IOC Report
cis-broadband invoice 08.11.22.doc

loading gif

Files

File Path
Type
Category
Malicious
cis-broadband invoice 08.11.22.doc
Zip archive data, at least v2.0 to extract
initial sample
malicious
C:\Users\user\AppData\Local\Temp\~DF1B159DF0398229BA.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\cis-broadband invoice 08.11.22.doc.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:46 2022, mtime=Fri Aug 12 02:17:18 2022, atime=Fri Aug 12 02:17:13 2022, length=2203257, window=hide
dropped
malicious
C:\Users\user\AppData\Local\Temp\~DF1CF4A488C21180D9.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\C0AEEC49-6B3D-4037-965A-40C5DB21F9AC
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\7CD912C7.png
PNG image data, 410 x 568, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\A9F03E1C.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{9343E1C6-3507-4871-9EDD-1A22949243C5}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{BBC4E15D-9EE8-46CF-A28B-0D2AE4D0041E}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\Desktop\~$s-broadband invoice 08.11.22.doc
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\83C87933.png
PNG image data, 410 x 568, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FAAE737A.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{10C83EEE-519A-4BAE-9701-FB36EC529A4B}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A4DFC439-0F12-4756-9A4F-0DC4BA4A60ED}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CDB32EEE-51F1-404D-8EA2-3142A158663B}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\cis-broadband invoice 08.11.22.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:53 2022, mtime=Tue Mar 8 15:45:53 2022, atime=Fri Aug 12 02:11:11 2022, length=2203257, window=hide
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding

URLs

Name
IP
Malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://my.microsoftpersonalcontent.com
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
https://api.powerbi.com/beta/myorg/imports
unknown
https://devnull.onenote.com
unknown
https://messaging.action.office.com/
unknown
https://ncus.pagecontentsync.
unknown
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
unknown
https://messaging.office.com/
unknown
https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.8.146.139
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
:`6
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
;`6
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
(c6
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
di6
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\1D83B
1D83B
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2C4DD
2C4DD
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2C4DD
2C4DD
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
e"-
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
.$-
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
&-
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\65DBA
65DBA
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\78CD4
78CD4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\78CD4
78CD4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 406 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1DE07A52000
heap
page read and write
1E2728C0000
trusted library allocation
page read and write
26F10702000
heap
page read and write
1E272DD4000
heap
page read and write
1E26D9D9000
heap
page read and write
1F5217F2000
heap
page read and write
1944CCF0000
trusted library allocation
page read and write
1E26D702000
heap
page read and write
1E272A60000
trusted library allocation
page read and write
26F1063A000
heap
page read and write
1E272D6F000
heap
page read and write
1E272C2D000
heap
page read and write
1E272D35000
heap
page read and write
1E272F5D000
heap
page read and write
AC096FB000
stack
page read and write
4F2F27F000
stack
page read and write
194488E0000
trusted library section
page readonly
1CD637C1000
heap
page read and write
1E26CDB0000
trusted library allocation
page read and write
1E26D7D8000
heap
page read and write
1E272C38000
heap
page read and write
1E2725E0000
trusted library allocation
page read and write
1E272C69000
heap
page read and write
1E26D9DA000
heap
page read and write
1E26D700000
heap
page read and write
111087F000
stack
page read and write
1E272C3C000
heap
page read and write
1E272C02000
heap
page read and write
23326A73000
heap
page read and write
1E26D9DA000
heap
page read and write
1E272EAA000
heap
page read and write
1E27290C000
trusted library allocation
page read and write
1E272C62000
heap
page read and write
1E272C53000
heap
page read and write
1E272EEA000
heap
page read and write
1E272EB9000
heap
page read and write
1E272EB8000
heap
page read and write
1FD0C0A0000
trusted library allocation
page read and write
1E272F54000
heap
page read and write
1E272D75000
heap
page read and write
24AF5580000
heap
page read and write
19447872000
heap
page read and write
1F5217E1000
heap
page read and write
1E272EC5000
heap
page read and write
1E272EB6000
heap
page read and write
1E272D8F000
heap
page read and write
95B5EFF000
stack
page read and write
1E272F41000
heap
page read and write
1E272F27000
heap
page read and write
1E272E7C000
heap
page read and write
1E272D42000
heap
page read and write
1E272DA6000
heap
page read and write
24AF5657000
heap
page read and write
1CD63C02000
heap
page read and write
23326A00000
heap
page read and write
1E273010000
heap
page read and write
1E26D9F0000
heap
page read and write
1E272C5B000
heap
page read and write
1CD63057000
heap
page read and write
1E272E6B000
heap
page read and write
1E272D0A000
heap
page read and write
1E272D7D000
heap
page read and write
1E2727A8000
trusted library allocation
page read and write
1E272D4E000
heap
page read and write
1944CF05000
heap
page read and write
232CF075000
heap
page read and write
C461DFF000
stack
page read and write
1E272E00000
heap
page read and write
1E26D7DA000
heap
page read and write
1F5217E6000
heap
page read and write
1E272F3F000
heap
page read and write
1DE07A13000
heap
page read and write
1E2727AC000
trusted library allocation
page read and write
1E272DE9000
heap
page read and write
1F001029000
heap
page read and write
1E272DA2000
heap
page read and write
1E272EC0000
heap
page read and write
26F10662000
heap
page read and write
2B64AAF0000
heap
page read and write
1E2728F0000
trusted library allocation
page read and write
1E26CCF0000
heap
page read and write
1E272EFA000
heap
page read and write
1E272E98000
heap
page read and write
23326A3C000
