000
heap
page read and write
1DFB062E000
heap
page read and write
1CC1C7C2000
heap
page read and write
1CC1C9D2000
heap
page read and write
1CC21EB1000
heap
page read and write
1CC21DD0000
heap
page read and write
13E59980000
trusted library allocation
page read and write
1CC21DA1000
heap
page read and write
1CC1C9F6000
heap
page read and write
13E54160000
heap
page read and write
1CC21D60000
heap
page read and write
A87A577000
stack
page read and write
1CC1C81B000
heap
page read and write
13E59844000
trusted library allocation
page read and write
1CC1C9F9000
heap
page read and write
13E55240000
trusted library allocation
page read and write
13E54B18000
heap
page read and write
29CA7A00000
heap
page read and write
CAC977F000
stack
page read and write
1E0C9B13000
heap
page read and write
29CA7B08000
heap
page read and write
14181931000
heap
page read and write
13E5982E000
trusted library allocation
page read and write
1DFB067B000
heap
page read and write
1CC1D4B0000
trusted library section
page readonly
1CC21D78000
heap
page read and write
1CC21722000
trusted library allocation
page read and write
1CC21F46000
heap
page read and write
141818F1000
heap
page read and write
1CC21FDB000
heap
page read and write
1CC21C48000
heap
page read and write
1E67C480000
heap
page read and write
1CC21C34000
heap
page read and write
1E0C9B08000
heap
page read and write
1CC1C7B0000
heap
page read and write
1CC21D40000
heap
page read and write
1A2EEFF000
stack
page read and write
1CC21D6D000
heap
page read and write
1E67CD10000
remote allocation
page read and write
2D47C05C000
heap
page read and write
3A8F77F000
stack
page read and write
19E16C77000
heap
page read and write
1CC21C69000
heap
page read and write
1CC21ED7000
heap
page read and write
1DFB0669000
heap
page read and write
1E67CF4E000
heap
page read and write
8BF277F000
stack
page read and write
1CC21F05000
heap
page read and write
2F3F27F000
stack
page read and write
1CC1C962000
heap
page read and write
1CC21E97000
heap
page read and write
1CC21D65000
heap
page read and write
8BE2AFB000
stack
page read and write
1CC21C02000
heap
page read and write
A948B7D000
stack
page read and write
1CC21E7D000
heap
page read and write
141818E0000
heap
page read and write
1CC21900000
trusted library allocation
page read and write
1CC2170C000
trusted library allocation
page read and write
1CC21EF4000
heap
page read and write
1CC1C9CA000
heap
page read and write
1CC21FE2000
heap
page read and write
1CC1D3D0000
trusted library allocation
page read and write
1CC21F02000
heap
page read and write
13E59700000
trusted library allocation
page read and write
19E16D24000
heap
page read and write
1CC2187C000
trusted library allocation
page read and write
1CC1BE93000
heap
page read and write
B2BC97C000
stack
page read and write
1CC21F1A000
heap
page read and write
CAC9577000
stack
page read and write
1CC21DA4000
heap
page read and write
1DFB063E000
heap
page read and write
1CC21F65000
heap
page read and write
1CC1C9A9000
heap
page read and write
1CC1C602000
heap
page read and write
29CA7890000
heap
page read and write
1CC21D3D000
heap
page read and write
13E54326000
heap
page read and write
1CC21870000
trusted library allocation
page read and write
13E59980000
remote allocation
page read and write
1CC21718000
trusted library allocation
page read and write
C56E37B000
stack
page read and write
29CA7A13000
heap
page read and write
29CA7B13000
heap
page read and write
1CC21EFA000
heap
page read and write
1CC21F4E000
heap
page read and write
1CC1C615000
heap
page read and write
1CC21C3F000
heap
page read and write
20AAD140000
trusted library allocation
page read and write
2A17D0F0000
heap
page read and write
1CC21C56000
heap
page read and write
1CC21D91000
heap
page read and write
1CC21D85000
heap
page read and write
141818B0000
heap
page read and write
14181AF0000
trusted library allocation
page read and write
13E59850000
trusted library allocation
page read and write
1CC21F4C000
heap
page read and write
2D47C000000
heap
page read and write
1E67C702000
heap
page read and write
29CA79F0000
trusted library allocation
page read and write
13E59A55000
heap
page read and write
