IOC Report
beyondsearch,doc,08.11.22.doc

loading gif

Files

File Path
Type
Category
Malicious
beyondsearch,doc,08.11.22.doc
Zip archive data, at least v2.0 to extract
initial sample
malicious
C:\Users\user\AppData\Local\Temp\~DF94D0EFF8EF6D177A.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\beyondsearch,doc,08.11.22.doc.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:49 2022, mtime=Fri Aug 12 02:38:01 2022, atime=Fri Aug 12 02:37:55 2022, length=2248938, window=hide
dropped
malicious
C:\Users\user\AppData\Local\Temp\~DF396E86B8EC924EF0.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\880101B7-1976-46C4-80EB-3C62FC25EC73
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\986634C4.png
PNG image data, 486 x 628, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\9D5AC5F5.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{8B74BADF-B71B-4EBA-9E53-51C6FB808F05}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{E5DA2B44-0100-4DFC-B25F-A23B99F59761}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\Desktop\~$yondsearch,doc,08.11.22.doc
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9F7E4C0A.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D8AFD883.png
PNG image data, 486 x 628, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{67659BF2-E797-4523-855D-8CB155CDBA2F}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{700A5179-F871-4510-B8B1-F8AE9A6BE9FD}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{803ED0A8-1C9F-405F-9890-D3A13AC7DC84}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\beyondsearch,doc,08.11.22.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:54 2022, mtime=Tue Mar 8 15:45:54 2022, atime=Fri Aug 12 02:31:13 2022, length=2248938, window=hide
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding

URLs

Name
IP
Malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://my.microsoftpersonalcontent.com
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
https://api.powerbi.com/beta/myorg/imports
unknown
https://devnull.onenote.com
unknown
https://messaging.action.office.com/
unknown
https://ncus.pagecontentsync.
unknown
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
unknown
https://messaging.office.com/
unknown
https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.8.146.139
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
*/6
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
+/6
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
u26
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
7<6
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\1E674
1E674
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2DF1C
2DF1C
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2DF1C
2DF1C
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
~/)
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
,2)
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
55)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\66B41
66B41
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\7A850
7A850
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\7A850
7A850
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 407 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F603BFF000
stack
page read and write
1FBCF4D1000
heap
page read and write
2C66004D000
heap
page read and write
1FBCF520000
heap
page read and write
1FBCF58A000
heap
page read and write
1FBCDB90000
trusted library allocation
page read and write
BBBCCFC000
stack
page read and write
2055DAA0000
heap
page read and write
2D22AEC0000
remote allocation
page read and write
1C44D061000
heap
page read and write
20BF0631000
heap
page read and write
1FBCF202000
heap
page read and write
1FBCF302000
heap
page read and write
20BF0674000
heap
page read and write
1FBCF5EF000
heap
page read and write
292E57A000
stack
page read and write
C75F9B000
stack
page read and write
2C660102000
heap
page read and write
1FBCF5EA000
heap
page read and write
1888587B000
heap
page read and write
1FBCF22F000
heap
page read and write
1FBCF485000
heap
page read and write
27BFA424000
heap
page read and write
1FBCF331000
heap
page read and write
1FBCF406000
heap
page read and write
1FBCF34A000
heap
page read and write
1FBCF40C000
heap
page read and write
1FBC8C5A000
heap
page read and write
2D22A851000
heap
page read and write
172C37E000
stack
page read and write
1C447A13000
heap
page read and write
20BF0655000
heap
page read and write
2055DA50000
trusted library allocation
page read and write
1FBCF316000
heap
page read and write
1FBCF348000
heap
page read and write
19CFEA81000
heap
page read and write
19146452000
heap
page read and write
1FBCF509000
heap
page read and write
7C4BA7B000
stack
page read and write
1C44D049000
heap
page read and write
1987FA64000
heap
page read and write
615727E000
stack
page read and write
1FBCF573000
heap
page read and write
1FBC8B00000
heap
page read and write
2D22A883000
heap
page read and write
292DF7C000
stack
page read and write
1FBCF3CD000
heap
page read and write
1FBC8A15000
heap
page read and write
C594479000
stack
page read and write
1FBCF464000
heap
page read and write
1FBCF22C000
heap
page read and write
1FBC9940000
trusted library section
page readonly
1FBCDCF0000
trusted library allocation
page read and write
1FBCF4CB000
heap
page read and write
79F2CFE000
stack
page read and write
C59415F000
stack
page read and write
1F261400000
heap
page read and write
1FBC8B6F000
heap
page read and write
1FBCF490000
heap
page read and write
1FBCF25F000
heap
page read and write
19CFEA29000
heap
page read and write
1FBCF3A5000
heap
page read and write
1FBCF430000
heap
page read and write
1FBCF4AC000
heap
page read and write
1C44D01D000
heap
page read and write
BBBCAFA000
stack
page read and write
172C27D000
stack
page read and write
1FBCDCD0000
trusted library allocation
page read and write
2D22A84B000
heap
page read and write
1FBCF473000
heap
page read and write
2C65FEF0000
heap
page read and write
1FBCF3D2000
heap
page read and write
1FBCF332000
heap
page read and write
E76A27F000
stack
page read and write
1FBCF332000
heap
page read and write
2C660013000
heap
page read and write
1F261441000
heap
page read and write
1FBC8DA8000
heap