heap
page read and write
1E272790000
trusted library allocation
page read and write
23326A7D000
heap
page read and write
1B18CD30000
heap
page read and write
1E272E64000
heap
page read and write
7B448B000
stack
page read and write
1E272D89000
heap
page read and write
1E272F56000
heap
page read and write
4F2EE7E000
stack
page read and write
1944CEBC000
heap
page read and write
1E272EF5000
heap
page read and write
111077F000
stack
page read and write
1944CEE9000
heap
page read and write
1F000F00000
heap
page read and write
1E272D84000
heap
page read and write
1E272B43000
trusted library allocation
page read and write
26F10659000
heap
page read and write
1E272F2F000
heap
page read and write
1E2727A0000
trusted library allocation
page read and write
1E272EEF000
heap
page read and write
1E272C34000
heap
page read and write
1470FA63000
heap
page read and write
1CD630DF000
heap
page read and write
BEA47A000
stack
page read and write
1E26D9EE000
heap
page read and write
1E272E7E000
heap
page read and write
1E2727DE000
trusted library allocation
page read and write
1E27279C000
trusted library allocation
page read and write
1CD63108000
heap
page read and write
111037F000
stack
page read and write
1E272E43000
heap
page read and write
C461CFF000
stack
page read and write
23327130000
trusted library allocation
page read and write
1E26D858000
heap
page read and write
1470F810000
heap
page read and write
1E272E88000
heap
page read and write
1CD6379F000
heap
page read and write
1E272D55000
heap
page read and write
24AF5613000
heap
page read and write
1E272D88000
heap
page read and write
1E272EF4000
heap
page read and write
1E272F60000
heap
page read and write
1E272EB1000
heap
page read and write
1E272C2D000
heap
page read and write
1CD63070000
heap
page read and write
1E272E3A000
heap
page read and write
1E272C2D000
heap
page read and write
232CEF90000
trusted library allocation
page read and write
1E272D79000
heap
page read and write
1E272D93000
heap
page read and write
1E272EC0000
heap
page read and write
1E272DA4000
heap
page read and write
1E26CE77000
heap
page read and write
1E272D8B000
heap
page read and write
1E26E540000
trusted library section
page readonly
1944D108000
trusted library allocation
page read and write
1E272C69000
heap
page read and write
1DE07A02000
heap
page read and write
194477F0000
trusted library section
page read and write
1E272DC3000
heap
page read and write
1E26CE79000
heap
page read and write
1470F870000
heap
page read and write
1CD63059000
heap
page read and write
1E272D79000
heap
page read and write
232CF029000
heap
page read and write
1470FA29000
heap
page read and write
7B48FE000
stack
page read and write
26F1065A000
heap
page read and write
1E272BD0000
trusted library allocation
page read and write
1E26D9F2000
heap
page read and write
1E272900000
trusted library allocation
page read and write
1E272EAE000
heap
page read and write
1CD63C02000
heap
page read and write
1E26CD00000
heap
page read and write
1E26E550000
trusted library section
page readonly
23326A6C000
heap
page read and write
350D58F000
stack
page read and write
1E272D0A000
heap
page read and write
1E272EB6000
heap
page read and write
DC55CFD000
stack
page read and write
1E272904000
trusted library allocation
page read and write
1E272C26000
heap
page read and write
1E272F4F000
heap
page read and write
95B598E000
stack
page read and write
1470FA5E000
heap
page read and write
C4615FF000
stack
page read and write
1E272DF2000
heap
page read and write
1944CE65000
heap
page read and write
1E272DA2000
heap
page read and write
1E272C61000
heap
page read and write
19447800000
heap
page read and write
7B4AFE000
stack
page read and write
1CD63751000
heap
page read and write
1E2727A2000
trusted library allocation
page read and write
1E272E2F000
heap
page read and write
1F5217F3000
heap
page read and write
1E272F66000
heap
page read and write
1FD0B31E000
heap
page read and write
19448910000
trusted library section
page readonly
26F10646000
heap
page read and write
BEA57B000
stack
page read and write
19448118000
heap
page read and write
19447913000
heap
page read and write
95B5C7E000
stack
page read and write
1E272D75000
heap
page read and write
1E272C2F000
heap
page read and write
1CD63780000
heap
page read and write
4F2EFFB000
stack
page read and write
1CD635F0000
remote allocation
page read and write
1E26CE5E000
heap
page read and write
1E2727A4000
trusted library allocation
page read and write
23327202000
trusted library allocation
page read and write
BEA87C000
stack
page read and write
26F10613000
heap
page read and write
1DE07970000
heap
page read and write
26F10679000
heap
page read and write
1E26D9DF000
heap
page read and write
1E272D87000
heap
page read and write
232CF08E000
heap
page read and write
1E26D7AD000
heap
page read and write
1CD63772000
heap
page read and write
1E272F02000
heap
page read and write
1F001802000
heap
page read and write
1E272D70000
heap
page read and write
1E272F6F000
heap
page read and write
1E272D6A000
heap
page read and write
26F1065E000
heap
page read and write
1E26D967000
heap
page read and write
26F10660000
heap
page read and write
1E26D95F000
heap
page read and write
1E272DD2000
heap
page read and write
BEA8FF000
stack
page read and write
47E9077000
stack
page read and write
1E272ED4000
heap
page read and write
1FD0B31E000
heap
page read and write
1DE07920000
heap
page read and write
1FD0B140000
trusted library allocation
page read and write
1E2728D0000
trusted library allocation
page read and write
1E272F3C000
heap
page read and write
1E272F3B000
heap
page read and write
1E272C43000
heap
page read and write
1E272904000
trusted library allocation
page read and write
1E272D74000
heap
page read and write
1E26CE88000
heap
page read and write
1B18CE29000
heap
page read and write
1DE07A00000
heap
page read and write
1E272DE2000
heap
page read and write
1470FB00000
heap
page read and write
1E26D754000
heap
page read and write
26F105D0000
trusted library allocation
page read and write
1F0010C9000
heap
page read and write
1FD0B31E000
heap
page read and write
1FD0B2D0000
heap
page read and write
1F521800000
heap
page read and write
19448015000
heap
page read and write
1CD637AC000
heap
page read and write
1FD0B470000
heap
page read and write
1E272FD1000
heap
page read and write
95B5FFE000
stack
page read and write
1CD63068000
heap
page read and write
26F10666000
heap
page read and write
47E9177000
stack
page read and write
1E272900000
trusted library allocation
page read and write
1CD63785000
heap
page read and write
1E272E07000
