IOC Report
suddenlink.doc.08.11.22.doc

loading gif

Files

File Path
Type
Category
Malicious
suddenlink.doc.08.11.22.doc
Zip archive data, at least v2.0 to extract
initial sample
malicious
C:\Users\user\AppData\Local\Temp\~DF6DC93E30EE93E294.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\suddenlink.doc.08.11.22.doc.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:43 2022, mtime=Fri Aug 12 03:42:30 2022, atime=Fri Aug 12 03:42:24 2022, length=2221142, window=hide
dropped
malicious
C:\Users\user\AppData\Local\Temp\~DFAD7C0BB457B0CC55.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\9DABE267-8D28-4A46-920F-03320802FC01
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\67134B8C.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\F770E9F7.png
PNG image data, 380 x 526, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{6C1B6A7F-BA2D-469A-BB01-09A37C1CDA0A}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{F4F973F8-3D15-4697-9215-2E0CAB2CDA76}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\Desktop\~$ddenlink.doc.08.11.22.doc
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BBC84C8E.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D18A7737.png
PNG image data, 380 x 526, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{7D800B62-4169-49B4-82C2-03F10C50B5DB}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{55E0F33F-3C33-4FD8-B916-02BB3F3865BE}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E11EF5ED-C44F-4253-A2FB-74DC7A3642DF}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\suddenlink.doc.08.11.22.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:53 2022, mtime=Tue Mar 8 15:45:53 2022, atime=Fri Aug 12 03:37:11 2022, length=2221142, window=hide
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding

URLs

Name
IP
Malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://my.microsoftpersonalcontent.com
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
https://api.powerbi.com/beta/myorg/imports
unknown
https://devnull.onenote.com
unknown
https://messaging.action.office.com/
unknown
https://ncus.pagecontentsync.
unknown
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
unknown
https://messaging.office.com/
unknown
https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.8.146.139
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
+r-
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
,r-
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
9u-
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
o{-
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\1C5FB
1C5FB
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2A7A1
2A7A1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2A7A1
2A7A1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
c82
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
l92
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
.<2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\65B2A
65B2A
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\787A6
787A6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\787A6
787A6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 407 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12877D5D000
heap
page read and write
98727C000
stack
page read and write
2A5ECA70000
trusted library allocation
page read and write
128723F0000
trusted library allocation
page read and write
1FDD4F13000
heap
page read and write
12871BB0000
heap
page read and write
12877EB4000
heap
page read and write
12877D7C000
heap
page read and write
12877D9D000
heap
page read and write
12877660000
trusted library allocation
page read and write
12877E85000
heap
page read and write
9BB007E000
stack
page read and write
128727D7000
heap
page read and write
12877680000
trusted library allocation
page read and write
12877DFF000
heap
page read and write
12877DA6000
heap
page read and write
12877C2F000
heap
page read and write
12877ED5000
heap
page read and write
128777B0000
trusted library allocation
page read and write
12877DDB000
heap
page read and write
1F0181D0000
trusted library allocation
page read and write
12877C61000
heap
page read and write
12877E87000
heap
page read and write
12877EF1000
heap
page read and write
12877E5D000
heap
page read and write
12871FC2000
heap
page read and write
1287767C000
trusted library allocation
page read and write
C9527B000
stack
page read and write
1F018A02000
trusted library allocation
page read and write
16B74930000
remote allocation
page read and write
12877EDC000
heap
page read and write
12872529000
heap
page read and write
1287765C000
trusted library allocation
page read and write
12877E6D000
heap
page read and write
12877C34000
heap
page read and write
AB2CFA000
stack
page read and write
1FDD4C90000
heap
page read and write
12877F57000
heap
page read and write
12872743000
heap
page read and write
12877DAA000
heap
page read and write
12877676000
trusted library allocation
page read and write
12877E82000
heap
page read and write
1269AFB000
stack
page read and write
21160EE7000
heap
page read and write
1A9FF256000
heap
page read and write
12877DD5000
heap
page read and write
12877D29000
heap
page read and write
16B747D8000
trusted library allocation
page read and write
12877ED1000
heap
page read and write
14785E02000
heap
page read and write
C9507E000
stack
page read and write
1F01827E000
heap
page read and write
12878010000
heap
page read and write
128725DE000
heap
page read and write
9BAFD0B000
stack
page read and write
1FDD4F00000
heap
page read and write
12877ED1000
heap
page read and write
1E837708000
heap
page read and write
128727E9000
heap
page read and write
12871E5A000
heap
page read and write
12877E1E000
heap
page read and write
12871E74000
heap
page read and write
1A9FFA02000
trusted library allocation
page read and write
12877F32000
heap
page read and write
663AFF000
stack
page read and write
12877DA6000
heap
page read and write
1D1500A2000
heap
page read and write
16B6F275000
heap
page read and write
12877C34000
heap
page read and write
12873471000
trusted library allocation
page read and write
128727FC000
heap
page read and write
128727FC000
heap
page read and write
14785F8C000
heap
page read and write
12877EB2000
heap
page read and write
2A5EC443000
heap
page read and write
16B74A84000
heap
page read and write
128727E8000
heap
page read and write
671CECC000
stack
page read and write
289C7E6B000
heap
page read and write