page read and write
1C44D054000
heap
page read and write
172BFF7000
stack
page read and write
6BEDC7C000
stack
page read and write
1FBC8DD1000
heap
page read and write
C5940DA000
stack
page read and write
1FBCF253000
heap
page read and write
2C66005F000
heap
page read and write
1FBC8D76000
heap
page read and write
19880002000
heap
page read and write
1C44D0F7000
heap
page read and write
1FBCF3CF000
heap
page read and write
1C447A8E000
heap
page read and write
1C44D2A0000
remote allocation
page read and write
1C448D93000
trusted library allocation
page read and write
20BF0648000
heap
page read and write
6BEDF7B000
stack
page read and write
1C447880000
heap
page read and write
20BF0640000
heap
page read and write
1C44CDA0000
trusted library allocation
page read and write
1FBCF393000
heap
page read and write
1FBCF40C000
heap
page read and write
2C660062000
heap
page read and write
1FBCF426000
heap
page read and write
2055E600000
heap
page readonly
1FBCF210000
heap
page read and write
1FBCF3C3000
heap
page read and write
1FBCF513000
heap
page read and write
1C448860000
trusted library section
page readonly
2055D7C0000
heap
page read and write
1FBCF40C000
heap
page read and write
27BFA2E0000
heap
page read and write
1FBCF531000
heap
page read and write
20BF066C000
heap
page read and write
1FBCF451000
heap
page read and write
1FBCF5E2000
heap
page read and write
1FBCF22D000
heap
page read and write
2D22A7A0000
trusted library allocation
page read and write
1FBCF4BF000
heap
page read and write
1FBCF41F000
heap
page read and write
1FBCDB90000
trusted library allocation
page read and write
1C44CF40000
trusted library allocation
page read and write
1FBC8DD2000
heap
page read and write
1FBCF402000
heap
page read and write
1FBCF4D3000
heap
page read and write
1FBCDD00000
trusted library allocation
page read and write
1C447AA4000
heap
page read and write
20BF03A0000
heap
page read and write
1FBCF332000
heap
page read and write
285122B0000
heap
page read and write
1FBCF250000
heap
page read and write
1FBCF5DB000
heap
page read and write
1FBC9860000
trusted library allocation
page read and write
6BEE17C000
stack
page read and write
1F26142A000
heap
page read and write
1FBC8DE2000
heap
page read and write
1C448DA0000
trusted library allocation
page read and write
1C448820000
trusted library section
page readonly
1FBC8BD8000
heap
page read and write
C5944FE000
stack
page read and write
1FBCF502000
heap
page read and write
C5945FC000
stack
page read and write
1FBC8290000
heap
page read and write
1FBCF4A0000
heap
page read and write
1FBCF5E0000
heap
page read and write
1FBCF4A3000
heap
page read and write
1FBCDCF0000
trusted library allocation
page read and write
1C447A77000
heap
page read and write
19CFEA00000
heap
page read and write
1FBC8259000
heap
page read and write
1FBCF445000
heap
page read and write
1FBCF45D000
heap
page read and write
1FBCF5CA000
heap
page read and write
2D22B100000
heap
page read and write
20BF0631000
heap
page read and write
292E87F000
stack
page read and write
2D22A902000
heap
page read and write
1FBCF483000
heap
page read and write
20BF0649000
heap
page read and write
1FBCF5B9000
heap
page read and write
2055DAA9000
heap
page read and write
191462C0000
heap
page read and write
19CFEB13000
heap
page read and write
2055E670000
trusted library allocation
page read and write
1FBCF443000
heap
page read and write
1FBCF46A000
heap
page read and write
2C66004D000
heap
page read and write
1FBCF3B1000
heap
page read and write
19CFEA87000
heap
page read and write
1C44D0FC000
heap
page read and write
1FBCDB98000
trusted library allocation
page read and write
1FBCDBA0000
trusted library allocation
page read and write
1FBCDDD0000
trusted library allocation
page read and write
1FBCDBAE000
trusted library allocation
page read and write
7C4BE77000
stack
page read and write
20BF0410000
heap
page read and write
1FBCF362000
heap
page read and write
1C448401000
trusted library allocation
page read and write
1FBCF48F000
heap
page read and write
1FBCF234000
heap
page read and write
1FBCF243000
heap
page read and write
1FBCF579000
heap
page read and write
1FBC8A02000
heap
page read and write
1987FA43000
heap
page read and write
1FBCF452000
heap
page read and write
1FBCF3F7000
heap
page read and write
1C447A3D000
heap
page read and write
20BF0660000
heap
page read and write
1C44D270000
trusted library allocation
page read and write
1FBCF335000
heap
page read and write
19CFF130000
trusted library allocation
page read and write
1FBCF450000
heap
page read and write
1FBC8281000
heap
page read and write
27BFAC02000
trusted library allocation
page read and write
1FBCF3E9000
heap
page read and write
292E27F000
stack
page read and write
1FBCF4BF000
heap
page read and write
1BAC2655000
heap
page read and write
2055D710000
heap
page read and write
1FBCF58F000
heap
page read and write
1FBCF552000
heap
page read and write
BBBC6FA000
stack
page read and write
1FBC99D0000
trusted library allocation
page read and write
285122C6000
heap
page read and write
1FBC8DC5000
heap
page read and write
2D22B170000
heap
page read and write
1FBCF547000
heap
page read and write
C763FF000
stack
page read and write
1FBCF46E000
heap
page read and write
19CFEB00000
heap
page read and write
1FBCF22D000
heap
page read and write
2D22B151000
heap
page read and write
285123E5000
heap
page read and write
C765F9000
stack
page read and write
19146402000
heap
page read and write
1FBCF332000
heap
page read and write
1FBCF332000
heap
page read and write
285122F0000
heap
page read and write
E769CFF000
stack
page read and write
1C44D280000
trusted library allocation
page read and write
1FBCDB90000
trusted library allocation
page read and write
BBBCE7D000
stack
page read and write
19CFEA59000
heap
page read and write
1FBC8BCB000
heap
page read and write
1FBC8DD7000
heap
page read and write
1FBC8DD1000
heap
page read and write
1C448850000
trusted library section
page readonly
1FBCF3AC000
heap
page read and write
1FBCF200000
heap
page read and write
1FBCF538000
heap
page read and write
1FBCF400000
heap
page read and write
1C447A56000
heap
page read and write
2D22A8C3000
heap
page read and write
27BFA513000
heap
page read and write
1FBCF588000