heap
page read and write
350DB77000
stack
page read and write
26F1067A000
heap
page read and write
1CD6379E000
heap
page read and write
1E272F6B000
heap
page read and write
1E272960000
trusted library allocation
page read and write
1E272EA0000
heap
page read and write
1E272C34000
heap
page read and write
232CF08E000
heap
page read and write
1E272E09000
heap
page read and write
1E272C48000
heap
page read and write
1E272D97000
heap
page read and write
1CD6303C000
heap
page read and write
1E272D3F000
heap
page read and write
1CD6379F000
heap
page read and write
1E272C62000
heap
page read and write
1CD63029000
heap
page read and write
1E26D95D000
heap
page read and write
DC55E7D000
stack
page read and write
1CD6377F000
heap
page read and write
23326960000
heap
page read and write
1470FA00000
heap
page read and write
19447858000
heap
page read and write
1E272F98000
heap
page read and write
1E272DE0000
heap
page read and write
1E26E5A1000
trusted library allocation
page read and write
1E272C69000
heap
page read and write
23326A4F000
heap
page read and write
1E272ED1000
heap
page read and write
1E272DE2000
heap
page read and write
1E272EA8000
heap
page read and write
1DE07910000
heap
page read and write
1E272E98000
heap
page read and write
1F521730000
heap
page read and write
1E272DBF000
heap
page read and write
BEA27B000
stack
page read and write
1E272EC0000
heap
page read and write
1DE07A3D000
heap
page read and write
1F521600000
heap
page read and write
1E272EBF000
heap
page read and write
1E272C34000
heap
page read and write
1E272EB0000
heap
page read and write
1E272D9C000
heap
page read and write
1E272EC0000
heap
page read and write
1E272D80000
heap
page read and write
1E26D7AD000
heap
page read and write
C4616FC000
stack
page read and write
24AF5D70000
remote allocation
page read and write
1E2727B0000
trusted library allocation
page read and write
1E272C2D000
heap
page read and write
85C4C75000
stack
page read and write
1E272D80000
heap
page read and write
1B18CE69000
heap
page read and write
1E272C2F000
heap
page read and write
1E272F84000
heap
page read and write
1E272790000
trusted library allocation
page read and write
1E272DCF000
heap
page read and write
1E26D98F000
heap
page read and write
194477B0000
heap
page read and write
1F0010C2000
heap
page read and write
1E2728E0000
trusted library allocation
page read and write
1E26CE6C000
heap
page read and write
1CD637AF000
heap
page read and write
1E272EC8000
heap
page read and write
1E272C2D000
heap
page read and write
24AF563D000
heap
page read and write
47E937E000
stack
page read and write
350DA7B000
stack
page read and write
1E27290C000
trusted library allocation
page read and write
1944CE89000
heap
page read and write
1E272D84000
heap
page read and write
2B64B402000
trusted library allocation
page read and write
1E26D9E3000
heap
page read and write
232CF043000
heap
page read and write
1E2728F0000
trusted library allocation
page read and write
1E26D615000
heap
page read and write
1E272E3C000
heap
page read and write
1E272C34000
heap
page read and write
1CD630F6000
heap
page read and write
26F10669000
heap
page read and write
1E27279C000
trusted library allocation
page read and write
1E2727AC000
trusted library allocation
page read and write
85C4B7B000
stack
page read and write
1E26D98A000
heap
page read and write
356457F000
stack
page read and write
85C467E000
stack
page read and write
1E272F98000
heap
page read and write
1F001064000
heap
page read and write
1E272C26000
heap
page read and write
1CD6304A000
heap
page read and write
1FD0B290000
heap
page read and write
1E272E78000
heap
page read and write
1E27278C000
trusted library allocation
page read and write
1E272C2F000
heap
page read and write
1E2727DA000
trusted library allocation
page read and write
1E272798000
trusted library allocation
page read and write
1CD62FF0000
trusted library allocation
page read and write
1E272C4D000
heap
page read and write
1E2727DE000
trusted library allocation
page read and write
1E272D51000
heap
page read and write
1E272F31000
heap
page read and write
26F10676000
heap
page read and write
AC094FB000
stack
page read and write
23326A55000
heap
page read and write
1E272D6C000
heap
page read and write
BEAC7E000
stack
page read and write
1E272F13000
heap
page read and write
232CEF60000
heap
page read and write
1E272C61000
heap
page read and write
145BC79000
stack
page read and write
1E272EB9000
heap
page read and write
1F001025000
heap
page read and write
4F2F1F7000
stack
page read and write
1E272F16000
heap
page read and write
1E272F1D000
heap
page read and write
145BCFF000
stack
page read and write
1E272E0B000
heap
page read and write
85C46FE000
stack
page read and write
1F521800000
heap
page read and write
1E2729C0000
trusted library allocation
page read and write
1FD0C080000
trusted library allocation
page read and write
1DE07A30000
heap
page read and write
1E272E09000
heap
page read and write
1E272ED6000
heap
page read and write
1944D120000
trusted library allocation
page read and write
1E272950000
trusted library allocation
page read and write
DC5597E000
stack
page read and write
1E272D22000
heap
page read and write
1E272C69000
heap
page read and write
1CD6306E000
heap
page read and write
26F10641000
heap
page read and write
1E272E69000
heap
page read and write
1E272C00000
heap
page read and write
1E272F00000
heap
page read and write
C461BFE000
stack
page read and write
1E272DE0000
heap
page read and write
1E272D36000
heap
page read and write
23326A13000
heap
page read and write
1E272D9E000
heap
page read and write
1E272D7C000
heap
page read and write
1E26D9FF000
heap
page read and write
1E272ED8000
heap
page read and write
19447FE1000
trusted library allocation
page read and write
1E272790000
trusted library allocation
page read and write
1CD635F0000
remote allocation
page read and write
1E26D9E1000
heap
page read and write
1E2729D0000
trusted library allocation
page read and write
23326B08000
heap
page read and write
1E272D68000
heap
page read and write
1E272DCB000
heap
page read and write
1E272EB6000
heap
page read and write
1CD63700000
heap
page read and write
1B18CF02000
heap
page read and write
145BA7A000
stack
page read and write
1E272FBA000
heap
page read and write
1E272FC3000
heap
page read and write
1F000FA0000
trusted library allocation
page read and write
923EEFE000
stack
page read and write
1944D10E000
trusted library allocation
page read and write
1E2727AE000
trusted library allocation
page read and write
1E272DE6000
heap
page read and write
1F0010BB000
heap