12877F9E000
heap
page read and write
12877D3A000
heap
page read and write
12877EC6000
heap
page read and write
12877C53000
heap
page read and write
289C7E6F000
heap
page read and write
663B7E000
stack
page read and write
1E837613000
heap
page read and write
12872602000
heap
page read and write
14785F6F000
heap
page read and write
1287766C000
trusted library allocation
page read and write
289C7E41000
heap
page read and write
12877EE3000
heap
page read and write
187AE3E0000
unkown
page readonly
12877F9B000
heap
page read and write
12877D8D000
heap
page read and write
12877FA3000
heap
page read and write
1A9FF279000
heap
page read and write
12877D95000
heap
page read and write
1287765C000
trusted library allocation
page read and write
21160E13000
heap
page read and write
202C843E000
heap
page read and write
12877C26000
heap
page read and write
12873440000
trusted library section
page readonly
6EA1D7D000
stack
page read and write
1F018263000
heap
page read and write
128723F0000
trusted library allocation
page read and write
12877C13000
heap
page read and write
14785600000
heap
page read and write
998D17C000
stack
page read and write
21160ECD000
heap
page read and write
128727D7000
heap
page read and write
12877DD9000
heap
page read and write
12877C2D000
heap
page read and write
1F018257000
heap
page read and write
16B6F200000
heap
page read and write
12877F95000
heap
page read and write
12877F57000
heap
page read and write
12877F82000
heap
page read and write
AB327E000
stack
page read and write
21161480000
trusted library allocation
page read and write
1630F502000
heap
page read and write
1F018200000
heap
page read and write
12877E1C000
heap
page read and write
202C8230000
heap
page read and write
12877D4E000
heap
page read and write
12877DA1000
heap
page read and write
187ADCA9000
heap
page read and write
12873450000
trusted library section
page readonly
1F018284000
heap
page read and write
128730F0000
trusted library allocation
page read and write
12877D04000
heap
page read and write
1269F7E000
stack
page read and write
147856E2000
heap
page read and write
128778B0000
trusted library allocation
page read and write
1D1500B5000
heap
page read and write
12877DF2000
heap
page read and write
1287767E000
trusted library allocation
page read and write
16B74B00000
heap
page read and write
12877F57000
heap
page read and write
12877E5C000
heap
page read and write
12877D54000
heap
page read and write
1A9FF0D0000
heap
page read and write
998CEFE000
stack
page read and write
12877EDF000
heap
page read and write
12877C2F000
heap
page read and write
12877C69000
heap
page read and write
128727B6000
heap
page read and write
1E837629000
heap
page read and write
1E837667000
heap
page read and write
1FDD4E6A000
heap
page read and write
21160CB0000
heap
page read and write
21160F02000
heap
page read and write
12877D53000
heap
page read and write
14785647000
heap
page read and write
14785651000
heap
page read and write
12877F48000
heap
page read and write
12877DD2000
heap
page read and write
12871E3C000
heap
page read and write
16B6F241000
heap
page read and write
12877F17000
heap
page read and write
A9980BB000
stack
page read and write
12877F57000
heap
page read and write
6EA156C000
stack
page read and write
12877ED1000
heap
page read and write
128727CC000
heap
page read and write
12877C69000
heap
page read and write
12877F40000
heap
page read and write
128777B4000
trusted library allocation
page read and write
21160E89000
heap
page read and write
12877C2F000
heap
page read and write
12877C34000
heap
page read and write
12877FA0000
heap
page read and write
12877F1D000
heap
page read and write
A9986FE000
stack
page read and write
12877E71000
heap
page read and write
128727E7000
heap
page read and write
187ADB10000
heap
page read and write
1E837450000
heap
page read and write
12877C3C000
heap
page read and write
12877F35000
heap
page read and write
147854D0000
heap
page read and write
14785F98000
heap
page read and write
12877C62000
heap
page read and write
4D39877000
stack
page read and write
12877D31000
heap
page read and write
128725F3000
heap
page read and write
16B74A4A000
heap
page read and write
12877C56000
heap
page read and write
12872E41000
trusted library allocation
page read and write
16B6FB18000
heap
page read and write
12877F29000
heap
page read and write
EFEC07A000
stack
page read and write
12877F24000
heap
page read and write
128776D0000
trusted library allocation
page read and write
12877C2D000
heap
page read and write
1F018232000
heap
page read and write
12871E57000
heap
page read and write
147856EC000
heap
page read and write
12877C2D000
heap
page read and write
1630F370000
heap
page read and write
128725C8000
heap
page read and write
126A37F000
stack
page read and write
16E4C7F000
stack
page read and write
12877C3A000
heap
page read and write
12877ED1000
heap
page read and write
12877640000
trusted library allocation
page read and write
12871E13000
heap
page read and write
1FDD4E4B000
heap
page read and write
16B74800000
trusted library allocation
page read and write
12877DBA000
heap
page read and write
16B746B0000
trusted library allocation
page read and write
1E837600000
heap
page read and write
289C7E71000
heap
page read and write
16B748F0000
trusted library allocation
page read and write
1FDD4E6A000
heap
page read and write
12877D84000
heap
page read and write
12877660000
trusted library allocation
page read and write
1D14FFF0000
heap
page read and write
12877D74000
heap
page read and write
289C7E29000
heap
page read and write
16B74B06000
heap
page read and write
187AEA90000
unkown
page read and write
12877C37000
heap
page read and write
12877F4A000
heap
page read and write
12877D67000
heap
page read and write
12872750000
heap
page read and write
16B6F9D0000
trusted library section
page readonly
1630F47E000
heap
page read and write
12877C26000
heap
page read and write
12877C3F000
heap
page read and write
14785F96000
heap
page read and write
16B6F9B0000
trusted library section
page readonly
16B74A3F000
heap
page read and write
128727DB000
heap
page read and write
187ADC90000
unkown
page readonly
AB377A000
stack
page read and write
12877E5A000
heap
page read and write
1287766C000
trusted library allocation
page read and write
12877C3C000
heap
page read and write
147854C0000
heap
page read and write
AB397C000
stack
page read and write
128777B4000
trusted library allocation