1CC21F92000
heap
page read and write
1A345740000
heap
page read and write
1CC21D8E000
heap
page read and write
1E67C713000
heap
page read and write
1CC21D4E000
heap
page read and write
29CA7880000
heap
page read and write
20092D90000
heap
page read and write
1CC21874000
trusted library allocation
page read and write
13E54213000
heap
page read and write
1CC21720000
trusted library allocation
page read and write
13E59AF8000
heap
page read and write
1CC21F17000
heap
page read and write
1CC21D89000
heap
page read and write
1CC1D530000
trusted library allocation
page read and write
16AA5653000
heap
page read and write
13E59A3D000
heap
page read and write
1CC21870000
trusted library allocation
page read and write
1CC1BE00000
heap
page read and write
1CC21F25000
heap
page read and write
1CC21F95000
heap
page read and write
1CC21D74000
heap
page read and write
13E55150000
trusted library section
page readonly
1CC1C98B000
heap
page read and write
1CC1C9A7000
heap
page read and write
1CC21C69000
heap
page read and write
1CC21DA9000
heap
page read and write
1E67C682000
heap
page read and write
16AA5602000
heap
page read and write
1CC21D91000
heap
page read and write
1CC21DD1000
heap
page read and write
1CC21D66000
heap
page read and write
1A346002000
trusted library allocation
page read and write
1DFB0678000
heap
page read and write
1CC1D188000
trusted library allocation
page read and write
1CC21E00000
heap
page read and write
20092D80000
heap
page read and write
1A34587E000
heap
page read and write
1CC1C900000
heap
page read and write
1CC2170E000
trusted library allocation
page read and write
B2BC5EC000
stack
page read and write
13E59820000
trusted library allocation
page read and write
1CC1C9F4000
heap
page read and write
50DD6FE000
stack
page read and write
1E67CF6E000
heap
page read and write
13E59A4A000
heap
page read and write
1CC21C50000
heap
page read and write
1CC21950000
trusted library allocation
page read and write
20092EE1000
heap
page read and write
1DFB0675000
heap
page read and write
1E0C9A8E000
heap
page read and write
1CC21D74000
heap
page read and write
1CC2187C000
trusted library allocation
page read and write
1DFB0643000
heap
page read and write
1DFB0651000
heap
page read and write
1CC21F1A000
heap
page read and write
4DC0E7E000
stack
page read and write
1CC21D47000
heap
page read and write
14181929000
heap
page read and write
13E542AC000
heap
page read and write
1CC1BE3C000
heap
page read and write
1CC216E0000
trusted library allocation
page read and write
141818E9000
heap
page read and write
1DFB0613000
heap
page read and write
20AACB02000
heap
page read and write
1E67C6ED000
heap
page read and write
13E541F0000
trusted library allocation
page read and write
1CC21870000
trusted library allocation
page read and write
2A17D263000
heap
page read and write
1CC21DA2000
heap
page read and write
20AAC980000
heap
page read and write
1CC1BE43000
heap
page read and write
13E54A00000
heap
page read and write
19E16C13000
heap
page read and write
4DC057A000
stack
page read and write
1CC21C5B000
heap
page read and write
1E0C9A00000
heap
page read and write
2A17D225000
heap
page read and write
1CC1C9CA000
heap
page read and write
1CC1C9DC000
heap
page read and write
20093700000
heap
page read and write
CAC927E000
stack
page read and write
1CC21C26000
heap
page read and write
1E0C9930000
heap
page read and write
A948E7E000
stack
page read and write
5BA82FE000
stack
page read and write
1CC21F8A000
heap
page read and write
1CC218D0000
trusted library allocation
page read and write
2A17D880000
remote allocation
page read and write
1CC21550000
trusted library allocation
page read and write
1CC21D56000
heap
page read and write
C56E2FE000
stack
page read and write
20092ECB000
heap
page read and write
1E0C9940000
heap
page read and write
1CC21DA7000
heap
page read and write
1CC21C4D000
heap
page read and write
1CC21DA8000
heap
page read and write
1E67CF87000
heap
page read and write
1CC21708000
trusted library allocation
page read and write
13E59840000
trusted library allocation
page read and write
13E54278000
heap
page read and write
1CC21F02000
heap
page read and write
1A345913000
heap
