IOC Report
[name removed] file 08.11.2022.doc

loading gif

Files

File Path
Type
Category
Malicious
[name removed] file 08.11.2022.doc
Zip archive data, at least v2.0 to extract
initial sample
malicious
C:\Users\user\AppData\Local\Temp\~DF23D671D49BDC7411.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\[name removed] file 08.11.2022.doc.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:41 2022, mtime=Fri Aug 12 06:26:00 2022, atime=Fri Aug 12 06:25:55 2022, length=2221308, window=hide
dropped
malicious
C:\Users\user\AppData\Local\Temp\~DFDF9B80FF6A2BA1D4.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\DF273B98-9C51-4F12-BC5B-F382F2EC592E
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\515DF229.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\7B8918C8.png
PNG image data, 380 x 526, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{AB7DD05B-CB79-4DB6-ACB7-3D8144095A6D}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{D24A98BC-5D49-42B4-8DB0-23D79BB38FC4}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\Desktop\~$ame removed] file 08.11.2022.doc
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2197A182.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E4BEFF9B.png
PNG image data, 380 x 526, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{8452E96F-6729-4A2C-AB1E-1C2D1EF9A762}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D18A3924-35A8-4945-B934-02C37A6660AC}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E87DA6BC-D94B-493D-9994-A22FC53CFF23}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\[name removed] file 08.11.2022.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:51 2022, mtime=Tue Mar 8 15:45:51 2022, atime=Fri Aug 12 06:20:09 2022, length=2221308, window=hide
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding

URLs

Name
IP
Malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://my.microsoftpersonalcontent.com
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
https://api.powerbi.com/beta/myorg/imports
unknown
https://devnull.onenote.com
unknown
https://messaging.action.office.com/
unknown
https://ncus.pagecontentsync.
unknown
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
unknown
https://messaging.office.com/
unknown
https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.8.146.139
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
'(7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
((7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
f+7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
w07
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\1BA05
1BA05
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\29532
29532
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\29532
29532
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
/;2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
w<2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
<>2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\651E7
651E7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\77D3B
77D3B
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\77D3B
77D3B
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 407 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1749AD13000
heap
page read and write
FE39FE000
stack
page read and write
1749AC2F000
heap
page read and write
FE357E000
stack
page read and write
1749AEC9000
heap
page read and write
EFBB87F000
stack
page read and write
1749AF77000
heap
page read and write
17494C71000
heap
page read and write
222B5AEF000
heap
page read and write
259E8458000
heap
page read and write
222B63B5000
heap
page read and write
1749AD6A000
heap
page read and write
1749ADC9000
heap
page read and write
1749AF74000
heap
page read and write
1749A790000
trusted library allocation
page read and write
1749ADE3000
heap
page read and write
222B5B16000
heap
page read and write
222B637D000
heap
page read and write
1749AF99000
heap
page read and write
174957CE000
heap
page read and write
2B550B70000
trusted library allocation
page read and write
17496400000
trusted library section
page readonly
1749AD7D000
heap
page read and write
1749ADC7000
heap
page read and write
17494DEB000
heap
page read and write
1749AD17000
heap
page read and write
222B6375000
heap
page read and write
17494C76000
heap
page read and write
17607800000
heap
page read and write
222B5AB6000
heap
page read and write
259E847E000
heap
page read and write
1749AEFF000
heap
page read and write
174957CB000
heap
page read and write
1749ADD8000
heap
page read and write