heap
page read and write
1BAC2570000
trusted library allocation
page read and write
1FBCF441000
heap
page read and write
1FBCDBDA000
trusted library allocation
page read and write
1FBC8C0A000
heap
page read and write
1FBC826C000
heap
page read and write
1C448840000
trusted library section
page readonly
27BFA481000
heap
page read and write
1F261476000
heap
page read and write
1FBC8D74000
heap
page read and write
1FBCF471000
heap
page read and write
1BAC25A0000
remote allocation
page read and write
1FBCD9D0000
trusted library allocation
page read and write
1FBCF4B5000
heap
page read and write
27BFA400000
heap
page read and write
1FBCF44A000
heap
page read and write
19CFEA4E000
heap
page read and write
1FBCDBF5000
trusted library allocation
page read and write
1FBCDA50000
trusted library allocation
page read and write
1FBCF332000
heap
page read and write
1FBCF331000
heap
page read and write
615747D000
stack
page read and write
C766FE000
stack
page read and write
2D22A8F9000
heap
page read and write
19CFF202000
trusted library allocation
page read and write
1FBCF300000
heap
page read and write
1FBCF334000
heap
page read and write
1FBCF540000
heap
page read and write
27BFA508000
heap
page read and write
1FBCDCE0000
trusted library allocation
page read and write
1FBCF403000
heap
page read and write
1FBCDB90000
trusted library allocation
page read and write
1FBCDC1C000
trusted library allocation
page read and write
1C448200000
heap
page read and write
1FBCF3CD000
heap
page read and write
1C448313000
heap
page read and write
2055DA80000
unclassified section
page read and write
1BAC2540000
heap
page read and write
1FBCF39A000
heap
page read and write
1FBCF337000
heap
page read and write
1C44CF70000
trusted library allocation
page read and write
1FBCF3EB000
heap
page read and write
1FBCF3FF000
heap
page read and write
1FBCF471000
heap
page read and write
1FBCF3C3000
heap
page read and write
BBBCF7E000
stack
page read and write
1FBCF5D1000
heap
page read and write
292E07E000
stack
page read and write
1FBC8DD1000
heap
page read and write
7C4BAFE000
stack
page read and write
1FBC8D00000
heap
page read and write
1FBCF4D9000
heap
page read and write
BBBC7F9000
stack
page read and write
23A17FF000
stack
page read and write
1FBCF49E000
heap
page read and write
27BFA463000
heap
page read and write
1FBC8DA4000
heap
page read and write
1FBCDB70000
trusted library allocation
page read and write
2D22B192000
heap
page read and write
1FBCDBDE000
trusted library allocation
page read and write
1FBC8283000
heap
page read and write
1FBCF543000
heap
page read and write
100AFE000
stack
page read and write
1C44D090000
trusted library allocation
page read and write
1FBCDBAA000
trusted library allocation
page read and write
1FBCF517000
heap
page read and write
1FBCF22F000
heap
page read and write
1FBCF4B2000
heap
page read and write
1FBCF46C000
heap
page read and write
1FBC822F000
heap
page read and write
1FBCF521000
heap
page read and write
1FBC8B31000
heap
page read and write
2D22B170000
heap
page read and write
1FBCF46A000
heap
page read and write
1C44CF70000
trusted library allocation
page read and write
1FBCF461000
heap
page read and write
1FBC8D4D000
heap
page read and write
19146436000
heap
page read and write
1FBC8100000
heap
page read and write
1FBCF345000
heap
page read and write
20BF0647000
heap
page read and write
2055DA60000
trusted library allocation
page read and write
19CFEA57000
heap
page read and write
1FBCDD0C000
trusted library allocation
page read and write
E769AFE000
stack
page read and write
1C447B02000
heap
page read and write
1987FACA000
heap
page read and write
1FBCF357000
heap
page read and write
1FBCF337000
heap
page read and write
1FBCDD00000
trusted library allocation
page read and write
1FBCF54C000
heap
page read and write
1C44D210000
trusted library allocation
page read and write
1FBCDB9E000
trusted library allocation
page read and write
2D22A855000
heap
page read and write
1FBCDC30000
trusted library allocation
page read and write
1FBCF402000
heap
page read and write
1FBCF519000
heap
page read and write
1FBCF4CC000
heap
page read and write
1FBCF460000
heap
page read and write
1FBCF487000
heap
page read and write
20BF0629000
heap
page read and write
BBBCB7E000
stack
page read and write
1FBCF43F000
heap
page read and write
1FBC83EB000
heap
page read and write
1FBCDD40000
trusted library allocation
page read and write
1C447B13000
heap
page read and write
1FBCF592000
heap
page read and write
1FBC8DFE000
heap
page read and write
1C4479E0000
trusted library allocation
page read and write
1FBC9970000
trusted library section
page readonly
1FBCF3A4000
heap
page read and write
20BF0645000
heap
page read and write
1FBCF5AF000
heap
page read and write
1FBCDBA4000
trusted library allocation
page read and write
1FBCF593000
heap
page read and write
292E37F000
stack
page read and write
1FBC8B27000
heap
page read and write
1FBCDB70000
trusted library allocation
page read and write
1FBCF25C000
heap
page read and write
1FBC9990000
trusted library section
page readonly
BD3EB7E000
stack
page read and write
1FBCF47B000
heap
page read and write
292E1FE000
stack
page read and write
1FBCF5CA000
heap
page read and write
7C4BB7E000
stack
page read and write
19CFEA56000
heap
page read and write
1FBCF438000
heap
page read and write
1FBCF33A000
heap
page read and write
19146C02000
trusted library allocation
page read and write
1FBC8DD0000
heap
page read and write
1FBC8BF4000
heap
page read and write
1FBCF332000
heap
page read and write
1FBCDB90000
trusted library allocation
page read and write
1FBCF4CB000
heap
page read and write
2D22AEC0000
remote allocation
page read and write
19CFEB08000
heap
page read and write
1FBCF498000
heap
page read and write
F60427F000
stack
page read and write
1FBCDD00000
trusted library allocation
page read and write
79F2E7E000
stack
page read and write
1FBCF340000
heap
page read and write
1FBC8DCB000
heap
page read and write
1FBCF5F3000
heap
page read and write
1FBCF5CA000
heap
page read and write
18886002000
trusted library allocation
page read and write
1FBCF239000
heap
page read and write
2055D7FB000
heap
page read and write
1914642F000
heap
page read and write