page read and write
12877D89000
heap
page read and write
12877C2F000
heap
page read and write
126A47A000
stack
page read and write
B6D3B7F000
stack
page read and write
12877DB8000
heap
page read and write
1D1500A7000
heap
page read and write
12695EB000
stack
page read and write
12877C55000
heap
page read and write
12877D31000
heap
page read and write
12877DDF000
heap
page read and write
12877C69000
heap
page read and write
12877674000
trusted library allocation
page read and write
1F01826A000
heap
page read and write
12877C2F000
heap
page read and write
12877640000
trusted library allocation
page read and write
128774A0000
trusted library allocation
page read and write
12877F5E000
heap
page read and write
12877E35000
heap
page read and write
C9567B000
stack
page read and write
202C8429000
heap
page read and write
16B6FA02000
heap
page read and write
16B6F2B0000
heap
page read and write
128723F0000
trusted library allocation
page read and write
12877C4F000
heap
page read and write
1F0181A0000
heap
page read and write
128725D9000
heap
page read and write
12872658000
heap
page read and write
128727FC000
heap
page read and write
1E837602000
heap
page read and write
16B701E0000
trusted library allocation
page read and write
12877F98000
heap
page read and write
12877F1B000
heap
page read and write
12877DC3000
heap
page read and write
14785629000
heap
page read and write
12877F3C000
heap
page read and write
147856F4000
heap
page read and write
12877E86000
heap
page read and write
16B74910000
trusted library allocation
page read and write
12877C61000
heap
page read and write
12872400000
heap
page read and write
16B6F1A0000
trusted library allocation
page read and write
14785713000
heap
page read and write
187ADCF0000
unkown
page read and write
12877ED9000
heap
page read and write
12872DC0000
trusted library allocation
page read and write
12878010000
heap
page read and write
12877F51000
heap
page read and write
12877C61000
heap
page read and write
C94D0B000
stack
page read and write
12877ED1000
heap
page read and write
12877D80000
heap
page read and write
6EA1AFF000
stack
page read and write
EFEBC7C000
stack
page read and write
12877E5F000
heap
page read and write
12872415000
heap
page read and write
128727DB000
heap
page read and write
126A2FE000
stack
page read and write
12877C34000
heap
page read and write
12877C55000
heap
page read and write
14785530000
heap
page read and write
202C8290000
heap
page read and write
12877660000
trusted library allocation
page read and write
12877674000
trusted library allocation
page read and write
2A5EC452000
heap
page read and write
1F018262000
heap
page read and write
16E4A77000
stack
page read and write
147856DA000
heap
page read and write
128727D7000
heap
page read and write
1A9FF202000
heap
page read and write
187ADDA7000
heap
page read and write
12877F9D000
heap
page read and write
12877D31000
heap
page read and write
12877E22000
heap
page read and write
128777B0000
trusted library allocation
page read and write
12877D2F000
heap
page read and write
16B6F1B0000
trusted library section
page read and write
12877D72000
heap
page read and write
14786402000
heap
page read and write
12877C2D000
heap
page read and write
B6D447F000
stack
page read and write
128727DB000
heap
page read and write
1D150340000
heap
page read and write
EFEBF79000
stack
page read and write
16B74A2E000
heap
page read and write
12877FBA000
heap
page read and write
128727CA000
heap
page read and write
12877F27000
heap
page read and write
1A9FF268000
heap
page read and write
289C7E76000
heap
page read and write
16B74B04000
heap
page read and write
12877E33000
heap
page read and write
128727FC000
heap
page read and write
128727B4000
heap
page read and write
21161602000
heap
page read and write
12877E6A000
heap
page read and write
12877ED9000
heap
page read and write
12877D77000
heap
page read and write
12877C48000
heap
page read and write
1E837689000
heap
page read and write
12877ED9000
heap
page read and write
12877664000
trusted library allocation
page read and write
128779A0000
remote allocation
page read and write
128777BC000
trusted library allocation
page read and write
128727D0000
heap
page read and write
663E77000
stack
page read and write
128777A0000
trusted library allocation
page read and write
14785682000
heap
page read and write
1E837E02000
trusted library allocation
page read and write
12872623000
heap
page read and write
12877F86000
heap
page read and write
663F7E000
stack
page read and write
66407F000
stack
page read and write
1630F43C000
heap
page read and write
128727CB000
heap
page read and write
16B74920000
trusted library allocation
page read and write
12877D62000
heap
page read and write
12872790000
heap
page read and write
2A5EC502000
heap
page read and write
6EA1BFE000
stack
page read and write
12877F3E000
heap
page read and write
12877F36000
heap
page read and write
12877C4D000
heap
page read and write
12877ED1000
heap
page read and write
128777B0000
trusted library allocation
page read and write
16B75000000
heap
page read and write
12877C53000
heap
page read and write
2A5EC42E000
heap
page read and write
16B74A4C000
heap
page read and write
1A9FF200000
heap
page read and write
B6D437F000
stack
page read and write
12871E76000
heap
page read and write
9BB04FE000
stack
page read and write
12877C26000
heap
page read and write
16B747D0000
trusted library allocation
page read and write
12877C2D000
heap
page read and write
12872600000
heap
page read and write
12877E6B000
heap
page read and write
12872778000
heap
page read and write
128727D7000
heap
page read and write
12872594000
heap
page read and write
16B6F2FE000
heap
page read and write
289C7E02000
heap
page read and write
2A5EC402000
heap
page read and write
128723F0000
trusted library allocation
page read and write
14785560000
trusted library allocation
page read and write
16B6FB13000
heap
page read and write
16B747F4000
trusted library allocation
page read and write
128727DB000
heap
page read and write
2A5EC449000
heap
page read and write
12877EBF000
heap
page read and write
AB347E000
stack
page read and write
1630F451000
heap
page read and write
A9985FC000
stack
page read and write
12871BA0000
heap
page read and write
1D1500CE000
heap
page read and write
126A27F000
stack
page read and write
1F018242000
heap
page read and write
AB2FFE000
stack
page read and write
187ADCA5000
heap
page read and write