1749AE4C000
heap
page read and write
1A1E0E59000
heap
page read and write
1749A800000
trusted library allocation
page read and write
174957C6000
heap
page read and write
1749A648000
trusted library allocation
page read and write
2B550E7E000
heap
page read and write
1749AC61000
heap
page read and write
1749ADA9000
heap
page read and write
17607790000
heap
page read and write
174957F8000
heap
page read and write
1749AE90000
heap
page read and write
2B550CC0000
trusted library allocation
page read and write
1749AEBA000
heap
page read and write
1749AEDD000
heap
page read and write
1749AC69000
heap
page read and write
1A1E0E00000
heap
page read and write
1749AC2C000
heap
page read and write
1749AC61000
heap
page read and write
202F50C5000
heap
page read and write
19EF242A000
heap
page read and write
27D04874000
heap
page read and write
545EAFB000
stack
page read and write
1749AA90000
trusted library allocation
page read and write
1749A780000
trusted library allocation
page read and write
1749AFE4000
heap
page read and write
1749AEDF000
heap
page read and write
1749A63E000
trusted library allocation
page read and write
259E82E0000
heap
page read and write
1749AC3F000
heap
page read and write
1749AD21000
heap
page read and write
1749AEC9000
heap
page read and write
17495340000
trusted library allocation
page read and write
174957B0000
heap
page read and write
1749AE83000
heap
page read and write
17495743000
heap
page read and write
27D04875000
heap
page read and write
174957A3000
heap
page read and write
1749A500000
trusted library allocation
page read and write
1749AE73000
heap
page read and write
26969BD1000
heap
page read and write
222B5AB3000
heap
page read and write
B02CA7E000
stack
page read and write
1749AD70000
heap
page read and write
1749AE92000
heap
page read and write
1749A63E000
trusted library allocation
page read and write
FE3FFC000
stack
page read and write
1749A7AC000
trusted library allocation
page read and write
222B5970000
trusted library allocation
page read and write
1749574F000
heap
page read and write
8D93EAB000
stack
page read and write
1749ADC1000
heap
page read and write
1749551D000
heap
page read and write
2B550EDE000
heap
page read and write
27D05002000
trusted library allocation
page read and write
1749AC3C000
heap
page read and write
F423AFE000
stack
page read and write
1749AF50000
heap
page read and write
EFBB67E000
stack
page read and write
9795BFE000
stack
page read and write
2B54BF58000
heap
page read and write
1749AF3A000
heap
page read and write
222B637B000
heap
page read and write
1749AE47000
heap
page read and write
202F5113000
heap
page read and write
1749ADE8000
heap
page read and write
27D0488E000
heap
page read and write
222B6379000
heap
page read and write
1749A644000
trusted library allocation
page read and write
1749AD13000
heap
page read and write
1749A635000
trusted library allocation
page read and write
1749AE50000
heap
page read and write
174957D8000
heap
page read and write
202F5043000
heap
page read and write
28979B00000
heap
page read and write
222B6382000
heap
page read and write
1749A640000
trusted library allocation
page read and write
1749AC39000
heap
page read and write
202F5024000
heap
page read and write
28979B02000
heap
page read and write
1749AE53000
heap
page read and write
222B631A000
heap
page read and write
1749AC2D000
heap
page read and write
225A0C41000
heap
page read and write
222B6375000
heap
page read and write
26969BD6000
heap
page read and write
1749AE87000
heap
page read and write
1749AC26000
heap
page read and write
2980AF00000
heap
page read and write
259E847B000
heap
page read and write
17494C65000
heap
page read and write
174957C6000
heap
page read and write
1749AFE4000
heap
page read and write
1749AF5A000
heap
page read and write
1749AD11000
heap
page read and write
1749ADCA000
heap
page read and write
1749AEDB000
heap
page read and write
CBB64FB000
stack
page read and write
1749AF41000
heap
page read and write
259E8380000
trusted library allocation
page read and write
1749AF29000
heap
page read and write
1749AEC9000
heap
page read and write
174957A4000
heap
page read and write
1749AF05000
heap
page read and write
1749AE05000
heap
page read and write
1749AD13000
heap
page read and write
2B550EEC000
heap
page read and write
17494C74000
heap
page read and write
1749AEC0000
heap
page read and write
1749C590000
trusted library allocation
page read and write
1749AC26000
heap
page read and write
2B550DF0000
remote allocation
page read and write
1749ADC2000
heap
page read and write
257F2F9000