1FBCF4E5000
heap
page read and write
1FBCDBA2000
trusted library allocation
page read and write
1FBCDBA0000
trusted library allocation
page read and write
1FBCF52A000
heap
page read and write
1FBCDBA4000
trusted library allocation
page read and write
285122DF000
heap
page read and write
1F26146F000
heap
page read and write
1C448D71000
trusted library allocation
page read and write
1FBC8DED000
heap
page read and write
18885828000
heap
page read and write
1FBC8DB0000
heap
page read and write
1FBCF47D000
heap
page read and write
1FBCDBB2000
trusted library allocation
page read and write
1C44D02B000
heap
page read and write
27BFA453000
heap
page read and write
20BF03B0000
heap
page read and write
1C44CF80000
trusted library allocation
page read and write
1FBCF515000
heap
page read and write
1FBCF3C5000
heap
page read and write
19CFEA49000
heap
page read and write
1FBC8D43000
heap
page read and write
285123E0000
heap
page read and write
1FBCF49C000
heap
page read and write
1FBCF53D000
heap
page read and write
2C66004B000
heap
page read and write
1FBC8DC0000
heap
page read and write
61570FC000
stack
page read and write
1FBCF528000
heap
page read and write
7C4C07E000
stack
page read and write
1FBC8B54000
heap
page read and write
1FBC8160000
heap
page read and write
1FBCF332000
heap
page read and write
1FBC8190000
trusted library allocation
page read and write
1FBC9950000
trusted library section
page readonly
1FBCF58D000
heap
page read and write
1C44D0F9000
heap
page read and write
F60407B000
stack
page read and write
1C448830000
trusted library section
page readonly
BBBC27E000
stack
page read and write
1FBC8DFB000
heap
page read and write
2D22A84A000
heap
page read and write
1987FB02000
heap
page read and write
1FBCF51C000
heap
page read and write
1FBCF24F000
heap
page read and write
1FBC8289000
heap
page read and write
1FBCDC10000
trusted library allocation
page read and write
1FBC8D88000
heap
page read and write
2C65FE80000
heap
page read and write
1FBCDD04000
trusted library allocation
page read and write
1FBCF5B5000
heap
page read and write
1FBCF5B7000
heap
page read and write
1FBCF499000
heap
page read and write
1FBCDB70000
trusted library allocation
page read and write
2D22A813000
heap
page read and write
1C44CF48000
trusted library allocation
page read and write
1FBCF5AA000
heap
page read and write
1FBCF329000
heap
page read and write
1FBCF559000
heap
page read and write
2D22A630000
heap
page read and write
27BFA370000
trusted library allocation
page read and write
2055D7FB000
heap
page read and write
1FBCDD70000
trusted library allocation
page read and write
1FBCF332000
heap
page read and write
1FBCDE30000
trusted library allocation
page read and write
1987FB13000
heap
page read and write
1C44D096000
heap
page read and write
1FBCF403000
heap
page read and write
292DE7A000
stack
page read and write
1888586A000
heap
page read and write
1FBCF466000
heap
page read and write
C764FF000
stack
page read and write
1FBCF449000
heap
page read and write
1FBCF494000
heap
page read and write
1BAC2600000
heap
page read and write
1FBCDD04000
trusted library allocation
page read and write
1FBCF4DD000
heap
page read and write
1FBCF56D000
heap
page read and write
1FBCF3EB000
heap
page read and write
1FBCF50A000
heap
page read and write
1FBCF470000
heap
page read and write
1FBC8B1D000
heap
page read and write
1FBCF3BE000
heap
page read and write
6BEE07B000
stack
page read and write
1FBCDBAA000
trusted library allocation
page read and write
1FBC9980000
trusted library section
page readonly
292E2FE000
stack
page read and write
1FBCF255000
heap
page read and write
19CFEA4C000
heap
page read and write
1FBCF582000
heap
page read and write
2055D7F3000
heap
page read and write
1FBCF333000
heap
page read and write
18885813000
heap
page read and write
285122EF000
heap
page read and write
1FBCF56F000
heap
page read and write
1FBC838E000
heap
page read and write
1FBCF331000
heap
page read and write
1FBCF575000
heap
page read and write
20BF0666000
heap
page read and write
1FBCF36D000
heap
page read and write
1FBCF45E000
heap
page read and write
1FBCF3F3000
heap
page read and write
172BC7E000
stack
page read and write
1C448300000
heap
page read and write
1C44E000000
heap
page read and write
1FBC8DEE000
heap
page read and write
1FBCDB90000
trusted library allocation
page read and write
1FBCF348000
heap
page read and write
1FBCF56C000
heap
page read and write
1C44D0E9000
heap
page read and write
2055D6A0000
heap
page read and write
2D22B124000
heap
page read and write
1987FA6D000
heap
page read and write
1FBCF234000
heap
page read and write
1FBCF383000
heap
page read and write
1F26145B000
heap
page read and write
18885865000
heap
page read and write
20BF064D000
heap
page read and write
20BF0702000
heap
page read and write
1FBCF5B1000
heap
page read and write
1FBCF494000
heap
page read and write
1987FA88000
heap
page read and write
285122D5000
heap
page read and write
1BAC25A0000
remote allocation
page read and write
1BAC2602000
heap
page read and write
20BF0679000
heap
page read and write
1FBCF226000
heap
page read and write
1888583C000
heap
page read and write
1987F870000
heap
page read and write
1C44D000000
heap
page read and write
2D22AEC0000
remote allocation
page read and write
1FBCF590000
heap
page read and write
1FBCF447000
heap
page read and write
1C44D250000
trusted library allocation
page read and write
1FBCF332000
heap
page read and write
1C44D0F9000
heap
page read and write
1FBCF45A000
heap
page read and write
1FBCDBA2000
trusted library allocation
page read and write
79F2DFC000
stack
page read and write
2C65FFF0000
trusted library allocation
page read and write
1FBCF4CC000
heap
page read and write
1FBCF567000
heap
page read and write
1FBCF49B000
heap
page read and write
1FBC8BB1000
heap
page read and write
292DD77000
stack
page read and write
79F2C7F000
stack
page read and write
1FBCF3C3000
heap
page read and write
23A18FF000
stack
page read and write
1BAC25A0000
remote allocation
page read and write
20BF0644000
heap
page read and write
2055D814000
heap
page read and write
1FBCF3E3000
heap
page read and write
1FBC8BC4000
heap
page read and write
1FBCF55B000
heap
page read and write
7C4BD7B000
stack