14785F4E000
heap
page read and write
12877E8C000
heap
page read and write
128727CB000
heap
page read and write
128727DB000
heap
page read and write
12877DB8000
heap
page read and write
1A9FF302000
heap
page read and write
B6D3A7A000
stack
page read and write
12873430000
trusted library section
page readonly
16E46FF000
stack
page read and write
14785613000
heap
page read and write
1630F439000
heap
page read and write
12877682000
trusted library allocation
page read and write
16E477F000
stack
page read and write
12877C61000
heap
page read and write
12877D9D000
heap
page read and write
AB357E000
stack
page read and write
998CF7E000
stack
page read and write
187ADCA0000
heap
page read and write
128727C9000
heap
page read and write
14785F98000
heap
page read and write
1287766E000
trusted library allocation
page read and write
14785F80000
heap
page read and write
187AEAB0000
unkown
page read and write
12877E24000
heap
page read and write
202C83C0000
remote allocation
page read and write
12877D61000
heap
page read and write
128777B4000
trusted library allocation
page read and write
1FDD4E00000
heap
page read and write
12872780000
heap
page read and write
1630F413000
heap
page read and write
12877DE9000
heap
page read and write
14785F98000
heap
page read and write
12877C34000
heap
page read and write
1F018213000
heap
page read and write
289C7F13000
heap
page read and write
12877E2C000
heap
page read and write
12877C26000
heap
page read and write
14785F13000
heap
page read and write
14785708000
heap
page read and write
1287274B000
heap
page read and write
12877EEE000
heap
page read and write
12877C5C000
heap
page read and write
1269DFB000
stack
page read and write
14785F98000
heap
page read and write
128723E0000
trusted library allocation
page read and write
128730D8000
trusted library allocation
page read and write
12877DAA000
heap
page read and write
187AEA50000
unkown
page read and write
1F018260000
heap
page read and write
9BB03FE000
stack
page read and write
12871F13000
heap
page read and write
1FDD4DF0000
trusted library allocation
page read and write
128734A0000
trusted library allocation
page read and write
12877D7B000
heap
page read and write
14785670000
heap
page read and write
12877ED1000
heap
page read and write
12877F15000
heap
page read and write
128727A9000
heap
page read and write
1FDD4F08000
heap
page read and write
B6D387C000
stack
page read and write
12877D5F000
heap
page read and write
1F018256000
heap
page read and write
12877E2E000
heap
page read and write
1287767A000
trusted library allocation
page read and write
9BB02FE000
stack
page read and write
16E4B7F000
stack
page read and write
12877F2B000
heap
page read and write
1FDD4E3C000
heap
page read and write
14785F60000
heap
page read and write
14785F3E000
heap
page read and write
16B74930000
trusted library allocation
page read and write
12877D8B000
heap
page read and write
12877E1B000
heap
page read and write
12877672000
trusted library allocation
page read and write
128777BC000
trusted library allocation
page read and write
1FDD5602000
trusted library allocation
page read and write
4D3997F000
stack
page read and write
998D0FE000
stack
page read and write
12877D63000
heap
page read and write
128727D7000
heap
page read and write
12877EF9000
heap
page read and write
12872554000
heap
page read and write
12877F8C000
heap
page read and write
128723F0000
trusted library allocation
page read and write
12877D36000
heap
page read and write
12871F8E000
heap
page read and write
128727DB000
heap
page read and write
1E8373F0000
heap
page read and write
12877E7F000
heap
page read and write
147856C7000
heap
page read and write
16B74630000
trusted library allocation
page read and write
12877C2C000
heap
page read and write
16B747DE000
trusted library allocation
page read and write
12877DFA000
heap
page read and write
21160D20000
heap
page read and write
12877F7B000
heap
page read and write
12871E00000
heap
page read and write
1FDD4E70000
heap
page read and write
1FDD4E4E000
heap
page read and write
12877F53000
heap
page read and write
12877E22000
heap
page read and write
12877D91000
heap
page read and write
1F018267000
heap
page read and write
12877E5A000
heap
page read and write
128776AE000
trusted library allocation
page read and write
12877DE9000
heap
page read and write
12877FB9000
heap
page read and write
12877D04000
heap
page read and write
14785653000
heap
page read and write
1F018229000
heap
page read and write
6EA20FC000
stack
page read and write
12877642000
trusted library allocation
page read and write
AB31FF000
stack
page read and write
1E83767E000
heap
page read and write
14785D50000
remote allocation
page read and write
12877C34000
heap
page read and write
12877E2F000
heap
page read and write
12877D59000
heap
page read and write
1FDD4E4F000
heap
page read and write
14785F98000
heap
page read and write
12877DBC000
heap
page read and write
C9577F000
unkown
page read and write
1F01825F000
heap
page read and write
14785D50000
remote allocation
page read and write
6EA21FF000
stack
page read and write
12877680000
trusted library allocation
page read and write
12877C34000
heap
page read and write
12877F57000
heap
page read and write
16B74930000
remote allocation
page read and write
12877EB7000
heap
page read and write
12872524000
heap
page read and write
1E837550000
trusted library allocation
page read and write
289C7D20000
heap
page read and write
12877F87000
heap
page read and write
12877DD5000
heap
page read and write
6EA1C7C000
stack
page read and write
12877D25000
heap
page read and write
A99887E000
stack
page read and write
12877E7C000
heap
page read and write
12877DE9000
heap
page read and write
14785D50000
remote allocation
page read and write
12877E7A000
heap
page read and write
21160EBC000
heap
page read and write
12877530000
trusted library allocation
page read and write
12877D8F000
heap
page read and write
128779B0000
trusted library allocation
page read and write
671D37E000
unkown
page read and write
9BB01FE000
stack
page read and write
147856B6000
heap
page read and write
12877ED1000
heap
page read and write
1287251D000
heap
page read and write
14785654000
heap
page read and write
12877DCE000
heap
page read and write
12877C38000
heap
page read and write
202C8390000
trusted library allocation
page read and write
187ADE40000
unkown
page read and write
12877E74000
heap
page read and write
12877C5B000
heap