stack
page read and write
FE397E000
stack
page read and write
17496420000
trusted library section
page readonly
259E8429000
heap
page read and write
1749AE4C000
heap
page read and write
1749A7A4000
trusted library allocation
page read and write
1749AFCB000
heap
page read and write
222B6802000
heap
page read and write
1749A7A4000
trusted library allocation
page read and write
1749AC26000
heap
page read and write
1749A830000
trusted library allocation
page read and write
19EF2413000
heap
page read and write
1749A64C000
trusted library allocation
page read and write
26969BEE000
heap
page read and write
17495772000
heap
page read and write
1A1E0E70000
heap
page read and write
2B550EF2000
heap
page read and write
259E846B000
heap
page read and write
259E8461000
heap
page read and write
1749AC13000
heap
page read and write
17495788000
heap
page read and write
259E8464000
heap
page read and write
174957FC000
heap
page read and write
1749AD7C000
heap
page read and write
17495768000
heap
page read and write
1749AD76000
heap
page read and write
26969BEE000
heap
page read and write
202F506E000
heap
page read and write
28979A82000
heap
page read and write
222B6373000
heap
page read and write
174955D2000
heap
page read and write
259E8445000
heap
page read and write
17495754000
heap
page read and write
222B5A3C000
heap
page read and write
1A1E0F08000
heap
page read and write
1749AEF2000
heap
page read and write
1749A7A4000
trusted library allocation
page read and write
259E8448000
heap
page read and write
1749AE7D000
heap
page read and write
1749AC62000
heap
page read and write
222B634C000
heap
page read and write
3D91A7F000
stack
page read and write
1749AE26000
heap
page read and write
FE3279000
stack
page read and write
1749A62C000
trusted library allocation
page read and write
1749A64C000
trusted library allocation
page read and write
1749AC2D000
heap
page read and write
1749A7A0000
trusted library allocation
page read and write
1749AC34000
heap
page read and write
2B54B813000
heap
page read and write
2B550DA0000
trusted library allocation
page read and write
1749AA80000
trusted library allocation
page read and write
17607813000
heap
page read and write
225A0C3D000
heap
page read and write
1749A630000
trusted library allocation
page read and write
17607902000
heap
page read and write
174957AC000
heap
page read and write
2B54BE00000
heap
page read and write
1749AF0C000
heap
page read and write
1749AC69000
heap
page read and write
1749A630000
trusted library allocation
page read and write
17494D13000
heap
page read and write
1749AEC9000
heap
page read and write
1749AED6000
heap
page read and write
1749AF2B000
heap
page read and write
2B550E40000
heap
page read and write
225A0B70000
heap
page read and write
174957B9000
heap
page read and write
1749AEBC000
heap
page read and write
19EF2424000
heap
page read and write
1749AE24000
heap
page read and write
202F50BB000
heap
page read and write
2B550E1A000
heap
page read and write
1749A652000
trusted library allocation
page read and write
FE3DF5000
stack
page read and write
259E8433000
heap
page read and write
1749A644000
trusted library allocation
page read and write
1749AC02000
heap
page read and write
202F4DC0000
heap
page read and write
1749A7A4000
trusted library allocation
page read and write
1749AE4A000
heap
page read and write
1749AE5A000
heap
page read and write
1749AE71000
heap
page read and write
1749AC69000
heap
page read and write
289799B0000
trusted library allocation
page read and write
1749A7A0000
trusted library allocation
page read and write
1749574F000
heap
page read and write
202F5102000
heap
page read and write
2B54B800000
heap
page read and write
2B54C750000
trusted library section
page readonly
174957AC000
heap
page read and write
1749AC61000
heap
page read and write
1749AE49000
heap
page read and write
1749AE96000
heap
page read and write
2B54B892000
heap
page read and write
1749552A000
heap
page read and write
174957CD000
heap
page read and write
19EF2454000
heap
page read and write
1749AD71000
heap
page read and write
1749ADAD000
heap
page read and write
259E8440000
heap
page read and write
1749A650000
trusted library allocation
page read and write
1749AE4C000
heap
page read and write
1749AF81000
heap
page read and write
2980AD60000
heap
page read and write
EFBB6FF000
stack
page read and write
1A1E0E56000
heap
page read and write
1749ADE3000
heap
page read and write
17495602000
heap
page read and write
5C950F8000
stack
page read and write
1749551C000
heap
page read and write
174957C4000
heap
page read and write