page read and write
1FBC8229000
heap
page read and write
1FBCF226000
heap
page read and write
2C66005C000
heap
page read and write
2C660065000
heap
page read and write
1C447A9C000
heap
page read and write
BBBC97F000
stack
page read and write
BBBD175000
stack
page read and write
1FBCF477000
heap
page read and write
2D22A83C000
heap
page read and write
20BF064E000
heap
page read and write
1FBCF22F000
heap
page read and write
1FBC8DD1000
heap
page read and write
1006FF000
stack
page read and write
2D22B002000
heap
page read and write
2D22B14B000
heap
page read and write
1FBCDD10000
trusted library allocation
page read and write
1FBCF31F000
heap
page read and write
1FBCDCF0000
trusted library allocation
page read and write
1FBCF3E9000
heap
page read and write
1FBCF24D000
heap
page read and write
1FBCF333000
heap
page read and write
1FBCF3C5000
heap
page read and write
6BEE27E000
stack
page read and write
1FBCF458000
heap
page read and write
1FBCF57C000
heap
page read and write
1FBCF52E000
heap
page read and write
BBBC9FF000
stack
page read and write
285122C6000
heap
page read and write
20BF067D000
heap
page read and write
23A14FD000
stack
page read and write
1F2611A0000
heap
page read and write
27BFA2D0000
heap
page read and write
1FBC8B1D000
heap
page read and write
20BF0673000
heap
page read and write
1FBCF3CD000
heap
page read and write
1FBCF4A6000
heap
page read and write
1FBCDBB0000
trusted library allocation
page read and write
20BF0683000
heap
page read and write
1FBCDBA0000
trusted library allocation
page read and write
292D95C000
stack
page read and write
79F2F7F000
stack
page read and write
1FBCF3EE000
heap
page read and write
1FBC9400000
trusted library allocation
page read and write
F60437F000
stack
page read and write
1FBCF22F000
heap
page read and write
1BAC24E0000
heap
page read and write
18885610000
heap
page read and write
1C447A75000
heap
page read and write
1F261A02000
trusted library allocation
page read and write
18885902000
heap
page read and write
19CFE960000
heap
page read and write
1FBCF5D9000
heap
page read and write
615737E000
stack
page read and write
100BFD000
stack
page read and write
19CFEA51000
heap
page read and write
2055D7FB000
heap
page read and write
2D22A849000
heap
page read and write
1FBC83C2000
heap
page read and write
1FBCF536000
heap
page read and write
61574FE000
stack
page read and write
27BFA340000
heap
page read and write
1FBCF43B000
heap
page read and write
1FBCF4DC000
heap
page read and write
1C448950000
trusted library allocation
page read and write
292E17B000
stack
page read and write
1FBCF48D000
heap
page read and write
23A12FB000
stack
page read and write
1FBCF331000
heap
page read and write
1FBCF45A000
heap
page read and write
1BAC2E02000
trusted library allocation
page read and write
1FBCF5A9000
heap
page read and write
1FBCDB95000
trusted library allocation
page read and write
2D22A829000
heap
page read and write
1FBCF526000
heap
page read and write
20BF0602000
heap
page read and write
1FBCDCE0000
trusted library allocation
page read and write
1C448810000
trusted library section
page readonly
2D22A8A4000
heap
page read and write
27BFA500000
heap
page read and write
19146320000
heap
page read and write
1FBCF492000
heap
page read and write
1FBCDB71000
trusted library allocation
page read and write
1FBCF3FF000
heap
page read and write
1987FA00000
heap
page read and write
1FBCF348000
heap
page read and write
2D22A8F6000
heap
page read and write
BBBBF7B000
stack
page read and write
1FBCDD60000
trusted library allocation
page read and write
1FBCDB8C000
trusted library allocation
page read and write
1FBCF47E000
heap
page read and write
1FBCF4CE000
heap
page read and write
20BF064F000
heap
page read and write
1C44D0D8000
heap
page read and write
172B9EB000
stack
page read and write
1C448D90000
trusted library allocation
page read and write
2055D7B8000
heap
page read and write
292E47E000
stack
page read and write
1FBCF261000
heap
page read and write
1FBCDA60000
trusted library allocation
page read and write
1FBCDD00000
trusted library allocation
page read and write
1FBCF3CD000
heap
page read and write
1FBCF546000
heap
page read and write
1FBC8D99000
heap
page read and write
1FBCF261000
heap
page read and write
19CFEA3C000
heap
page read and write
1FBCF269000
heap
page read and write
1FBCF595000
heap
page read and write
1FBCF3FB000
heap
page read and write
1C448318000
heap
page read and write
1FBCDBA4000
trusted library allocation
page read and write
1FBCF348000
heap
page read and write
1FBC8D6B000
heap
page read and write
1FBCF213000
heap
page read and write
1FBCF261000
heap
page read and write
1FBCF226000
heap
page read and write
2C660060000
heap
page read and write
1FBC8A00000
heap
page read and write
1FBCF53E000
heap
page read and write
1C44D0EE000
heap
page read and write
1FBCF316000
heap
page read and write
1C44D0DD000
heap
page read and write
1FBCDB9C000
trusted library allocation
page read and write
1C44D2A0000
remote allocation
page read and write
2D22A853000
heap
page read and write
1FBC825B000
heap
page read and write
1FBC8243000
heap
page read and write
1FBCF489000
heap
page read and write
1FBCF43D000
heap
page read and write
1FBCDBB2000
trusted library allocation
page read and write
1FBCF3FE000
heap
page read and write
1FBC8D8C000
heap
page read and write
19880100000
heap
page read and write
1FBCF3FE000
heap
page read and write
20BF0630000
heap
page read and write
1FBCF4CF000
heap
page read and write
20BF0676000
heap
page read and write
1FBCF45C000
heap
page read and write
20BF0613000
heap
page read and write
1FBCF542000
heap
page read and write
1FBC8DE2000
heap
page read and write
1FBCF396000
heap
page read and write
2D22A850000
heap
page read and write
1FBCF332000
heap
page read and write
1C447A7A000
heap
page read and write
1FBC8DFB000
heap
page read and write
1FBCDCC0000
trusted library allocation
page read and write
BBBCD7F000
stack
page read and write
1C44CE30000
trusted library allocation
page read and write
1FBCDD90000
trusted library allocation
page read and write
2055D7FD000
heap
page read and write
1FBCF25B000
heap
page read and write
1004FC000
stack
page read and write
BBBCBFE000
stack
page read and write