page read and write
1CD6305C000
heap
page read and write
1E272D06000
heap
page read and write
1E26CE3D000
heap
page read and write
356447F000
stack
page read and write
26F10645000
heap
page read and write
1CD637B2000
heap
page read and write
1DE07A29000
heap
page read and write
24AF5651000
heap
page read and write
1944D121000
trusted library allocation
page read and write
1E272D02000
heap
page read and write
1E2728F0000
trusted library allocation
page read and write
1CD62DB0000
heap
page read and write
1E272C2D000
heap
page read and write
1944CDE0000
trusted library allocation
page read and write
1E272E3E000
heap
page read and write
1E2725D0000
trusted library allocation
page read and write
1E272D6E000
heap
page read and write
1E272B40000
trusted library allocation
page read and write
1E272D49000
heap
page read and write
1CD63C44000
heap
page read and write
1E272C5F000
heap
page read and write
1E27290C000
trusted library allocation
page read and write
85C3D7A000
unkown
page read and write
19447894000
heap
page read and write
232CF03C000
heap
page read and write
1E26D602000
heap
page read and write
1E26D9C5000
heap
page read and write
1E26D9DA000
heap
page read and write
1E2727AC000
trusted library allocation
page read and write
1E26D76D000
heap
page read and write
BEA17A000
stack
page read and write
1E272DEA000
heap
page read and write
1E272C34000
heap
page read and write
1E272F4A000
heap
page read and write
1E2727B0000
trusted library allocation
page read and write
1CD630C7000
heap
page read and write
1470F970000
trusted library allocation
page read and write
2B64AB60000
heap
page read and write
1E2727A4000
trusted library allocation
page read and write
26F10657000
heap
page read and write
1E272F49000
heap
page read and write
BEA97F000
stack
page read and write
1E27279E000
trusted library allocation
page read and write
1E26D792000
heap
page read and write
1E272E98000
heap
page read and write
1E26E5D0000
trusted library allocation
page read and write
1E272DB1000
heap
page read and write
1E272C55000
heap
page read and write
1E272F2B000
heap
page read and write
1E272C53000
heap
page read and write
1E272DC6000
heap
page read and write
1E272790000
trusted library allocation
page read and write
1E272990000
trusted library allocation
page read and write
1F5217F2000
heap
page read and write
19448710000
trusted library allocation
page read and write
1E272E33000
heap
page read and write
24AF55E0000
heap
page read and write
1CD635F0000
remote allocation
page read and write
1E272772000
trusted library allocation
page read and write
1E26D9B2000
heap
page read and write
1E26D72D000
heap
page read and write
C4619FE000
stack
page read and write
1E272F36000
heap
page read and write
1E272F43000
heap
page read and write
85C487D000
stack
page read and write
BEA37E000
stack
page read and write
1E272C26000
heap
page read and write
1E26D9F6000
heap
page read and write
1E272E04000
heap
page read and write
1E26D9DA000
heap
page read and write
1CD630D2000
heap
page read and write
1E272DE3000
heap
page read and write
1FD0BE40000
trusted library allocation
page read and write
1CD6377D000
heap
page read and write
1FD0B130000
heap
page read and write
1E2728B0000
remote allocation
page read and write
1E26E580000
trusted library section
page readonly
2B64AB90000
trusted library allocation
page read and write
19447902000
heap
page read and write
1E26D9E9000
heap
page read and write
1E26CE00000
heap
page read and write
1E272DE4000
heap
page read and write
1E272E98000
heap
page read and write
1470FA7E000
heap
page read and write
1CD637B2000
heap
page read and write
85C447E000
stack
page read and write
1E272900000
trusted library allocation
page read and write
356477B000
stack
page read and write
1E26D723000
heap
page read and write
26F1066A000
heap
page read and write
1470FA5D000
heap
page read and write
1CD63785000
heap
page read and write
1E26D80A000
heap
page read and write
232CF013000
heap
page read and write
350DC7E000
stack
page read and write
1CD63113000
heap
page read and write
194488F0000
trusted library section
page readonly
1944E000000
heap
page read and write
1E272D6E000
heap
page read and write
1E272D84000
heap
page read and write
1CD63785000
heap
page read and write
1E26D9DA000
heap
page read and write
1470FB08000
heap
page read and write
1E272DA8000
heap
page read and write
1E272E8C000
heap
page read and write
24AF5E02000
trusted library allocation
page read and write
1CD62E20000
heap
page read and write
1E272D4C000
heap
page read and write
1F000F70000
heap
page read and write
1E26E280000
trusted library allocation
page read and write
1E272904000
trusted library allocation
page read and write
923F07F000
stack
page read and write
1E272E0B000
heap
page read and write
1E272795000
trusted library allocation
page read and write
23326B13000
heap
page read and write
1E272D3D000
heap
page read and write
1F521816000
heap
page read and write
1E272E76000
heap
page read and write
85C497E000
stack
page read and write
1E2727A4000
trusted library allocation
page read and write
1E272EC1000
heap
page read and write
1E272F33000
heap
page read and write
1944CE40000
heap
page read and write
1E272DB7000
heap
page read and write
1944CE5E000
heap
page read and write
1E272E74000
heap
page read and write
923F179000
stack
page read and write
1944787B000
heap
page read and write
1E26D9E5000
heap
page read and write
1944CD10000
trusted library allocation
page read and write
1E272C58000
heap
page read and write
1E272770000
trusted library allocation
page read and write
1E26D9EB000
heap
page read and write
1E272904000
trusted library allocation
page read and write
1E272EDA000
heap
page read and write
1E272790000
trusted library allocation
page read and write
1470FA47000
heap
page read and write
1E272F82000
heap
page read and write
1E272E10000
heap
page read and write
1E272910000
trusted library allocation
page read and write
1E26D7CB000
heap
page read and write
1E272FC3000
heap
page read and write
1E272E35000
heap
page read and write
1E272EE0000
heap
page read and write
2B64AB00000
heap
page read and write
1E272EFF000
heap
page read and write
1E272D3D000
heap
page read and write
1E272D85000
heap
page read and write
19448100000
heap
page read and write
1F0010E2000
heap
page read and write
1E272F79000
heap
page read and write
1E272F09000
heap
page read and write
1E272900000
trusted library allocation
page read and write
1E272F35000
heap
page read and write
1E272798000
trusted library allocation
page read and write
1E26D9F8000
heap
page read and write
26F10631000
heap