1749A7A0000
trusted library allocation
page read and write
222B5810000
heap
page read and write
17496430000
trusted library section
page readonly
27D04902000
heap
page read and write
222B6803000
heap
page read and write
222B63B6000
heap
page read and write
27D04836000
heap
page read and write
EFBBC7E000
stack
page read and write
1749AC2D000
heap
page read and write
1749AE7B000
heap
page read and write
1749AE98000
heap
page read and write
1749AF21000
heap
page read and write
3D9138B000
stack
page read and write
FE377F000
stack
page read and write
1749AF03000
heap
page read and write
545E9FB000
stack
page read and write
2B550C90000
trusted library allocation
page read and write
1749AD71000
heap
page read and write
1749AD4E000
heap
page read and write
1749AE5C000
heap
page read and write
17607802000
heap
page read and write
28979B13000
heap
page read and write
27D04829000
heap
page read and write
F4239F7000
stack
page read and write
225A0C00000
heap
page read and write
28979A84000
heap
page read and write
1749AC61000
heap
page read and write
1749AEE5000
heap
page read and write
1749ADAD000
heap
page read and write
222B6202000
heap
page read and write
1749AE37000
heap
page read and write
2B54B856000
heap
page read and write
545E87E000
stack
page read and write
1749AD5F000
heap
page read and write
1749AC34000
heap
page read and write
1749A7AC000
trusted library allocation
page read and write
1749A7A0000
trusted library allocation
page read and write
979597F000
stack
page read and write
222B6370000
heap
page read and write
8D947FF000
stack
page read and write
1749565A000
heap
page read and write
1749AD61000
heap
page read and write
1749AC62000
heap
page read and write
222B5A29000
heap
page read and write
174957C4000
heap
page read and write
1749AD55000
heap
page read and write
1749A652000
trusted library allocation
page read and write
17494C8F000
heap
page read and write
1749AC2F000
heap
page read and write
259E8C02000
trusted library allocation
page read and write
B02C30E000
stack
page read and write
1749AC38000
heap
page read and write
1749AC34000
heap
page read and write
2B550EE9000
heap
page read and write
27D04740000
heap
page read and write
5C953F8000
stack
page read and write
1749A880000
trusted library allocation
page read and write
1749AD0E000
heap
page read and write
1749AFBA000
heap
page read and write
174955CB000
heap
page read and write
27D04864000
heap
page read and write
2B54B5D0000
heap
page read and write
9795E7D000
stack
page read and write
2B54BE02000
heap
page read and write
222B63A6000
heap
page read and write
259E845D000
heap
page read and write
1A1E0E90000
heap
page read and write
2B550C9E000
trusted library allocation
page read and write
1749AE9D000
heap
page read and write
2B550DB0000
trusted library allocation
page read and write
2B550DD0000
trusted library allocation
page read and write
19EF2502000
heap
page read and write
27D04874000
heap
page read and write
222B6393000
heap
page read and write
2B550F02000
heap
page read and write
1749AFBE000
heap
page read and write
9795CFD000
stack
page read and write
27D0485E000
heap
page read and write
174957CE000
heap
page read and write
1749ADA9000
heap
page read and write
17494C43000
heap
page read and write
1749A6BC000
trusted library allocation
page read and write
DBD41F9000
stack
page read and write
2B54B864000
heap
page read and write
1749AC53000
heap
page read and write
2B54B630000
heap
page read and write
1749A7A0000
trusted library allocation
page read and write
CBB66F7000
stack
page read and write
2B550EAD000
heap
page read and write
174957D1000
heap
page read and write
17494C58000
heap
page read and write
1749AC56000
heap
page read and write
1A1E0E50000
heap
page read and write
1749AF14000
heap
page read and write
545EDFF000
stack
page read and write
1749AD99000
heap
page read and write
1749AC58000
heap
page read and write
1749AE51000
heap
page read and write
289798B0000
heap
page read and write
3D91AFB000
stack
page read and write
222B6371000
heap
page read and write
1749AD54000
heap
page read and write
174957CD000
heap
page read and write
174957D0000
heap
page read and write
1749AEE9000
heap
page read and write
1749AEE7000
heap
page read and write
1749A610000
trusted library allocation
page read and write
1749A646000
trusted library allocation
page read and write
222B5A8C000
heap
page read and write
1749AE7F000
heap
page read and write
1749AC2D000
heap
page read and write
225A0D13000
heap
page read and write
225A0C13000
heap
page read and write
1749A650000
trusted library allocation