page read and write
187AE840000
unkown
page read and write
1A9FF130000
heap
page read and write
16B6F9C0000
trusted library section
page readonly
16E497B000
stack
page read and write
12877D63000
heap
page read and write
187ADD10000
unkown
page read and write
12877D82000
heap
page read and write
12877C2F000
heap
page read and write
128777B0000
trusted library allocation
page read and write
12877682000
trusted library allocation
page read and write
187ADD00000
unkown
page read and write
16B74AA0000
heap
page read and write
14785F86000
heap
page read and write
1287766E000
trusted library allocation
page read and write
12877D41000
heap
page read and write
128727DB000
heap
page read and write
12877D00000
heap
page read and write
128777B0000
trusted library allocation
page read and write
21160F13000
heap
page read and write
998CB8A000
stack
page read and write
128777BC000
trusted library allocation
page read and write
1FDD4E88000
heap
page read and write
1478564E000
heap
page read and write
16B6F29D000
heap
page read and write
12872500000
heap
page read and write
12877C2F000
heap
page read and write
14786400000
heap
page read and write
9878FF000
stack
page read and write
289C7D80000
heap
page read and write
12871E68000
heap
page read and write
187AEA70000
unkown
page readonly
12877E8E000
heap
page read and write
187AE7F2000
unkown
page read and write
12877F7F000
heap
page read and write
12877D7F000
heap
page read and write
16B6FB02000
heap
page read and write
128778C0000
trusted library allocation
page read and write
EFEC17E000
stack
page read and write
16B74810000
trusted library allocation
page read and write
12877C26000
heap
page read and write
12877F7C000
heap
page read and write
202C8400000
heap
page read and write
12873490000
trusted library allocation
page read and write
12873410000
trusted library section
page readonly
16B74814000
trusted library allocation
page read and write
B6D417F000
stack
page read and write
16B6F292000
heap
page read and write
16B6F313000
heap
page read and write
202C8C02000
trusted library allocation
page read and write
16B6F257000
heap
page read and write
1E837713000
heap
page read and write
12877ED9000
heap
page read and write
14785F80000
heap
page read and write
128727E7000
heap
page read and write
671CFCF000
unkown
page read and write
A99857E000
stack
page read and write
1E837663000
heap
page read and write
12877676000
trusted library allocation
page read and write
12877E49000
heap
page read and write
4D3957F000
stack
page read and write
1D15009B000
heap
page read and write
12877F80000
heap
page read and write
12877D5A000
heap
page read and write
AB2EFE000
stack
page read and write
12877D35000
heap
page read and write
12877641000
trusted library allocation
page read and write
16B74930000
remote allocation
page read and write
2A5EC446000
heap
page read and write
187ADD30000
unkown
page read and write
1287252C000
heap
page read and write
128727D7000
heap
page read and write
12877C26000
heap
page read and write
12877C69000
heap
page read and write
128725AE000
heap
page read and write
12877840000
trusted library allocation
page read and write
12871E83000
heap
page read and write
1A9FF313000
heap
page read and write
12877D31000
heap
page read and write
187ADC50000
unkown
page read and write
128777C0000
trusted library allocation
page read and write
1287260A000
heap
page read and write
16B6F9E0000
trusted library section
page readonly
16B74800000
trusted library allocation
page read and write
16B6F229000
heap
page read and write
128727CA000
heap
page read and write
128778E0000
trusted library allocation
page read and write
12877C50000
heap
page read and write
128725C4000
heap
page read and write
12877FBD000
heap
page read and write
128727E5000
heap
page read and write
1630FC02000
trusted library allocation
page read and write
6EA1EFC000
stack
page read and write
12877F8A000
heap
page read and write
12877C39000
heap
page read and write
14785F7D000
heap
page read and write
128774B0000
trusted library allocation
page read and write
289C7E13000
heap
page read and write
12877F44000
heap
page read and write
4D3947C000
stack
page read and write
12877665000
trusted library allocation
page read and write
128727E5000
heap
page read and write
1287766C000
trusted library allocation
page read and write
12877665000
trusted library allocation
page read and write
6EA1FFE000
stack
page read and write
12877C62000
heap
page read and write
1D1500CD000
heap
page read and write
12873330000
trusted library allocation
page read and write
12877D25000
heap
page read and write
16B74AFB000
heap
page read and write
16B74B04000
heap
page read and write
1FDD4C80000
heap
page read and write
12871DE0000
trusted library allocation
page read and write
289C7E00000
heap
page read and write
12877ED1000
heap
page read and write
12877668000
trusted library allocation
page read and write
12877E4B000
heap
page read and write
1269FFE000
stack
page read and write
AB24CB000
stack
page read and write
202C83C0000
remote allocation
page read and write
12877D7D000
heap
page read and write
128777B4000
trusted library allocation
page read and write
16B74AEF000
heap
page read and write
128725CB000
heap
page read and write
12877C26000
heap
page read and write
C95377000
stack
page read and write
16B746C0000
trusted library allocation
page read and write
202C83C0000
remote allocation
page read and write
12871FEB000
heap
page read and write
21161732000
heap
page read and write
128727CB000
heap
page read and write
16B74B09000
heap
page read and write
16B6F27A000
heap
page read and write
16B74AFD000
heap
page read and write
12877ED1000
heap
page read and write
289C7E63000
heap
page read and write
12877E45000
heap
page read and write
12877F4D000
heap
page read and write
16E467B000
stack
page read and write
1F018252000
heap
page read and write
12877F56000
heap
page read and write
1D150070000
heap
page read and write
12877F79000
heap
page read and write
12877D39000
heap
page read and write
12877C69000
heap
page read and write
AB2A7F000
stack
page read and write
1630F300000
heap
page read and write
128776F0000
trusted library allocation
page read and write
1630F513000
heap
page read and write
12877F77000
heap
page read and write
1630F500000
heap
page read and write
14785F84000
heap
page read and write
1630F3A0000
trusted library allocation
page read and write
12877F25000
heap
page read and write
12877ECD000
heap
page read and write