1FBCF4B5000
heap
page read and write
1914643E000
heap
page read and write
1FBC99C0000
trusted library allocation
page read and write
1FBCF524000
heap
page read and write
1FBC8DB8000
heap
page read and write
1FBCF58C000
heap
page read and write
20BF064B000
heap
page read and write
1FBCDB95000
trusted library allocation
page read and write
1C44D0A0000
trusted library allocation
page read and write
20BF062E000
heap
page read and write
1C447A29000
heap
page read and write
1FBCF55D000
heap
page read and write
1FBCF349000
heap
page read and write
1FBCDCF0000
trusted library allocation
page read and write
2D22A800000
heap
page read and write
2D22A908000
heap
page read and write
1FBCDF20000
remote allocation
page read and write
2D22B11B000
heap
page read and write
1FBCF54D000
heap
page read and write
1FBCF405000
heap
page read and write
1C44D0FA000
heap
page read and write
27BFA475000
heap
page read and write
19146413000
heap
page read and write
23A0E7C000
stack
page read and write
1FBCF354000
heap
page read and write
1FBCF3FE000
heap
page read and write
2D22B161000
heap
page read and write
1FBCDD0C000
trusted library allocation
page read and write
1914642A000
heap
page read and write
1FBC8C58000
heap
page read and write
1FBCD9E0000
trusted library allocation
page read and write
1FBCF468000
heap
page read and write
1FBCF3FE000
heap
page read and write
1FBCF570000
heap
page read and write
2C660063000
heap
page read and write
1FBCF302000
heap
page read and write
1FBCF338000
heap
page read and write
1FBCF48B000
heap
page read and write
1FBCDEC0000
remote allocation
page read and write
23A107B000
stack
page read and write
1C44D098000
heap
page read and write
19CFEA13000
heap
page read and write
1FBCF3CD000
heap
page read and write
1FBCF3BE000
heap
page read and write
1C44CDB0000
trusted library allocation
page read and write
1BAC265C000
heap
page read and write
E769A7B000
stack
page read and write
1FBC9960000
trusted library section
page readonly
19CFEA4A000
heap
page read and write
20BF0600000
heap
page read and write
1FBCDD04000
trusted library allocation
page read and write
1FBCF5DC000
heap
page read and write
1F261413000
heap
page read and write
1FBCDCF0000
trusted library allocation
page read and write
10087E000
stack
page read and write
2C66004A000
heap
page read and write
1C44D010000
heap
page read and write
1FBC8D54000
heap
page read and write
1FBCF3A4000
heap
page read and write
1FBCF3A1000
heap
page read and write
1FBCDD90000
trusted library allocation
page read and write
1FBCF3BE000
heap
page read and write
2D22B181000
heap
page read and write
20BF063D000
heap
page read and write
1FBCF408000
heap
page read and write
1FBCF4EE000
heap
page read and write
1FBCDCF0000
trusted library allocation
page read and write
1FBC8DD5000
heap
page read and write
1FBCF256000
heap
page read and write
2D22A84E000
heap
page read and write
19CFEA93000
heap
page read and write
1FBCF4C5000
heap
page read and write
1FBCF4CB000
heap
page read and write
2D22A856000
heap
page read and write
1FBCF47A000
heap
page read and write
19CFEA54000
heap
page read and write
1F261513000
heap
page read and write
1FBCF4BB000
heap
page read and write
1FBCF535000
heap
page read and write
20BF0641000
heap
page read and write
1008FB000
stack
page read and write
1BAC2702000
heap
page read and write
10007B000
stack
page read and write
19CFE9D0000
heap
page read and write
1FBCF49C000
heap
page read and write
2D22A870000
heap
page read and write
20BF063A000
heap
page read and write
1F2611B0000
heap
page read and write
1C448215000
heap
page read and write
1FBCF33B000
heap
page read and write
1FBCF561000
heap
page read and write
1FBC8213000
heap
page read and write
285122DF000
heap
page read and write
1FBCF3AE000
heap
page read and write
27BFA502000
heap
page read and write
1FBCF52C000
heap
page read and write
23A11FE000
stack
page read and write
1FBC8200000
heap
page read and write
1FBCF405000
heap
page read and write
E769FF7000
stack
page read and write
1FBCF4A8000
heap
page read and write
2055D7A0000
trusted library allocation
page read and write
1FBCF462000
heap
page read and write
1FBC8C1B000
heap
page read and write
1C44CF64000
trusted library allocation
page read and write
1FBCF481000
heap
page read and write
1FBCF5E6000
heap
page read and write
BD3E97E000
stack
page read and write
1FBCF5F1000
heap
page read and write
2C660029000
heap
page read and write
172C17F000
stack
page read and write
1FBCF5CD000
heap
page read and write
1BAC2629000
heap
page read and write
292E3FF000
stack
page read and write
1FBCF316000
heap
page read and write
1FBCF234000
heap
page read and write
1FBC8DC9000
heap
page read and write
1FBCF439000
heap
page read and write
18885670000
heap
page read and write
1FBCF5D3000
heap
page read and write
1FBCF362000
heap
page read and write
1FBC9690000
trusted library allocation
page read and write
2C66003C000
heap
page read and write
1FBCDB90000
trusted library allocation
page read and write
1FBCDF20000
remote allocation
page read and write
1FBCF5DE000
heap
page read and write
1FBCF237000
heap
page read and write
1FBCF569000
heap
page read and write
2C660100000
heap
page read and write
23A16FE000
stack
page read and write
BBBC47F000
stack
page read and write
1FBCF3F9000
heap
page read and write
1FBCDB9E000
trusted library allocation
page read and write
1FBCF4EC000
heap
page read and write
19146448000
heap
page read and write
1C44D102000
heap
page read and write
1FBCF4CB000
heap
page read and write
1FBCF248000
heap
page read and write
1987F9D0000
trusted library allocation
page read and write
2055DAA5000
heap
page read and write
1FBCF472000
heap
page read and write
BD3E6FE000
stack
page read and write
2D22A888000
heap
page read and write
1FBCF449000
heap
page read and write
BD3E87F000
stack
page read and write
1FBCDD0C000
trusted library allocation
page read and write
1FBCF4BD000
heap
page read and write
1F261466000
heap
page read and write
1FBCF5D7000
heap
page read and write
2D22A848000
heap
page read and write
1FBC8DFE000
heap
page read and write
1FBCF4E3000
heap
page read and write
1FBCF493000
heap
page read and write
1FBCDDE0000
trusted library allocation
page read and write
E769DFA000
stack
page read and write