page read and write
1749AD1A000
heap
page read and write
1A1E0E89000
heap
page read and write
1749AEDA000
heap
page read and write
28979A66000
heap
page read and write
FE367B000
stack
page read and write
1A1E0C40000
heap
page read and write
1749AE62000
heap
page read and write
1749AE24000
heap
page read and write
1749A635000
trusted library allocation
page read and write
8D94BFF000
stack
page read and write
2B550DF0000
remote allocation
page read and write
222B6394000
heap
page read and write
1749A7AC000
trusted library allocation
page read and write
1760783D000
heap
page read and write
2B54C760000
trusted library section
page readonly
202F50CC000
heap
page read and write
2980AE29000
heap
page read and write
DBD407A000
stack
page read and write
1749AF71000
heap
page read and write
5C951F7000
stack
page read and write
222B637E000
heap
page read and write
FE387A000
stack
page read and write
222B6377000
heap
page read and write
17494C91000
heap
page read and write
1749AD02000
heap
page read and write
1749AE4C000
heap
page read and write
1749AC53000
heap
page read and write
17494C95000
heap
page read and write
1749AE6E000
heap
page read and write
1749A630000
trusted library allocation
page read and write
174957C3000
heap
page read and write
1749AD76000
heap
page read and write
257F3FE000
stack
page read and write
CBB68FE000
stack
page read and write
1749AF7B000
heap
page read and write
1749AD77000
heap
page read and write
1749AD6D000
heap
page read and write
2B54C561000
trusted library allocation
page read and write
3D91E7E000
stack
page read and write
1749AD5D000
heap
page read and write
222B5AFD000
heap
page read and write
545EBF7000
stack
page read and write
174957FC000
heap
page read and write
2B550DE0000
trusted library allocation
page read and write
F423BFF000
stack
page read and write
202F50E2000
heap
page read and write
17494C69000
heap
page read and write
1749AF2D000
heap
page read and write
1749AE35000
heap
page read and write
CBB65FB000
stack
page read and write
1749AE4E000
heap
page read and write
176077C0000
trusted library allocation
page read and write
2B550DF0000
remote allocation
page read and write
F2D3C7E000
stack
page read and write
2B54C101000
trusted library allocation
page read and write
1749A780000
trusted library allocation
page read and write
1749A67E000
trusted library allocation
page read and write
1A1E0E5A000
heap
page read and write
B02C38E000
stack
page read and write
1749AF35000
heap
page read and write
1749AE4E000
heap
page read and write
19EF23A0000
heap
page read and write
1749AD7C000
heap
page read and write
259E8441000
heap
page read and write
222B6392000
heap
page read and write
26969F20000
heap
page read and write
222B639C000
heap
page read and write
222B634E000
heap
page read and write
1749AEC9000
heap
page read and write
1749A611000
trusted library allocation
page read and write
1749AF5E000
heap
page read and write
1A1E0E53000
heap
page read and write
17494C13000
heap
page read and write
17495528000
heap
page read and write
1749AD0C000
heap
page read and write
174957EC000
heap
page read and write
259E8502000
heap
page read and write
1749AC62000
heap
page read and write
1749A770000
trusted library allocation
page read and write
5C952FE000
stack
page read and write
1749AF32000
heap
page read and write
EFBBA7B000
stack
page read and write
17494C3C000
heap
page read and write
1749AE45000
heap
page read and write
EFBB57B000
stack
page read and write
2B550D60000
trusted library allocation
page read and write
3D91D7D000
stack
page read and write
2B54B829000
heap
page read and write
1749AD59000
heap
page read and write
1749AE2B000
heap
page read and write
259E8477000
heap
page read and write
1749A790000
trusted library allocation
page read and write
1749ADC5000
heap
page read and write
1749AC26000
heap
page read and write
1749A695000
trusted library allocation
page read and write
1749AF36000
heap
page read and write
17607852000
heap
page read and write
1749AE8D000
heap
page read and write
1749AEC9000
heap
page read and write
259E8444000
heap
page read and write
1749AF0E000
heap
page read and write
1749AC43000
heap
page read and write
222B5800000
heap
page read and write
1749AC34000
heap
page read and write
1749AC5F000
heap
page read and write
2B550EFF000
heap
page read and write
2B54B83D000
heap
page read and write
259E8457000
heap
page read and write
1749AD6F000
heap
page read and write
2B54C660000
trusted library allocation
page read and write
259E843D000
heap
page read and write
174957C6000
heap
page read and write