page read and write
1CD6376E000
heap
page read and write
145BAFF000
stack
page read and write
350DD7C000
stack
page read and write
1CD6306E000
heap
page read and write
1E272EA3000
heap
page read and write
BEA77E000
stack
page read and write
1944D170000
remote allocation
page read and write
1E272D85000
heap
page read and write
1E272C26000
heap
page read and write
1F521812000
heap
page read and write
1E272EB2000
heap
page read and write
923EE7D000
stack
page read and write
1E272DA1000
heap
page read and write
1E26D7E0000
heap
page read and write
1944CD40000
trusted library allocation
page read and write
1944CC80000
trusted library allocation
page read and write
1CD63772000
heap
page read and write
23326A88000
heap
page read and write
47E927B000
stack
page read and write
26F1064E000
heap
page read and write
1E272EC0000
heap
page read and write
1CD63C00000
heap
page read and write
1E272EC0000
heap
page read and write
1E26D7C4000
heap
page read and write
2B64AC41000
heap
page read and write
1E272D3D000
heap
page read and write
85C427A000
stack
page read and write
1E272EE3000
heap
page read and write
1B18CE00000
heap
page read and write
DC55D7E000
stack
page read and write
1E272D91000
heap
page read and write
1F5217F5000
heap
page read and write
1E272F0A000
heap
page read and write
1E26D72A000
heap
page read and write
19448703000
trusted library allocation
page read and write
1E26D716000
heap
page read and write
19448920000
trusted library section
page readonly
1F5217F1000
heap
page read and write
111027B000
stack
page read and write
DC55AFE000
stack
page read and write
232CF07B000
heap
page read and write
1CD6377F000
heap
page read and write
1E26D9DA000
heap
page read and write
1CD63C02000
heap
page read and write
1E272EAA000
heap
page read and write
2B64AC6A000
heap
page read and write
1E272D3D000
heap
page read and write
1E272F4D000
heap
page read and write
1944CD00000
trusted library allocation
page read and write
1CD63053000
heap
page read and write
1944CD10000
trusted library allocation
page read and write
1F001113000
heap
page read and write
19448800000
trusted library allocation
page read and write
1E272D7F000
heap
page read and write
356487C000
stack
page read and write
1E26D9E7000
heap
page read and write
145BBF9000
stack
page read and write
1470FA3C000
heap
page read and write
1944D130000
trusted library allocation
page read and write
1E272DB3000
heap
page read and write
26F10673000
heap
page read and write
1470FA61000
heap
page read and write
1E272D1C000
heap
page read and write
1CD63116000
heap
page read and write
1E26D999000
heap
page read and write
232CEEF0000
heap
page read and write
1E272EC4000
heap
page read and write
1944D140000
trusted library allocation
page read and write
1E26D9AD000
heap
page read and write
85C457A000
stack
page read and write
194478A1000
heap
page read and write
85C477E000
stack
page read and write
1E26D9DB000
heap
page read and write
1F0010CC000
heap
page read and write
1E26D9A5000
heap
page read and write
1B18CE57000
heap
page read and write
1E272F46000
heap
page read and write
1E26D9DA000
heap
page read and write
1CD63778000
heap
page read and write
1CD63788000
heap
page read and write
1944CE4D000
heap
page read and write
C461AFF000
stack
page read and write
1E272F65000
heap
page read and write
26F10674000
heap
page read and write
1E272DCF000
heap
page read and write
1E272DA6000
heap
page read and write
1E272E98000
heap
page read and write
1E272EDC000
heap
page read and write
1FD0B400000
trusted library allocation
page read and write
1E272C2D000
heap
page read and write
1E272790000
trusted library allocation
page read and write
1F001913000
heap
page read and write
1E272C61000
heap
page read and write
1E26D9F3000
heap
page read and write
1E272EF3000
heap
page read and write
111057B000
stack
page read and write
1E272DB3000
heap
page read and write
1E272DF5000
heap
page read and write
1E2727A0000
trusted library allocation
page read and write
19448900000
trusted library section
page readonly
1E26D9FA000
heap
page read and write
1E272D0B000
heap
page read and write
1E272BE0000
trusted library allocation
page read and write
1CD63716000
heap
page read and write
1E272830000
trusted library allocation
page read and write
1E272D2B000
heap
page read and write
1E272C2F000
heap
page read and write
1F521A25000
heap
page read and write
BEAA7F000
stack
page read and write
1CD6307B000
heap
page read and write
1944788D000
heap
page read and write
1E26E460000
trusted library allocation
page read and write
1E26D9DD000
heap
page read and write
95B590B000
stack
page read and write
1E272E98000
heap
page read and write
1E272D06000
heap
page read and write
1E272D91000
heap
page read and write
1E272E98000
heap
page read and write
1FD0B343000
heap
page read and write
1E2727F5000
trusted library allocation
page read and write
1E272D07000
heap
page read and write
1E272E92000
heap
page read and write
1E26CE8C000
heap
page read and write
11102FF000
stack
page read and write
1E272D95000
heap
page read and write
1E272C26000
heap
page read and write
1E272D81000
heap
page read and write
1CD62DC0000
heap
page read and write
1E272D13000
heap
page read and write
1E272C2C000
heap
page read and write
1CD630B1000
heap
page read and write
1E273010000
heap
page read and write
1E272C3A000
heap
page read and write
1E272D08000
heap
page read and write
1CD63791000
heap
page read and write
1E272D04000
heap
page read and write
1F00103E000
heap
page read and write
7B4BFF000
stack
page read and write
1944788F000
heap
page read and write
1E26CE90000
heap
page read and write
1E272EB8000
heap
page read and write
85C4379000
stack
page read and write
1E26CFEB000
heap
page read and write
1E272D7B000
heap
page read and write
26F10602000
heap
page read and write
85C3DFF000
stack
page read and write
1E272C38000
heap
page read and write
1944CF02000
heap
page read and write
1944CD20000
trusted library allocation
page read and write
1CD630F8000
heap
page read and write
1E272DB1000
heap
page read and write
232CEF00000
heap
page read and write
1E272900000
trusted library allocation
page read and write
1F5217F2000
heap
page read and write
1E272C69000
heap
page read and write
C4618FD000
stack
page read and write
1E26D72A000
heap
page read and write
1E272EB6000
heap
page read and write
1944789F000
heap
page read and write
1E272EED000
heap
page read and write
1944D124000
trusted library allocation
page read and write
1E2729E0000
trusted library allocation
page read and write
1E272790000
trusted library allocation
page read and write
1E272D3D000
heap