page read and write
1CC1C700000
heap
page read and write
1CC217A0000
trusted library allocation
page read and write
16AA5600000
heap
page read and write
19E16C79000
heap
page read and write
1CC1C9A1000
heap
page read and write
1CC21DD0000
heap
page read and write
C56E77E000
stack
page read and write
1CC21D93000
heap
page read and write
4DC0EFF000
stack
page read and write
4DC0D7F000
stack
page read and write
1CC21712000
trusted library allocation
page read and write
A87A77D000
stack
page read and write
20AAC970000
heap
page read and write
1CC21DF5000
heap
page read and write
1CC1C9FE000
heap
page read and write
CAC9677000
stack
page read and write
1E9BFD55000
heap
page read and write
1CC21D07000
heap
page read and write
F291677000
stack
page read and write
1A345853000
heap
page read and write
29CA7A3C000
heap
page read and write
29CA7A7D000
heap
page read and write
1CC1D180000
trusted library allocation
page read and write
1A345871000
heap
page read and write
1CC21F61000
heap
page read and write
F2912FE000
stack
page read and write
1DFB03D0000
heap
page read and write
1CC1C7F1000
heap
page read and write
1CC1C7E1000
heap
page read and write
1CC21FCB000
heap
page read and write
1CC1C994000
heap
page read and write
1CC1C9D1000
heap
page read and write
CAC8FEB000
stack
page read and write
13E54B18000
heap
page read and write
1CC1C950000
heap
page read and write
1CC21B70000
trusted library allocation
page read and write
1A2F07F000
stack
page read and write
1E67C6DA000
heap
page read and write
1CC21ECD000
heap
page read and write
13E54256000
heap
page read and write
1CC21F02000
heap
page read and write
1CC21F68000
heap
page read and write
1CC1D500000
trusted library section
page readonly
1CC21C2F000
heap
page read and write
1CC1C9F7000
heap
page read and write
B2BCD7F000
stack
page read and write
1CC1C9FD000
heap
page read and write
1CC21F6C000
heap
page read and write
1CC1BE54000
heap
page read and write
C56E17E000
stack
page read and write
1CC21D41000
heap
page read and write
1CC21D52000
heap
page read and write
1CC1BE29000
heap
page read and write
1CC21D3D000
heap
page read and write
1DFB0641000
heap
page read and write
1CC21D80000
heap
page read and write
2F3F37E000
stack
page read and write
1E67C613000
heap
page read and write
13E55120000
trusted library section
page readonly
1CC21D3D000
heap
page read and write
1CC21DB3000
heap
page read and write
1CC1C9F6000
heap
page read and write
4DC0F7F000
stack
page read and write
1A3456E0000
heap
page read and write
1A3456D0000
heap
page read and write
1CC21E79000
heap
page read and write
1CC21F3A000
heap
page read and write
1CC21E61000
heap
page read and write
7669BE000
stack
page read and write
1CC1C9CA000
heap
page read and write
1CC21722000
trusted library allocation
page read and write
1CC21F30000
heap
page read and write
1CC21874000
trusted library allocation
page read and write
1CC2170E000
trusted library allocation
page read and write
13E54270000
heap
page read and write
1CC21960000
trusted library allocation
page read and write
1CC21900000
trusted library allocation
page read and write
1CC21F27000
heap
page read and write
13E59841000
trusted library allocation
page read and write
C56DEFB000
stack
page read and write
4DC157F000
stack
page read and write
A879EBC000
stack
page read and write
1CC21D74000
heap
page read and write
29CA7A2A000
heap
page read and write
13E55110000
trusted library section
page readonly
19E16C63000
heap
page read and write
1DFB067F000
heap
page read and write
1E67C6AC000
heap
page read and write
1CC1BE8A000
heap
page read and write
1CC21D00000
heap
page read and write
1CC21D4D000
heap
page read and write
1CC21910000
trusted library allocation
page read and write
F29137F000
stack
page read and write
19E17402000
trusted library allocation
page read and write
1CC21E81000
heap
page read and write
4DC067E000
stack
page read and write
C56DA8B000
stack
page read and write
1CC2187C000
trusted library allocation
page read and write
29CA7A7F000
heap
page read and write
19E16C02000
heap
page read and write
1CC1C9DC000
heap
page read and write
1A34588E000
heap
page read and write
1CC21D8F000
heap
page read and write
1CC21D03000