222B5870000
heap
page read and write
174957C6000
heap
page read and write
F42367E000
stack
page read and write
2B550CB1000
trusted library allocation
page read and write
26969B80000
heap
page read and write
FE347A000
stack
page read and write
EFBB27A000
stack
page read and write
222B637A000
heap
page read and write
259E8484000
heap
page read and write
1749A638000
trusted library allocation
page read and write
1749A63C000
trusted library allocation
page read and write
1749A480000
trusted library allocation
page read and write
17494C8C000
heap
page read and write
174957E7000
heap
page read and write
259E845E000
heap
page read and write
1749AD03000
heap
page read and write
174957C6000
heap
page read and write
19EF2402000
heap
page read and write
1749AFE4000
heap
page read and write
1749ADAE000
heap
page read and write
17607740000
heap
page read and write
1749AC5C000
heap
page read and write
1749B010000
heap
page read and write
1749AE31000
heap
page read and write
1749AD81000
heap
page read and write
1749AC4F000
heap
page read and write
1749AFE4000
heap
page read and write
174957CD000
heap
page read and write
222B637B000
heap
page read and write
2B550AF0000
trusted library allocation
page read and write
1749A790000
trusted library allocation
page read and write
1749A760000
trusted library allocation
page read and write
174955AF000
heap
page read and write
259E8468000
heap
page read and write
1749AFBC000
heap
page read and write
174955D7000
heap
page read and write
2B550C98000
trusted library allocation
page read and write
1749AE3F000
heap
page read and write
19EF2C02000
trusted library allocation
page read and write
2B54B869000
heap
page read and write
545ECFC000
stack
page read and write
17607843000
heap
page read and write
202F5700000
heap
page read and write
1749AEBB000
heap
page read and write
27D04900000
heap
page read and write
1749ADFD000
heap
page read and write
1749AFF3000
heap
page read and write
1749A695000
trusted library allocation
page read and write
1749ADA4000
heap
page read and write
1749AF7E000
heap
page read and write
174957C9000
heap
page read and write
174957CD000
heap
page read and write
202F5000000
heap
page read and write
1749AE23000
heap
page read and write
222B637D000
heap
page read and write
1749AEE1000
heap
page read and write
1749ADA7000
heap
page read and write
17495750000
heap
page read and write
17495400000
heap
page read and write
174957F9000
heap
page read and write
F4238FF000
stack
page read and write
1749AEF0000
heap
page read and write
17494D8E000
heap
page read and write
1749AE85000
heap
page read and write
1749AE35000
heap
page read and write
EFBACAC000
stack
page read and write
1A1E0DB0000
trusted library allocation
page read and write
222B63DD000
heap
page read and write
28979B08000
heap
page read and write
1749AF46000
heap
page read and write
28979A00000
heap
page read and write
1749ADAE000
heap
page read and write
1749551D000
heap
page read and write
222B5A13000
heap
page read and write
9795A7C000
stack
page read and write
1749AE4F000
heap
page read and write
1749AD1D000
heap
page read and write
222B59E0000
remote allocation
page read and write
222B6376000
heap
page read and write
174957A4000
heap
page read and write
2B550CD0000
trusted library allocation
page read and write
1749AC34000
heap
page read and write
1749ADD6000
heap
page read and write
202F4FF0000
trusted library allocation
page read and write
1749ADDA000
heap
page read and write
1749AD6C000
heap
page read and write
1749AD13000
heap
page read and write
222B6396000
heap
page read and write
1749AF9B000
heap
page read and write
174957CF000
heap
page read and write
27D0483C000
heap
page read and write
1749A642000
trusted library allocation
page read and write
3D917FB000
stack
page read and write
174957D1000
heap
page read and write
1749AEC9000
heap
page read and write
1749A612000
trusted library allocation
page read and write
222B5AEF000
heap
page read and write
26969BD6000
heap
page read and write
174957C6000
heap
page read and write
1749AE81000
heap
page read and write
2B54B85F000
heap
page read and write
222B6819000
heap
page read and write
174955F4000
heap
page read and write
19EF23D0000
trusted library allocation
page read and write
1749AFA3000
heap
page read and write
1A1E0F02000
heap
page read and write
1749AF58000
heap
page read and write
1749A67E000
trusted library allocation
page read and write
17495623000
heap
page read and write
1749AE23000
heap
page read and write
174957AC000
heap
page read and write
222B6322000
heap
page read and write
1749AF6A000