187ADD40000
heap
page read and write
12877D85000
heap
page read and write
1FDD4E13000
heap
page read and write
12877DAC000
heap
page read and write
12877ED1000
heap
page read and write
128725CD000
heap
page read and write
12877D72000
heap
page read and write
1FDD4F02000
heap
page read and write
AB254E000
stack
page read and write
12877C10000
heap
page read and write
14785649000
heap
page read and write
16B6FA00000
heap
page read and write
AB28FA000
stack
page read and write
12877ED7000
heap
page read and write
9877FB000
stack
page read and write
1630F508000
heap
page read and write
AB2B7B000
stack
page read and write
1D1500B6000
heap
page read and write
12877C69000
heap
page read and write
12877C26000
heap
page read and write
128727E7000
heap
page read and write
14785F90000
heap
page read and write
1FDD4E51000
heap
page read and write
128777B4000
trusted library allocation
page read and write
12877F92000
heap
page read and write
128777BC000
trusted library allocation
page read and write
202C8413000
heap
page read and write
21160E45000
heap
page read and write
1F018277000
heap
page read and write
12877D6A000
heap
page read and write
12877EB5000
heap
page read and write
128725B0000
heap
page read and write
12877D31000
heap
page read and write
1287261B000
heap
page read and write
14786444000
heap
page read and write
1630F400000
heap
page read and write
1630F455000
heap
page read and write
128727FC000
heap
page read and write
1F018258000
heap
page read and write
16B6F170000
heap
page read and write
998CE7E000
stack
page read and write
12877F8E000
heap
page read and write
12877F00000
heap
page read and write
14785702000
heap
page read and write
12877F63000
heap
page read and write
12877EEA000
heap
page read and write
671D279000
unkown
page read and write
128727DB000
heap
page read and write
12877E3A000
heap
page read and write
1FDD4E29000
heap
page read and write
2A5EC310000
heap
page read and write
187ADDAE000
heap
page read and write
128727D0000
heap
page read and write
12877D6E000
heap
page read and write
12877EDA000
heap
page read and write
12877E41000
heap
page read and write
16B747D0000
trusted library allocation
page read and write
12877EBA000
heap
page read and write
12877DA8000
heap
page read and write
12877DBA000
heap
page read and write
12877640000
trusted library allocation
page read and write
12877C02000
heap
page read and write
1D1500D3000
heap
page read and write
14785F84000
heap
page read and write
12872752000
heap
page read and write
128727D7000
heap
page read and write
663A7B000
stack
page read and write
1630F429000
heap
page read and write
128723F0000
trusted library allocation
page read and write
128727C5000
heap
page read and write
1A9FF23D000
heap
page read and write
1287274F000
heap
page read and write
1478564A000
heap
page read and write
16B6F9F0000
trusted library section
page readonly
6EA1DFB000
stack
page read and write
128776EC000
trusted library allocation
page read and write
128779A0000
remote allocation
page read and write
128776AA000
trusted library allocation
page read and write
187ADD8C000
heap
page read and write
128725F0000
heap
page read and write
12877660000
trusted library allocation
page read and write
12877EAC000
heap
page read and write
16B6F28C000
heap
page read and write
1A9FF280000
heap
page read and write
12877ED3000
heap
page read and write
1F018249000
heap
page read and write
12877F6C000
heap
page read and write
1A9FF160000
trusted library allocation
page read and write
12877C69000
heap
page read and write
16B74A17000
heap
page read and write
1287265A000
heap
page read and write
12877E93000
heap
page read and write
AB2F7F000
stack
page read and write
1478564D000
heap
page read and write
4D394FF000
stack
page read and write
12877672000
trusted library allocation
page read and write
12877668000
trusted library allocation
page read and write
16B74A57000
heap
page read and write
12877C26000
heap
page read and write
128777B0000
trusted library allocation
page read and write
128727FD000
heap
page read and write
AB30FA000
stack
page read and write
12877E37000
heap
page read and write
12877C69000
heap
page read and write
128727FF000
heap
page read and write
12877D47000
heap
page read and write
16B6FB00000
heap
page read and write
12877790000
trusted library allocation
page read and write
12877C62000
heap
page read and write
16B6F278000
heap
page read and write
187ADC70000
unkown
page read and write
12877F84000
heap
page read and write
12877670000
trusted library allocation
page read and write
12872770000
heap
page read and write
12877DD7000
heap
page read and write
1F01825A000
heap
page read and write
12877EAE000
heap
page read and write
12877D6F000
heap
page read and write
12877ECA000
heap
page read and write
12872524000
heap
page read and write
12877F1F000
heap
page read and write
16B74A64000
heap
page read and write
12877FCA000
heap
page read and write
12877D26000
heap
page read and write
12877D93000
heap
page read and write
187AE7F0000
unkown
page read and write
1E83764C000
heap
page read and write
12877DD0000
heap
page read and write
12877D43000
heap
page read and write
12877EE5000
heap
page read and write
1F01823C000
heap
page read and write
12877D5A000
heap
page read and write
1287767A000
trusted library allocation
page read and write
14785716000
heap
page read and write
12877C5F000
heap
page read and write
21160E2A000
heap
page read and write
1FDD4E48000
heap
page read and write
187AEA80000
unkown
page read and write
12877D9F000
heap
page read and write
1F01826B000
heap
page read and write
128779A0000
remote allocation
page read and write
1F018240000
heap
page read and write
16B6F325000
heap
page read and write
12877D52000
heap
page read and write
1630F458000
heap
page read and write
1A9FF229000
heap
page read and write
12877DBC000
heap
page read and write
14785688000
heap
page read and write
14786402000
heap
page read and write
1630F489000
heap
page read and write
12877D31000
heap
page read and write
16B748E0000
trusted library allocation
page read and write
12877820000
trusted library allocation
page read and write
12877C61000
heap
page read and write
289C7D10000
heap
page read and write
12877E5C000
heap
page read and write
128777F0000
trusted library allocation
page read and write
21160EC4000
heap
page read and write
1FDD4E7A000
heap
page read and write
128727CB000
heap
page read and write
16B70630000
trusted library allocation