heap
page read and write
1E67CF10000
heap
page read and write
1CC21D95000
heap
page read and write
1CC21D05000
heap
page read and write
1CC21D82000
heap
page read and write
1CC21F57000
heap
page read and write
20092DF0000
heap
page read and write
1CC1C7AD000
heap
page read and write
1CC1C9FB000
heap
page read and write
1E0C9A13000
heap
page read and write
1DFB0653000
heap
page read and write
8BF27FC000
stack
page read and write
1CC21D91000
heap
page read and write
20093550000
trusted library allocation
page read and write
1CC21E25000
heap
page read and write
13E54B02000
heap
page read and write
A87A67E000
stack
page read and write
1CC21D5F000
heap
page read and write
1CC21D45000
heap
page read and write
1CC21720000
trusted library allocation
page read and write
14181B35000
heap
page read and write
1CC218E0000
trusted library allocation
page read and write
13E59980000
remote allocation
page read and write
1CC21D58000
heap
page read and write
1CC21D91000
heap
page read and write
1CC1BC70000
heap
page read and write
1CC21EAB000
heap
page read and write
1E0C9A62000
heap
page read and write
1CC1C823000
heap
page read and write
8BF235F000
stack
page read and write
2D47C077000
heap
page read and write
13E59850000
trusted library allocation
page read and write
1CC21EF8000
heap
page read and write
1CC21D42000
heap
page read and write
1CC1C9D2000
heap
page read and write
1CC21D80000
heap
page read and write
1CC21DA0000
heap
page read and write
1E0C9A5E000
heap
page read and write
1CC21C26000
heap
page read and write
1CC1BCD0000
heap
page read and write
1E67CF80000
heap
page read and write
20092F13000
heap
page read and write
1CC21D89000
heap
page read and write
1CC21D3D000
heap
page read and write
19E16C40000
heap
page read and write
20AACA29000
heap
page read and write
29CA7A02000
heap
page read and write
1CC21EF2000
heap
page read and write
1CC21FA9000
heap
page read and write
13E59930000
trusted library allocation
page read and write
3A8F9F9000
stack
page read and write
1CC1C9CD000
heap
page read and write
1CC21D54000
heap
page read and write
1CC21D7D000
heap
page read and write
1CC21F71000
heap
page read and write
2D47C057000
heap
page read and write
50DDBFF000
stack
page read and write
1CC21E1F000
heap
page read and write
1DFB0600000
heap
page read and write
29CA7A28000
heap
page read and write
1CC21700000
trusted library allocation
page read and write
1E9BFD33000
heap
page read and write
1CC1C9FE000
heap
page read and write
1CC1CF00000
trusted library allocation
page read and write
1A34582A000
heap
page read and write
1CC1BE8F000
heap
page read and write
1CC1C71D000
heap
page read and write
A94887D000
stack
page read and write
19E16A00000
heap
page read and write
1CC21D9D000
heap
page read and write
1CC1C9CA000
heap
page read and write
1CC1C95E000
heap
page read and write
1CC21874000
trusted library allocation
page read and write
16AA5580000
heap
page read and write
4DC127E000
stack
page read and write
2A17D202000
heap
page read and write
29CA7A79000
heap
page read and write
1A2EF7F000
stack
page read and write
13E59A9D000
heap
page read and write
1E9BFD52000
heap
page read and write
1CC21860000
trusted library allocation
page read and write
1CC21F80000
heap
page read and write
CAC99FE000
stack
page read and write
1E0C9A83000
heap
page read and write
1CC21860000
trusted library allocation
page read and write
1CC21840000
trusted library allocation
page read and write
1CC21F73000
heap
page read and write
1CC21C26000
heap
page read and write
1E67CD10000
remote allocation
page read and write
50DD3FC000
stack
page read and write
13E55140000
trusted library section
page readonly
1CC1BE13000
heap
page read and write
1CC21F5B000
heap
page read and write
13E5423D000
heap
page read and write
2D47BDD0000
heap
page read and write
1E67C6E2000
heap
page read and write
1E67CE02000
heap
page read and write
1CC1C9E4000
heap
page read and write
1CC1C9A3000
heap
page read and write
13E59AA0000
heap
page read and write
B2BCBFE000
stack
page read and write
14181931000
heap
page read and write
1CC2171C000
trusted library allocation
page read and write
8BF22DA000
stack
page read and write
16AA5613000
heap