page read and write
1E26D950000
heap
page read and write
4F2EBAC000
stack
page read and write
3564B7F000
stack
page read and write
1E272EC0000
heap
page read and write
1E26CFC2000
heap
page read and write
85C3C7C000
stack
page read and write
1E272F7B000
heap
page read and write
1E272D87000
heap
page read and write
26F1063D000
heap
page read and write
1E272D84000
heap
page read and write
1E272DD5000
heap
page read and write
1DE08202000
trusted library allocation
page read and write
26F105A0000
heap
page read and write
1E26D823000
heap
page read and write
1E272E45000
heap
page read and write
1B18CD90000
heap
page read and write
1E272E8E000
heap
page read and write
1470FA5C000
heap
page read and write
47E8ADB000
stack
page read and write
1E272DD4000
heap
page read and write
24AF5602000
heap
page read and write
1944D170000
remote allocation
page read and write
1E272C3C000
heap
page read and write
1E272D3D000
heap
page read and write
1E26D600000
heap
page read and write
1E26CF13000
heap
page read and write
2B64AC24000
heap
page read and write
1E272770000
trusted library allocation
page read and write
923EFFA000
stack
page read and write
1E272C69000
heap
page read and write
1FD0C090000
heap
page readonly
1E272EC0000
heap
page read and write
1E272C61000
heap
page read and write
1E272D3D000
heap
page read and write
1E272F38000
heap
page read and write
3564A7D000
stack
page read and write
1E26E590000
trusted library section
page readonly
24AF5D40000
trusted library allocation
page read and write
1E272EF7000
heap
page read and write
1B18CE13000
heap
page read and write
1E272EAC000
heap
page read and write
1B18CE40000
heap
page read and write
1CD630AB000
heap
page read and write
1E272DB5000
heap
page read and write
1944D100000
trusted library allocation
page read and write
4F2EEFE000
stack
page read and write
1E272EC0000
heap
page read and write
19447813000
heap
page read and write
1E272D85000
heap
page read and write
1CD6308B000
heap
page read and write
1E272EA9000
heap
page read and write
1E2727A0000
trusted library allocation
page read and write
1F521800000
heap
page read and write
1FD0B480000
trusted library allocation
page read and write
1E26D81B000
heap
page read and write
19447841000
heap
page read and write
1E272C4F000
heap
page read and write
1E26D9CA000
heap
page read and write
1944D150000
trusted library allocation
page read and write
1E2728F0000
trusted library allocation
page read and write
1E272770000
trusted library allocation
page read and write
1E272904000
trusted library allocation
page read and write
350D87E000
stack
page read and write
1E26CE5B000
heap
page read and write
7B49FA000
stack
page read and write
1CD6304D000
heap
page read and write
1E272E7C000
heap
page read and write
1CD63776000
heap
page read and write
1F521A20000
heap
page read and write
1CD63780000
heap
page read and write
1F521814000
heap
page read and write
1E2727F5000
trusted library allocation
page read and write
1E272EC0000
heap
page read and write
1E26D95B000
heap
page read and write
1E272F77000
heap
page read and write
1E272F1A000
heap
page read and write
1944788B000
heap
page read and write
1E272D95000
heap
page read and write
1E272D0F000
heap
page read and write
26F10530000
heap
page read and write
1E272C2F000
heap
page read and write
1E2727AA000
trusted library allocation
page read and write
1E272D07000
heap
page read and write
1F00106C000
heap
page read and write
1E272DDE000
heap
page read and write
1E272E24000
heap
page read and write
1E272C2D000
heap
page read and write
1E272C55000
heap
page read and write
1E272EDE000
heap
page read and write
1CD63C02000
heap
page read and write
1944CEE3000
heap
page read and write
923F0FF000
stack
page read and write
1E272E7E000
heap
page read and write
1E272D41000
heap
page read and write
1CD6305B000
heap
page read and write
1E272D77000
heap
page read and write
1944CD20000
trusted library allocation
page read and write
1E272C2F000
heap
page read and write
1CD6379E000
heap
page read and write
1E26D943000
heap
page read and write
19448102000
heap
page read and write
1E272D82000
heap
page read and write
1E26E560000
trusted library section
page readonly
1E272EB6000
heap
page read and write
1CD6377E000
heap
page read and write
1E272C62000
heap
page read and write
1E272D02000
heap
page read and write
1E272EC0000
heap
page read and write
1E272EB7000
heap
page read and write
23326B00000
heap
page read and write
356407C000
stack
page read and write
19448113000
heap
page read and write
1E272F2D000
heap
page read and write
1F521816000
heap
page read and write
19448118000
heap
page read and write
1E2727B2000
trusted library allocation
page read and write
1E272D1E000
heap
page read and write
1E26D723000
heap
page read and write
923EBAC000
stack
page read and write
1944CEFE000
heap
page read and write
1E272D62000
heap
page read and write
1E272C13000
heap
page read and write
1470FA88000
heap
page read and write
1E272970000
trusted library allocation
page read and write
47E8F7E000
stack
page read and write
1944CD50000
trusted library allocation
page read and write
1E26CE29000
heap
page read and write
1E26D85A000
heap
page read and write
1E272D60000
heap
page read and write
2B64AD02000
heap
page read and write
47E947A000
stack
page read and write
4F2F37E000
stack
page read and write
BEA67E000
stack
page read and write
BEA078000
stack
page read and write
2B64AC00000
heap
page read and write
1CD63718000
heap
page read and write
1E272EA6000
heap
page read and write
1CD63775000
heap
page read and write
1E27290C000
trusted library allocation
page read and write
194478BC000
heap
page read and write
26F10664000
heap
page read and write
1E272D84000
heap
page read and write
1FD0B330000
heap
page read and write
1E272ECE000
heap
page read and write
1E2728B0000
remote allocation
page read and write
1E272EA6000
heap
page read and write
1CD63013000
heap
page read and write
19447740000
heap
page read and write
1FD0B270000
heap
page read and write
23326B02000
heap
page read and write
23326970000
heap
page read and write
1944CEB2000
heap
page read and write
1E2728F0000
trusted library allocation
page read and write
DC555BB000
stack
page read and write
1E272C26000
heap
page read and write
1E272904000
trusted library allocation
page read and write
1E272FCA000
heap
page read and write
19448700000
trusted library allocation
page read and write
2B64AC02000
heap
page read and write
26F1067D000
heap
page read and write
1E2727DA000
trusted library allocation
page read and write
1E26D71D000
heap
page read and write
1E272C61000
heap
page read and write