page read and write
1FDD4E4C000
heap
page read and write
12877DC9000
heap
page read and write
128727CA000
heap
page read and write
1F018302000
heap
page read and write
14785F00000
heap
page read and write
4D3967C000
stack
page read and write
12877C3D000
heap
page read and write
12873460000
trusted library section
page readonly
12877670000
trusted library allocation
page read and write
12877F3A000
heap
page read and write
1F018265000
heap
page read and write
12877ED9000
heap
page read and write
187AE7F6000
unkown
page read and write
12877D41000
heap
page read and write
12871E92000
heap
page read and write
12877E43000
heap
page read and write
12699F8000
stack
page read and write
1D150090000
heap
page read and write
187AEAE0000
unkown
page read and write
12877F2D000
heap
page read and write
1287767E000
trusted library allocation
page read and write
1D1500BF000
heap
page read and write
147856AC000
heap
page read and write
128727CB000
heap
page read and write
998D078000
stack
page read and write
202C8220000
heap
page read and write
16B74900000
trusted library allocation
page read and write
12877EF3000
heap
page read and write
12877ED9000
heap
page read and write
2A5EC400000
heap
page read and write
12877D42000
heap
page read and write
202C8459000
heap
page read and write
1E837702000
heap
page read and write
14785F89000
heap
page read and write
12872390000
trusted library allocation
page read and write
1287256D000
heap
page read and write
12877F63000
heap
page read and write
128727CB000
heap
page read and write
12871E87000
heap
page read and write
B6D407F000
stack
page read and write
128727D7000
heap
page read and write
1F01826D000
heap
page read and write
12872529000
heap
page read and write
AB3675000
stack
page read and write
12877C34000
heap
page read and write
1E837651000
heap
page read and write
128776AE000
trusted library allocation
page read and write
128727CA000
heap
page read and write
12877678000
trusted library allocation
page read and write
289C7DB0000
trusted library allocation
page read and write
12877D99000
heap
page read and write
12877880000
trusted library allocation
page read and write
16B6FB18000
heap
page read and write
16B74AFD000
heap
page read and write
1FDD4CF0000
heap
page read and write
12877F90000
heap
page read and write
2A5EC2C0000
heap
page read and write
1287251D000
heap
page read and write
1F018130000
heap
page read and write
12877EBB000
heap
page read and write
1A9FF300000
heap
page read and write
16B70623000
trusted library allocation
page read and write
1E837700000
heap
page read and write
12877F30000
heap
page read and write
12877ED9000
heap
page read and write
14785F11000
heap
page read and write
12877F57000
heap
page read and write
12877D52000
heap
page read and write
12877EEC000
heap
page read and write
12877DE9000
heap
page read and write
C95478000
stack
page read and write
12877D51000
heap
page read and write
128727D7000
heap
page read and write
128727D7000
heap
page read and write
289C7E3D000
heap
page read and write
12877DCC000
heap
page read and write
12877EC2000
heap
page read and write
289C7E5B000
heap
page read and write
187AE050000
unkown
page readonly
12877F5E000
heap
page read and write
128723F0000
trusted library allocation
page read and write
289C7E61000
heap
page read and write
16B74AF5000
heap
page read and write
12877D9E000
heap
page read and write
12873420000
trusted library section
page readonly
AB337D000
stack
page read and write
1FDD4E49000
heap
page read and write
128777B0000
trusted library allocation
page read and write
12877EAF000
heap
page read and write
202C8502000
heap
page read and write
12877D7D000
heap
page read and write
12871E29000
heap
page read and write
12877E80000
heap
page read and write
1FDD4E4A000
heap
page read and write
12877800000
trusted library allocation
page read and write
12871E65000
heap
page read and write
128727E5000
heap
page read and write
12877A80000
trusted library allocation
page read and write
1269CFE000
stack
page read and write
1D150345000
heap
page read and write
AB2BF9000
stack
page read and write
128777B0000
trusted library allocation
page read and write
1E8373E0000
heap
page read and write
12877D87000
heap
page read and write
12877D52000
heap
page read and write
1D1500B4000
heap
page read and write
12877EDE000
heap
page read and write
1D150050000
heap
page read and write
21161700000
heap
page read and write
14785648000
heap
page read and write
12877D64000
heap
page read and write
187ADD46000
heap
page read and write
12877670000
trusted library allocation
page read and write
12877C2F000
heap
page read and write
1F01827A000
heap
page read and write
1A9FF0C0000
heap
page read and write
12877D05000
heap
page read and write
14785656000
heap
page read and write
12872502000
heap
page read and write
1E83763C000
heap
page read and write
12877DC7000
heap
page read and write
1D1500A7000
heap
page read and write
12877810000
trusted library allocation
page read and write
12871E52000
heap
page read and write
12877DA9000
heap
page read and write
289C8602000
trusted library allocation
page read and write
16B74AA2000
heap
page read and write
16B747F1000
trusted library allocation
page read and write
12877C43000
heap
page read and write
C94D8E000
stack
page read and write
12877DC5000
heap
page read and write
12877ED1000
heap
page read and write
128727FC000
heap
page read and write
14785F8A000
heap
page read and write
12877E27000
heap
page read and write
1630F44E000
heap
page read and write
12877E32000
heap
page read and write
147856C0000
heap
page read and write
16B74A00000
heap
page read and write
B6D3C7D000
stack
page read and write
12877C2D000
heap
page read and write
12877F93000
heap
page read and write
16B6FD01000
trusted library allocation
page read and write
16B74640000
trusted library allocation
page read and write
1478564B000
heap
page read and write
16B74B06000
heap
page read and write
128779B3000
trusted library allocation
page read and write
1D1500BF000
heap
page read and write
128727DB000
heap
page read and write
16B747F0000
trusted library allocation
page read and write
2A5ECC02000
trusted library allocation
page read and write
128727CB000
heap
page read and write
12877E9D000
heap
page read and write
128727E7000
heap
page read and write
12877C58000
heap
page read and write
187AE7FA000
unkown
page read and write
2A5EC429000
heap
page read and write
12877C2D000
heap
page read and write