1FBCDBA0000
trusted library allocation
page read and write
F603B7B000
stack
page read and write
1FBCF3BE000
heap
page read and write
1FBC8DD9000
heap
page read and write
1FBCDD04000
trusted library allocation
page read and write
1FBCF40C000
heap
page read and write
20BF066A000
heap
page read and write
1C44D0AB000
heap
page read and write
18885770000
trusted library allocation
page read and write
1FBCF5D5000
heap
page read and write
1FBC8DC5000
heap
page read and write
1FBCF269000
heap
page read and write
1C447AAB000
heap
page read and write
1C447A70000
heap
page read and write
285122DF000
heap
page read and write
1FBC8C00000
heap
page read and write
1FBCE010000
heap
page read and write
6156D7C000
stack
page read and write
191462D0000
heap
page read and write
1F2613E0000
trusted library allocation
page read and write
1FBC8DE2000
heap
page read and write
1FBCDB9C000
trusted library allocation
page read and write
1FBCF338000
heap
page read and write
1FBCF500000
heap
page read and write
1FBCDD0C000
trusted library allocation
page read and write
1FBCF332000
heap
page read and write
1FBCF5B3000
heap
page read and write
1FBCF4AA000
heap
page read and write
292E67A000
stack
page read and write
1FBCF53B000
heap
page read and write
1FBCDB98000
trusted library allocation
page read and write
61575FD000
stack
page read and write
1FBC828D000
heap
page read and write
1FBCF5CB000
heap
page read and write
1FBCF4CB000
heap
page read and write
1FBC8279000
heap
page read and write
BBBD37D000
stack
page read and write
1FBCDD04000
trusted library allocation
page read and write
1987FA29000
heap
page read and write
1FBCF3A3000
heap
page read and write
18885913000
heap
page read and write
1FBC8B2E000
heap
page read and write
C59457E000
stack
page read and write
1FBCF332000
heap
page read and write
BBBC37A000
stack
page read and write
1FBC8DA3000
heap
page read and write
1FBCDBB0000
trusted library allocation
page read and write
19CFE970000
heap
page read and write
1FBC8DC9000
heap
page read and write
1FBCF4BD000
heap
page read and write
2D22A8C9000
heap
page read and write
1F26148B000
heap
page read and write
1FBC8B02000
heap
page read and write
E76A0FF000
stack
page read and write
1FBCF332000
heap
page read and write
1FBCF4B4000
heap
page read and write
2055DAB0000
trusted library allocation
page read and write
1FBCF463000
heap
page read and write
1FBCF402000
heap
page read and write
BBBC57B000
stack
page read and write
20BF0646000
heap
page read and write
BBBC5F9000
stack
page read and write
1FBCDBAC000
trusted library allocation
page read and write
1FBCF47F000
heap
page read and write
19146A80000
trusted library allocation
page read and write
1FBCDBA8000
trusted library allocation
page read and write
1FBCF51E000
heap
page read and write
1FBC80F0000
heap
page read and write
F603E7F000
stack
page read and write
1C44CF60000
trusted library allocation
page read and write
1FBCF456000
heap
page read and write
1FBC8DAB000
heap
page read and write
1BAC263D000
heap
page read and write
2C66005E000
heap
page read and write
1FBCDF30000
trusted library allocation
page read and write
2055E5F0000
trusted library allocation
page read and write
1FBCF3C5000
heap
page read and write
1FBCDD00000
trusted library allocation
page read and write
19146502000
heap
page read and write
1FBCF3A2000
heap
page read and write
19146446000
heap
page read and write
1FBCF269000
heap
page read and write
1FBCF269000
heap
page read and write
2D22A6A0000
heap
page read and write
1FBCF226000
heap
page read and write
1FBCF22D000
heap
page read and write
1FBCF463000
heap
page read and write
1FBCF262000
heap
page read and write
2055D7B0000
heap
page read and write
27BFA43C000
heap
page read and write
1FBCF4CB000
heap
page read and write
1FBCF302000
heap
page read and write
1FBCF475000
heap
page read and write
20BF065F000
heap
page read and write
1987F8D0000
heap
page read and write
2055D6B0000
trusted library allocation
page read and write
1FBCF4AC000
heap
page read and write
1FBCDD0C000
trusted library allocation
page read and write
1FBCF423000
heap
page read and write
18885802000
heap
page read and write
1FBCF4B0000
heap
page read and write
1FBCF511000
heap
page read and write
79F2D79000
stack
page read and write
1FBCF258000
heap
page read and write
1987FAB9000
heap
page read and write
1FBC8D4C000
heap
page read and write
1FBCF580000
heap
page read and write
1FBCDDA0000
trusted library allocation
page read and write
1FBCF234000
heap
page read and write
1FBCF22D000
heap
page read and write
1FBCF564000
heap
page read and write
1FBCDE10000
trusted library allocation
page read and write
1F261402000
heap
page read and write
1FBCF4D6000
heap
page read and write
1FBCDD50000
trusted library allocation
page read and write
1FBCDE60000
trusted library allocation
page read and write
1FBCF3DE000
heap
page read and write
1C44CF61000
trusted library allocation
page read and write
2D22A8B0000
heap
page read and write
1FBCF3A1000
heap
page read and write
1C448318000
heap
page read and write
1FBC9680000
trusted library allocation
page read and write
2C660099000
heap
page read and write
1FBCF433000
heap
page read and write
1FBC823D000
heap
page read and write
20BF0639000
heap
page read and write
20BF0C02000
trusted library allocation
page read and write
1FBCF5ED000
heap
page read and write
1F261502000
heap
page read and write
1C44D2A0000
remote allocation
page read and write
19CFEB02000
heap
page read and write
1FBCF316000
heap
page read and write
1C44CF84000
trusted library allocation
page read and write
1BAC24D0000
heap
page read and write
1987FAC2000
heap
page read and write
79F2EF9000
stack
page read and write
1FBCF562000
heap
page read and write
1FBCF000000
trusted library allocation
page read and write
2055E3E0000
trusted library allocation
page read and write
1FBCF5E4000
heap
page read and write
1FBCDBA6000
trusted library allocation
page read and write
1FBC8B91000
heap
page read and write
1FBCF226000
heap
page read and write
2D22B11D000
heap
page read and write
1FBCDDC0000
trusted library allocation
page read and write
1FBCF317000
heap
page read and write
1FBCF423000
heap
page read and write
1FBCF3FE000
heap
page read and write
1FBCF4B7000