1E272C39000
heap
page read and write
47E8B5E000
stack
page read and write
1F001900000
heap
page read and write
1E272D4A000
heap
page read and write
232CF06F000
heap
page read and write
1CD63052000
heap
page read and write
1E26E288000
trusted library allocation
page read and write
1B18CE7A000
heap
page read and write
1E272D56000
heap
page read and write
1E2727A8000
trusted library allocation
page read and write
1E272F62000
heap
page read and write
1E272D66000
heap
page read and write
1E26E570000
trusted library section
page readonly
1944CD40000
trusted library allocation
page read and write
1CD63785000
heap
page read and write
1470FB02000
heap
page read and write
1E272EC0000
heap
page read and write
1E272C34000
heap
page read and write
1CD63049000
heap
page read and write
1E272DC1000
heap
page read and write
19447750000
heap
page read and write
C4614FB000
stack
page read and write
26F10E02000
trusted library allocation
page read and write
1E2727B2000
trusted library allocation
page read and write
85C4E7D000
stack
page read and write
1470FA60000
heap
page read and write
DC55BFE000
stack
page read and write
19448C80000
trusted library allocation
page read and write
4F2F0FB000
stack
page read and write
AC097FF000
stack
page read and write
2B64AD13000
heap
page read and write
1E272EE5000
heap
page read and write
1E27290C000
trusted library allocation
page read and write
1E272DEF000
heap
page read and write
1E272D3D000
heap
page read and write
923EF79000
stack
page read and write
232CF04D000
heap
page read and write
47E8BDE000
stack
page read and write
1E2727A2000
trusted library allocation
page read and write
85C45FF000
stack
page read and write
1E272EFE000
heap
page read and write
356427C000
stack
page read and write
26F10640000
heap
page read and write
1E26DF80000
trusted library allocation
page read and write
1E26D954000
heap
page read and write
923F1FD000
stack
page read and write
1E272650000
trusted library allocation
page read and write
1E26CD90000
trusted library allocation
page read and write
1E272D05000
heap
page read and write
1E272D6A000
heap
page read and write
19447877000
heap
page read and write
1E272C10000
heap
page read and write
1E272A10000
trusted library allocation
page read and write
19448930000
trusted library section
page readonly
1E272C50000
heap
page read and write
1E26D9DE000
heap
page read and write
95B5DFE000
stack
page read and write
1E27279E000
trusted library allocation
page read and write
1CD63000000
heap
page read and write
233269D0000
heap
page read and write
1E272D0D000
heap
page read and write
1E272D15000
heap
page read and write
1E272EF8000
heap
page read and write
1E272C69000
heap
page read and write
1E2727A6000
trusted library allocation
page read and write
1FD0BE30000
trusted library allocation
page read and write
1E26D9AA000
heap
page read and write
1E272D17000
heap
page read and write
1E272D3D000
heap
page read and write
1FD0B475000
heap
page read and write
1E272F5B000
heap
page read and write
1470FA4A000
heap
page read and write
1E26D9F4000
heap
page read and write
1E272F29000
heap
page read and write
1CD63796000
heap
page read and write
1CD63772000
heap
page read and write
1E272E06000
heap
page read and write
1944CE23000
heap
page read and write
1E272C3D000
heap
page read and write
1F5217F7000
heap
page read and write
1DE07A1F000
heap
page read and write
1E272FD2000
heap
page read and write
1F001939000
heap
page read and write
1E272EFC000
heap
page read and write
1CD6304B000
heap
page read and write
1E272C2F000
heap
page read and write
1E272C69000
heap
page read and write
1E2728F0000
trusted library allocation
page read and write
85C4179000
stack
page read and write
1E272C69000
heap
page read and write
194478B6000
heap
page read and write
1CD637AC000
heap
page read and write
1E272D02000
heap
page read and write
85C3FFF000
stack
page read and write
35645FC000
stack
page read and write
1E272E97000
heap
page read and write
1E272D1B000
heap
page read and write
1CD630C1000
heap
page read and write
1CD63083000
heap
page read and write
1CD6379E000
heap
page read and write
1FD0B479000
heap
page read and write
1E272D5E000
heap
page read and write
1E272D7B000
heap
page read and write
1E26D9EC000
heap
page read and write
1E26CE44000
heap
page read and write
1E272F05000
heap
page read and write
232CF000000
heap
page read and write
1E272F07000
heap
page read and write
1F5217E6000
heap
page read and write
1E26CE57000
heap
page read and write
1E272EB7000
heap
page read and write
1F000F10000
heap
page read and write
BEA6FF000
stack
page read and write
1E272C26000
heap
page read and write
85C40FC000
stack
page read and write
1E272990000
trusted library allocation
page read and write
1E272D00000
heap
page read and write
1E272E7A000
heap
page read and write
1E26D96E000
heap
page read and write
1E2727A0000
trusted library allocation
page read and write
1F001102000
heap
page read and write
26F10600000
heap
page read and write
1E272DC8000
heap
page read and write
1E272D02000
heap
page read and write
1E272F63000
heap
page read and write
1E272EB6000
heap
page read and write
1E26CD60000
heap
page read and write
1E272C34000
heap
page read and write
1E272E53000
heap
page read and write
1E272C55000
heap
page read and write
1DE07A43000
heap
page read and write
35646FD000
stack
page read and write
1E272E5D000
heap
page read and write
1E2728B0000
remote allocation
page read and write
DC55A7C000
stack
page read and write
1470FA13000
heap
page read and write
1E272C56000
heap
page read and write
1E272F69000
heap
page read and write
1E272E82000
heap
page read and write
1E2729A0000
trusted library allocation
page read and write
1E272EB7000
heap
page read and write
1E272F5A000
heap
page read and write
1F5217D0000
heap
page read and write
1CD637A7000
heap
page read and write
1DE07B02000
heap
page read and write
1E27290C000
trusted library allocation
page read and write
1E272C26000
heap
page read and write
1E272EC2000
heap
page read and write
23326A29000
heap
page read and write
26F10644000
heap
page read and write
1E2727A0000
trusted library allocation
page read and write
1E26D9C0000
heap
page read and write
1E272D9B000
heap
page read and write
232CF100000
heap
page read and write
1CD630A4000
heap
page read and write
26F10648000
heap
page read and write
1E272F18000
heap
page read and write
24AF5629000
heap
page read and write
1E272D11000
heap
page read and write
AC08FFB000
stack
page read and write
1E272D5C000
heap
page read and write
2B64AC13000
heap
page read and write
1E2727A6000
trusted library allocation
page read and write