page read and write
20092EBA000
heap
page read and write
1CC1BC60000
heap
page read and write
1CC21C2D000
heap
page read and write
4DC087B000
stack
page read and write
1DFB0666000
heap
page read and write
1CC21EE8000
heap
page read and write
2A17D261000
heap
page read and write
29CA7B02000
heap
page read and write
B2BCE7D000
stack
page read and write
1DFB067A000
heap
page read and write
20092EC5000
heap
page read and write
1CC21DAB000
heap
page read and write
1CC1D540000
trusted library allocation
page read and write
3A8FAFF000
stack
page read and write
19E16A70000
heap
page read and write
1A2E55B000
stack
page read and write
1A34584B000
heap
page read and write
1CC21F90000
heap
page read and write
1CC21C61000
heap
page read and write
1E0C9A78000
heap
page read and write
1E0C9A64000
heap
page read and write
1CC21F7A000
heap
page read and write
1CC21F3E000
heap
page read and write
4DC137E000
stack
page read and write
B2BCAFE000
stack
page read and write
1CC21C2F000
heap
page read and write
1E0C9A52000
heap
page read and write
1CC21940000
trusted library allocation
page read and write
2A17D880000
remote allocation
page read and write
13E54313000
heap
page read and write
2D47C602000
trusted library allocation
page read and write
1CC21540000
trusted library allocation
page read and write
20092E4F000
heap
page read and write
1E9BFD52000
heap
page read and write
1CC1D4C0000
trusted library section
page readonly
1E67C6C8000
heap
page read and write
20AACA3D000
heap
page read and write
1CC1C94A000
heap
page read and write
1CC21D61000
heap
page read and write
2A17DA02000
trusted library allocation
page read and write
1E0C99A0000
heap
page read and write
1E9BFD26000
heap
page read and write
1CC1BE66000
heap
page read and write
1CC216FC000
trusted library allocation
page read and write
1CC21EB8000
heap
page read and write
1CC21860000
trusted library allocation
page read and write
1CC21F4A000
heap
page read and write
1CC21F8D000
heap
page read and write
1CC1C76F000
heap
page read and write
1CC21D89000
heap
page read and write
13E549F0000
trusted library allocation
page read and write
1DFB066D000
heap
page read and write
1DFB0650000
heap
page read and write
1CC21990000
trusted library allocation
page read and write
1CC21DE3000
heap
page read and write
1CC21DD0000
heap
page read and write
1CC219B0000
remote allocation
page read and write
13E549F3000
trusted library allocation
page read and write
1CC21DDF000
heap
page read and write
16AA5520000
heap
page read and write
1E9BFD53000
heap
page read and write
76693B000
stack
page read and write
2D47C113000
heap
page read and write
1CC21700000
trusted library allocation
page read and write
1CC21B40000
trusted library allocation
page read and write
1CC1C9DD000
heap
page read and write
1CC1C9A1000
heap
page read and write
20AACA67000
heap
page read and write
1E67CD10000
remote allocation
page read and write
1E0C9A29000
heap
page read and write
1E0C9B00000
heap
page read and write
A879F3E000
stack
page read and write
1CC21E77000
heap
page read and write
1CC21716000
trusted library allocation
page read and write
1DFB0647000
heap
page read and write
1CC21D99000
heap
page read and write
8BF26FE000
stack
page read and write
1CC21EAF000
heap
page read and write
1CC1BE6F000
heap
page read and write
1CC21F6D000
heap
page read and write
1CC21874000
trusted library allocation
page read and write
1DFB03C0000
heap
page read and write
1CC21D74000
heap
page read and write
1E9BFD21000
heap
page read and write
1CC21B30000
trusted library allocation
page read and write
1CC21F14000
heap
page read and write
13E59A1F000
heap
page read and write
1DFB0632000
heap
page read and write
20AACA13000
heap
page read and write
1CC21D89000
heap
page read and write
1CC1BE74000
heap
page read and write
29CA7A50000
heap
page read and write
2A17D25F000
heap
page read and write
1CC21C61000
heap
page read and write
1CC21850000
trusted library allocation
page read and write
1CC21EE0000
heap
page read and write
1E67C6C1000
heap
page read and write
1CC21F1A000
heap
page read and write
1CC1C847000
heap
page read and write
20AACA02000
heap
page read and write
1CC21F77000
heap
page read and write