heap
page read and write
285122D8000
heap
page read and write
1FBCF337000
heap
page read and write
BBBD07E000
stack
page read and write
1FBCF4A4000
heap
page read and write
2055E620000
trusted library allocation
page read and write
1FBCDD00000
trusted library allocation
page read and write
1C448302000
heap
page read and write
1009FC000
stack
page read and write
C5941DE000
stack
page read and write
1FBCE010000
heap
page read and write
18885800000
heap
page read and write
20BF0642000
heap
page read and write
1FBCF44E000
heap
page read and write
20BF0669000
heap
page read and write
1001FE000
stack
page read and write
1987FA13000
heap
page read and write
1C4479F0000
trusted library section
page read and write
172BCFE000
stack
page read and write
1FBCF54F000
heap
page read and write
1FBCF253000
heap
page read and write
1FBCF3BE000
heap
page read and write
1FBCF238000
heap
page read and write
1C4478E0000
heap
page read and write
1C447AFC000
heap
page read and write
28512170000
heap
page read and write
1FBCF329000
heap
page read and write
27BFA469000
heap
page read and write
2C660000000
heap
page read and write
100CFF000
stack
page read and write
7C4BF7E000
stack
page read and write
1FBCF372000
heap
page read and write
19CFEA4B000
heap
page read and write
285123B0000
heap
page read and write
1FBCDBA0000
trusted library allocation
page read and write
19CFEA70000
heap
page read and write
2055E610000
trusted library allocation
page read and write
1FBCF304000
heap
page read and write
1FBCF5CF000
heap
page read and write
1FBCDD04000
trusted library allocation
page read and write
1FBCF3CD000
heap
page read and write
285122D3000
heap
page read and write
1FBCDBDE000
trusted library allocation
page read and write
1FBCF496000
heap
page read and write
1FBCDBAC000
trusted library allocation
page read and write
1FBCF396000
heap
page read and write
1FBCF584000
heap
page read and write
1C447A00000
heap
page read and write
1C447870000
heap
page read and write
2D22A8B5000
heap
page read and write
1FBCF302000
heap
page read and write
BD3EA7E000
stack
page read and write
1FBCF4B9000
heap
page read and write
23A19FE000
stack
page read and write
1C447A8A000
heap
page read and write
1FBCF4AE000
heap
page read and write
285123F0000
heap
page read and write
1FBC8313000
heap
page read and write
1C44CE20000
trusted library allocation
page read and write
1FBCF459000
heap
page read and write
1FBCF408000
heap
page read and write
1FBCF32F000
heap
page read and write
1C44CF4E000
trusted library allocation
page read and write
172C07E000
stack
page read and write
285122C1000
heap
page read and write
2C660108000
heap
page read and write
285122D7000
heap
page read and write
1FBCF4E0000
heap
page read and write
1F261210000
heap
page read and write
1FBCDD0C000
trusted library allocation
page read and write
2D22A8E2000
heap
page read and write
20BF067A000
heap
page read and write
1FBC8BC7000
heap
page read and write
1FBCF55E000
heap
page read and write
1C447A91000
heap
page read and write
1FBCF420000
heap
page read and write
2C65FE90000
heap
page read and write
20BF05E0000
trusted library allocation
page read and write
1FBCDBAC000
trusted library allocation
page read and write
1C448202000
heap
page read and write
1FBC8BE1000
heap
page read and write
23A15FE000
stack
page read and write
BBBC8FE000
stack
page read and write
79F298B000
stack
page read and write
2D22A8AB000
heap
page read and write
19146443000
heap
page read and write
1FBCF438000
heap
page read and write
1FBCF506000
heap
page read and write
1F261489000
heap
page read and write
2C660802000
trusted library allocation
page read and write
1FBCF5CA000
heap
page read and write
18885900000
heap
page read and write
172BDFB000
stack
page read and write
1FBC8C23000
heap
page read and write
1FBCF348000
heap
page read and write
19146400000
heap
page read and write
1C44CF40000
trusted library allocation
page read and write
1FBCF577000
heap
page read and write
2055D730000
heap
page read and write
1FBC8DC9000
heap
page read and write
1FBC8D93000
heap
page read and write
1FBCF318000
heap
page read and write
1FBCF554000
heap
page read and write
BD3E67E000
stack
page read and write
27BFA413000
heap
page read and write
1FBCDB8C000
trusted library allocation
page read and write
1FBCF3FE000
heap
page read and write
2D22A916000
heap
page read and write
1FBCF5CA000
heap
page read and write
10077C000
stack
page read and write
1FBCF23F000
heap
page read and write
172BEFB000
stack
page read and write
1987F860000
heap
page read and write
1FBCF5E8000
heap
page read and write
1FBCDBF5000
trusted library allocation
page read and write
E769EF7000
stack
page read and write
BD3E38B000
stack
page read and write
E76A1FE000
stack
page read and write
1C44D0F5000
heap
page read and write
2D22A847000
heap
page read and write
1FBCF3C3000
heap
page read and write
1FBC8BC9000
heap
page read and write
1FBCF454000
heap
page read and write
20BF0661000
heap
page read and write
61571FE000
stack
page read and write
1FBCDBA6000
trusted library allocation
page read and write
1FBC81B0000
trusted library allocation
page read and write
1FBC8C02000
heap
page read and write
F604177000
stack
page read and write
18885600000
heap
page read and write
1FBCF4BB000
heap
page read and write
1FBCF549000
heap
page read and write
1FBCDBA8000
trusted library allocation
page read and write
20BF062D000
heap
page read and write
1FBCF5EC000
heap
page read and write
2D22A84D000
heap
page read and write
1888584E000
heap
page read and write
2D22A913000
heap
page read and write
1BAC2613000
heap
page read and write
1FBCF3FF000
heap
page read and write
1FBCF44C000
heap
page read and write
1FBCF332000
heap
page read and write
1FBCF4B9000
heap
page read and write
2D22A640000
heap
page read and write
1C44D260000
trusted library allocation
page read and write
E769B7E000
stack
page read and write
1FBCF572000
heap
page read and write
1FBC99A1000
trusted library allocation
page read and write
1FBCDBDA000
trusted library allocation
page read and write
2C660113000
heap
page read and write
1C44D03C000
heap
page read and write
1FBCDBAE000
trusted library allocation
page read and write
There are 1131 hidden memdumps, click here to show them.