heap
page read and write
1749ADC9000
heap
page read and write
5C94EFE000
stack
page read and write
2980AE68000
heap
page read and write
1749AE4D000
heap
page read and write
1749AC4D000
heap
page read and write
1749A648000
trusted library allocation
page read and write
B02C77E000
stack
page read and write
222B6800000
heap
page read and write
F2D3D7F000
stack
page read and write
1749AD94000
heap
page read and write
2B54CAE3000
trusted library allocation
page read and write
1749AF3E000
heap
page read and write
174957C3000
heap
page read and write
EFBB5FF000
stack
page read and write
1749AF25000
heap
page read and write
174957CD000
heap
page read and write
1749AD16000
heap
page read and write
1749AD9F000
heap
page read and write
1749AD07000
heap
page read and write
FE31FB000
stack
page read and write
1749AE4D000
heap
page read and write
1749ADC3000
heap
page read and write
259E8465000
heap
page read and write
1749AE5A000
heap
page read and write
225A0C62000
heap
page read and write
1749AE23000
heap
page read and write
1749AC37000
heap
page read and write
222B6802000
heap
page read and write
1749AD74000
heap
page read and write
F2D3B7F000
stack
page read and write
1749AC26000
heap
page read and write
27D04881000
heap
page read and write
1749A640000
trusted library allocation
page read and write
1760783A000
heap
page read and write
1749A630000
trusted library allocation
page read and write
1749A790000
trusted library allocation
page read and write
222B637B000
heap
page read and write
17496300000
trusted library allocation
page read and write
DBD417F000
stack
page read and write
1749A630000
trusted library allocation
page read and write
1749AD13000
heap
page read and write
1A1E0E61000
heap
page read and write
1749AF56000
heap
page read and write
1749AD02000
heap
page read and write
1749AEFD000
heap
page read and write
1749ADD4000
heap
page read and write
2980AE13000
heap
page read and write
27D04800000
heap
page read and write
222B5AE4000
heap
page read and write
1749A7AC000
trusted library allocation
page read and write
1749AC55000
heap
page read and write
222B639F000
heap
page read and write
1749551C000
heap
page read and write
1749AD33000
heap
page read and write
17495502000
heap
page read and write
259E82F0000
heap
page read and write
17495600000
heap
page read and write
259E846A000
heap
page read and write
1749AD9B000
heap
page read and write
259E8446000
heap
page read and write
174957CE000
heap
page read and write
174955AF000
heap
page read and write
174963E0000
trusted library section
page readonly
1749AD03000
heap
page read and write
174957FB000
heap
page read and write
1749AF79000
heap
page read and write
2B550DF0000
trusted library allocation
page read and write
27D04852000
heap
page read and write
259E846D000
heap
page read and write
2897A202000
trusted library allocation
page read and write
259E845A000
heap
page read and write
1749AD4D000
heap
page read and write
1749A7E0000
trusted library allocation
page read and write
259E8413000
heap
page read and write
1749AF13000
heap
page read and write
1749AD14000
heap
page read and write
1749AC2D000
heap
page read and write
26969BC0000
heap
page read and write
2B54B913000
heap
page read and write
17495700000
heap
page read and write
225A1402000
trusted library allocation
page read and write
1749AF6F000
heap
page read and write
2B550E2D000
heap
page read and write
EFBB37A000
stack
page read and write
174957C6000
heap
page read and write
174960A0000
trusted library allocation
page read and write
FE3BFE000
stack
page read and write
225A0C02000
heap
page read and write
174957C7000
heap
page read and write
1749A64A000
trusted library allocation
page read and write
2B54BF00000
heap
page read and write
1749AE81000
heap
page read and write
1749AC10000
heap
page read and write
2B550CD4000
trusted library allocation
page read and write
2B54BF02000
heap
page read and write
1749AD68000
heap
page read and write
2B550E63000
heap
page read and write
1749AE3B000
heap
page read and write
1A1E0E54000
heap
page read and write
17495768000
heap
page read and write
1749AEBB000
heap
page read and write
17494C55000
heap
page read and write
1749AD13000
heap
page read and write
225A0B60000
heap
page read and write
26969B20000
heap
page read and write
1749A630000
trusted library allocation
page read and write
1749A640000
trusted library allocation
page read and write
3D91BFD000
stack
page read and write
2B54B825000
heap
page read and write
26969C03000
heap
page read and write
1749AD0A000
heap
page read and write
1749AE4C000
heap