1CC1C754000
heap
page read and write
19E16C28000
heap
page read and write
1CC21C4F000
heap
page read and write
1CC1C9F8000
heap
page read and write
8BE2BFB000
stack
page read and write
1CC21D69000
heap
page read and write
1CC21DA1000
heap
page read and write
766C7F000
stack
page read and write
1418191A000
heap
page read and write
1CC21C37000
heap
page read and write
1CC1C9F0000
heap
page read and write
14181931000
heap
page read and write
13E54302000
heap
page read and write
1CC1C9CA000
heap
page read and write
1CC218B0000
trusted library allocation
page read and write
1A2EE7E000
stack
page read and write
1CC21EE2000
heap
page read and write
1E67C688000
heap
page read and write
1CC21F38000
heap
page read and write
1CC21C00000
heap
page read and write
14181B39000
heap
page read and write
1CC21DE9000
heap
page read and write
16AA563E000
heap
page read and write
1E67C4F0000
heap
page read and write
1CC21D4D000
heap
page read and write
13E542FD000
heap
page read and write
13E5427A000
heap
page read and write
4DC0AF9000
stack
page read and write
1CC21980000
trusted library allocation
page read and write
1DFB0430000
heap
page read and write
1A34583C000
heap
page read and write
4DC08F9000
stack
page read and write
A87A3FB000
stack
page read and write
1DFB062A000
heap
page read and write
1A34584E000
heap
page read and write
1CC21D2B000
heap
page read and write
1CC21E95000
heap
page read and write
20AACA71000
heap
page read and write
1CC21D88000
heap
page read and write
A948F7F000
stack
page read and write
1CC21D89000
heap
page read and write
1CC21F31000
heap
page read and write
20AAD202000
trusted library allocation
page read and write
1CC21874000
trusted library allocation
page read and write
1CC1C9F9000
heap
page read and write
B2BC9FF000
stack
page read and write
1CC1C71D000
heap
page read and write
1CC1C7C5000
heap
page read and write
1CC21E38000
heap
page read and write
1CC21D89000
heap
page read and write
C56E57E000
stack
page read and write
1A2E978000
stack
page read and write
16AA55B0000
trusted library allocation
page read and write
1CC21EF6000
heap
page read and write
2A17D080000
heap
page read and write
1CC21700000
trusted library allocation
page read and write
1E9BFD36000
heap
page read and write
1CC21D02000
heap
page read and write
1CC1BE91000
heap
page read and write
1CC21D44000
heap
page read and write
C56E07F000
stack
page read and write
1CC21DB8000
heap
page read and write
2D47C064000
heap
page read and write
16AA5636000
heap
page read and write
1CC21EF9000
heap
page read and write
1CC21F00000
heap
page read and write
1CC21E6F000
heap
page read and write
141826A0000
trusted library allocation
page read and write
1CC1C99E000
heap
page read and write
13E55661000
trusted library allocation
page read and write
1CC1C9DF000
heap
page read and write
C56E67D000
stack
page read and write
1CC21E07000
heap
page read and write
1CC21705000
trusted library allocation
page read and write
1CC21712000
trusted library allocation
page read and write
1CC21D63000
heap
page read and write
1CC2171E000
trusted library allocation
page read and write
1CC21F63000
heap
page read and write
5BA83FE000
stack
page read and write
1CC2174E000
trusted library allocation
page read and write
1CC21D97000
heap
page read and write
1CC2187C000
trusted library allocation
page read and write
16AA5E02000
trusted library allocation
page read and write
20092E87000
heap
page read and write
1CC21F89000
heap
page read and write
1CC1C9F6000
heap
page read and write
1CC1C9F8000
heap
page read and write
50DDAFF000
stack
page read and write
2F3EE7D000
stack
page read and write
1CC21700000
trusted library allocation
page read and write
1CC2174A000
trusted library allocation
page read and write
1CC21EF1000
heap
page read and write
1CC21FE2000
heap
page read and write
13E59680000
trusted library allocation
page read and write
F29177E000
stack
page read and write
1CC1C9A3000
heap
page read and write
1CC1C7CC000
heap
page read and write
1CC21D3E000
heap
page read and write
A87A47F000
stack
page read and write
1CC22010000
heap
page read and write
1CC21D70000
heap
page read and write
There are 1068 hidden memdumps, click here to show them.