356497E000
stack
page read and write
1E26D980000
heap
page read and write
24AF5D70000
remote allocation
page read and write
1F001013000
heap
page read and write
1E272C38000
heap
page read and write
14710202000
trusted library allocation
page read and write
AC095FB000
stack
page read and write
1B18CDC0000
trusted library allocation
page read and write
95B60FF000
stack
page read and write
1E272D02000
heap
page read and write
1E272D47000
heap
page read and write
1CD63102000
heap
page read and write
1470F800000
heap
page read and write
19448000000
heap
page read and write
1FD0C0B0000
trusted library allocation
page read and write
1E26D963000
heap
page read and write
24AF5570000
heap
page read and write
1E272EBA000
heap
page read and write
232CF108000
heap
page read and write
1E272DCE000
heap
page read and write
1E26CE81000
heap
page read and write
145BD7C000
stack
page read and write
1E26D800000
heap
page read and write
1E272A30000
trusted library allocation
page read and write
26F1066C000
heap
page read and write
1E272D54000
heap
page read and write
1E26D802000
heap
page read and write
1E272F14000
heap
page read and write
1E272F58000
heap
page read and write
1E27278C000
trusted library allocation
page read and write
1E272F7F000
heap
page read and write
1E26D900000
heap
page read and write
1CD6371E000
heap
page read and write
1E26D9B8000
heap
page read and write
1CD63779000
heap
page read and write
1E272DB5000
heap
page read and write
1E272EF6000
heap
page read and write
1110677000
stack
page read and write
1470FA52000
heap
page read and write
1CD63774000
heap
page read and write
194477E0000
trusted library allocation
page read and write
1E272E90000
heap
page read and write
1E272E86000
heap
page read and write
350DE7F000
stack
page read and write
1E272EE8000
heap
page read and write
1E272D02000
heap
page read and write
1E26E5C0000
trusted library allocation
page read and write
47E94FF000
unkown
page read and write
1B18CE02000
heap
page read and write
1CD6304F000
heap
page read and write
1E272E55000
heap
page read and write
1E272900000
trusted library allocation
page read and write
1CD63068000
heap
page read and write
1DE079A0000
trusted library allocation
page read and write
BEA5FE000
stack
page read and write
1E272D84000
heap
page read and write
2B64AC5B000
heap
page read and write
1E272FC3000
heap
page read and write
1944CEF5000
heap
page read and write
1E272E7A000
heap
page read and write
1E272E84000
heap
page read and write
1E272F50000
heap
page read and write
1E272C34000
heap
page read and write
1B18CF13000
heap
page read and write
1E272D19000
heap
page read and write
1E272D87000
heap
page read and write
1E272D3D000
heap
page read and write
1F001089000
heap
page read and write
1944CD54000
trusted library allocation
page read and write
1E272C2F000
heap
page read and write
1E26CE2F000
heap
page read and write
1E2728E0000
trusted library allocation
page read and write
1E272E59000
heap
page read and write
1E272EEC000
heap
page read and write
26F10658000
heap
page read and write
1E26D961000
heap
page read and write
4F2F47F000
stack
page read and write
1CD6379F000
heap
page read and write
1E272D3E000
heap
page read and write
1E26D7B0000
heap
page read and write
24AF5600000
heap
page read and write
1E272D80000
heap
page read and write
1E26D9A6000
heap
page read and write
1F5217F8000
heap
page read and write
1E272E0D000
heap
page read and write
1E272940000
trusted library allocation
page read and write
1E26E290000
trusted library allocation
page read and write
1B18CD20000
heap
page read and write
1B18D602000
trusted library allocation
page read and write
1E27281C000
trusted library allocation
page read and write
1E272D8C000
heap
page read and write
26F10683000
heap
page read and write
26F10540000
heap
page read and write
1944D170000
remote allocation
page read and write
145BB7F000
stack
page read and write
1944CE00000
heap
page read and write
26F10629000
heap
page read and write
1E272C26000
heap
page read and write
1CD63797000
heap
page read and write
1E272D8D000
heap
page read and write
BE9E7C000
stack
page read and write
24AF5D70000
remote allocation
page read and write
1E272810000
trusted library allocation
page read and write
1E26D7F4000
heap
page read and write
1E272E71000
heap
page read and write
2B64AC76000
heap
page read and write
1E272C3F000
heap
page read and write
1E272D83000
heap
page read and write
24AF5702000
heap
page read and write
1E272F24000
heap
page read and write
1E26CE13000
heap
page read and write
1CD63602000
heap
page read and write
1CD63055000
heap
page read and write
1E272FA9000
heap
page read and write
1E272E19000
heap
page read and write
1E272E8A000
heap
page read and write
85C3E7F000
stack
page read and write
85C4A7E000
stack
page read and write
1E272795000
trusted library allocation
page read and write
1E272E81000
heap
page read and write
19448002000
heap
page read and write
1CD63783000
heap
page read and write
1E2727AA000
trusted library allocation
page read and write
1E272DD1000
heap
page read and write
1E272660000
trusted library allocation
page read and write
1E26D9DA000
heap
page read and write
1E272C37000
heap
page read and write
1E272EE2000
heap
page read and write
1B18CF00000
heap
page read and write
232CF102000
heap
page read and write
1F001066000
heap
page read and write
1E272F1F000
heap
page read and write
1E26CF8E000
heap
page read and write
1E272D6D000
heap
page read and write
1E272900000
trusted library allocation
page read and write
232CF802000
trusted library allocation
page read and write
1E272C5C000
heap
page read and write
232CF113000
heap
page read and write
1E272E04000
heap
page read and write
1E2727AE000
trusted library allocation
page read and write
26F10625000
heap
page read and write
1CD6304E000
heap
page read and write
1CD630B5000
heap
page read and write
1E26D71D000
heap
page read and write
1F001000000
heap
page read and write
1CD637A8000
heap
page read and write
1E272D3D000
heap
page read and write
C4610FC000
stack
page read and write
1F521750000
heap
page read and write
1E272D62000
heap
page read and write
26F10642000
heap
page read and write
1944CE30000
heap
page read and write
1470FB13000
heap
page read and write
1E272F7D000
heap
page read and write
19447829000
heap
page read and write
1E26D97A000
heap
page read and write
350D50B000
stack
page read and write
1944CEDC000
heap
page read and write
1E272D77000
heap
page read and write
194478FE000
heap
page read and write
1E272E13000
heap
page read and write
There are 1207 hidden memdumps, click here to show them.