12877F46000
heap
page read and write
16B70620000
trusted library allocation
page read and write
16B6F9A0000
trusted library section
page readonly
12877840000
trusted library allocation
page read and write
C956FF000
stack
page read and write
1630F310000
heap
page read and write
12877E28000
heap
page read and write
14785FD9000
heap
page read and write
12871E8E000
heap
page read and write
128776C5000
trusted library allocation
page read and write
16B6F110000
heap
page read and write
1F01825C000
heap
page read and write
16B74B06000
heap
page read and write
1269BFB000
stack
page read and write
12877ECF000
heap
page read and write
A99847F000
stack
page read and write
14785F98000
heap
page read and write
12877EE2000
heap
page read and write
12877F21000
heap
page read and write
187AE846000
unkown
page read and write
21160E71000
heap
page read and write
1D1500D5000
heap
page read and write
12877E6D000
heap
page read and write
1269EFF000
stack
page read and write
1630F453000
heap
page read and write
2A5EC2B0000
heap
page read and write
12877DDD000
heap
page read and write
B6D3F7D000
stack
page read and write
128730D0000
trusted library allocation
page read and write
4D3977B000
stack
page read and write
128727E7000
heap
page read and write
12877C69000
heap
page read and write
12877F4C000
heap
page read and write
128776AA000
trusted library allocation
page read and write
12877F99000
heap
page read and write
16B6F302000
heap
page read and write
1D1500B2000
heap
page read and write
12877EC4000
heap
page read and write
12872767000
heap
page read and write
12877850000
trusted library allocation
page read and write
14785FA1000
heap
page read and write
B6D427F000
stack
page read and write
16B748A0000
trusted library allocation
page read and write
4D39A7F000
stack
page read and write
126A67F000
stack
page read and write
16B70601000
trusted library allocation
page read and write
12877A70000
trusted library allocation
page read and write
12877F2E000
heap
page read and write
663D7B000
stack
page read and write
12871E8A000
heap
page read and write
1478563C000
heap
page read and write
12871E43000
heap
page read and write
AB2DFA000
stack
page read and write
1F018255000
heap
page read and write
12877C38000
heap
page read and write
126A0F9000
stack
page read and write
12877670000
trusted library allocation
page read and write
16B74A20000
heap
page read and write
1630F471000
heap
page read and write
1A9FF264000
heap
page read and write
12872518000
heap
page read and write
128727DB000
heap
page read and write
C9517B000
stack
page read and write
16B6F100000
heap
page read and write
12877520000
trusted library allocation
page read and write
16B6F213000
heap
page read and write
12877C2D000
heap
page read and write
12877E80000
heap
page read and write
12877C38000
heap
page read and write
12871C10000
heap
page read and write
671D47F000
unkown
page read and write
128727CB000
heap
page read and write
12877D9D000
heap
page read and write
14785F67000
heap
page read and write
12877DE9000
heap
page read and write
16B6FA15000
heap
page read and write
1D1500BF000
heap
page read and write
12877E6F000
heap
page read and write
12877678000
trusted library allocation
page read and write
12877E00000
heap
page read and write
12877E3F000
heap
page read and write
12877EC8000
heap
page read and write
12877ED9000
heap
page read and write
9876FE000
stack
page read and write
2A5EC43C000
heap
page read and write
21160CC0000
heap
page read and write
21160E00000
heap
page read and write
12872402000
heap
page read and write
12877C55000
heap
page read and write
202C8402000
heap
page read and write
998CFFF000
stack
page read and write
12877F50000
heap
page read and write
1630F450000
heap
page read and write
128727D0000
heap
page read and write
128777BC000
trusted library allocation
page read and write
128727DB000
heap
page read and write
289C7E65000
heap
page read and write
147856EC000
heap
page read and write
12877E7C000
heap
page read and write
12872754000
heap
page read and write
12877E39000
heap
page read and write
187ADD8A000
heap
page read and write
C9557E000
stack
page read and write
B6D3E7F000
stack
page read and write
14785F5D000
heap
page read and write
128776C5000
trusted library allocation
page read and write
12877C00000
heap
page read and write
12872700000
heap
page read and write
12877EE8000
heap
page read and write
289C7F02000
heap
page read and write
128777BC000
trusted library allocation
page read and write
128727D4000
heap
page read and write
6EA197B000
stack
page read and write
128730E0000
trusted library allocation
page read and write
12877890000
trusted library allocation
page read and write
9875FB000
stack
page read and write
1F01827B000
heap
page read and write
A99897D000
stack
page read and write
12877F42000
heap
page read and write
12877F13000
heap
page read and write
147856B2000
heap
page read and write
12877DA0000
heap
page read and write
671D2F9000
unkown
page read and write
14785FD9000
heap
page read and write
126A17F000
stack
page read and write
A9987FD000
stack
page read and write
12877D9D000
heap
page read and write
9BAFD8E000
stack
page read and write
12877E32000
heap
page read and write
187AE7F4000
unkown
page read and write
128777B4000
trusted library allocation
page read and write
12877E4F000
heap
page read and write
12877ED1000
heap
page read and write
1287767C000
trusted library allocation
page read and write
12877EE6000
heap
page read and write
12877E5F000
heap
page read and write
1287279D000
heap
page read and write
12877660000
trusted library allocation
page read and write
671CF4D000
unkown
page read and write
12877660000
trusted library allocation
page read and write
12877DE9000
heap
page read and write
12877D75000
heap
page read and write
12877D79000
heap
page read and write
14785F82000
heap
page read and write
128725AE000
heap
page read and write
12877D31000
heap
page read and write
663C7B000
stack
page read and write
671D3F9000
unkown
page read and write
1A9FF213000
heap
page read and write
12877F72000
heap
page read and write
AB317E000
stack
page read and write
14785F63000
heap
page read and write
128723F0000
trusted library allocation
page read and write
12877D8C000
heap
page read and write
2A5EC413000
heap
page read and write
16B6F270000
heap
page read and write
128727D4000
heap
page read and write
1F018140000
heap
page read and write
There are 1179 hidden memdumps, click here to show them.