page read and write
1749AC26000
heap
page read and write
257F1FE000
stack
page read and write
1749AE47000
heap
page read and write
222B6802000
heap
page read and write
2B54BE15000
heap
page read and write
2B54B5C0000
heap
page read and write
1749AF9F000
heap
page read and write
1749A900000
trusted library allocation
page read and write
1749AC69000
heap
page read and write
1749AD86000
heap
page read and write
27D04813000
heap
page read and write
5C94E7B000
stack
page read and write
FE3CFE000
stack
page read and write
225A1330000
trusted library allocation
page read and write
225A0C5B000
heap
page read and write
222B6349000
heap
page read and write
17494B70000
heap
page read and write
1749AD49000
heap
page read and write
1749A7AC000
trusted library allocation
page read and write
225A0C2A000
heap
page read and write
1A1E0E29000
heap
page read and write
222B63B6000
heap
page read and write
1749AD90000
heap
page read and write
1749AEEB000
heap
page read and write
2B54BDA0000
trusted library section
page read and write
1749A646000
trusted library allocation
page read and write
1749AE7D000
heap
page read and write
1749AC5B000
heap
page read and write
1749A8D0000
trusted library allocation
page read and write
2B550E9E000
heap
page read and write
1749561B000
heap
page read and write
2B550E1F000
heap
page read and write
222B59E0000
remote allocation
page read and write
1749AEC9000
heap
page read and write
222B6371000
heap
page read and write
DBD40FF000
stack
page read and write
1749AD13000
heap
page read and write
1749A7A0000
trusted library allocation
page read and write
2B54B866000
heap
page read and write
1749A7AC000
trusted library allocation
page read and write
1749ADBF000
heap
page read and write
1749560A000
heap
page read and write
1749AC69000
heap
page read and write
1749AF7F000
heap
page read and write
EFBB77F000
stack
page read and write
CBB612F000
stack
page read and write
1749AFDB000
heap
page read and write
1749AC00000
heap
page read and write
17496470000
trusted library allocation
page read and write
2980AE00000
heap
page read and write
174955B2000
heap
page read and write
1749AC26000
heap
page read and write
1749A9E3000
trusted library allocation
page read and write
222B6802000
heap
page read and write
1760782E000
heap
page read and write
3D91F7D000
stack
page read and write
19EF243C000
heap
page read and write
1749AED3000
heap
page read and write
1749AE67000
heap
page read and write
1749AD56000
heap
page read and write
1749AD13000
heap
page read and write
1749A640000
trusted library allocation
page read and write
1749A6B0000
trusted library allocation
page read and write
1749AD3D000
heap
page read and write
222B5A87000
heap
page read and write
1749ADA5000
heap
page read and write
1749AEEE000
heap
page read and write
F42387B000
stack
page read and write
1749AE69000
heap
page read and write
8D943FC000
stack
page read and write
174957FC000
heap
page read and write
222B6394000
heap
page read and write
17494B80000
heap
page read and write
FE3379000
stack
page read and write
222B6382000
heap
page read and write
1749AC2F000
heap
page read and write
1749ADAB000
heap
page read and write
2980AD90000
trusted library allocation
page read and write
174957AD000
heap
page read and write
174957C6000
heap
page read and write
174957CD000
heap
page read and write
257EDEB000
stack
page read and write
1749A9B0000
remote allocation
page read and write
FE2F7A000
stack
page read and write
1749AD13000
heap
page read and write
28979A13000
heap
page read and write
1A1E0E4B000
heap
page read and write
17494DC2000
heap
page read and write
225A0C64000
heap
page read and write
222B5B08000
heap
page read and write
1749AD99000
heap
page read and write
259E8460000
heap
page read and write
259E8432000
heap
page read and write
1749AE7B000
heap
page read and write
17495516000
heap
page read and write
28979A60000
heap
page read and write
1749AF27000
heap
page read and write
1749AC34000
heap
page read and write
174957CD000
heap
page read and write
1749AD13000
heap
page read and write
FE36FF000
stack
page read and write
1749AE87000
heap
page read and write
DBD42FE000
stack
page read and write
1749AC34000
heap
page read and write
222B6802000
heap
page read and write
1749AE4D000
heap
page read and write
1749A840000
trusted library allocation
page read and write
174955C3000
heap
page read and write
174957C1000
heap
page read and write
2980B602000
trusted library allocation
page read and write
1749AE4A000
heap
page read and write
17608002000
trusted library allocation
page read and write
2980AE40000
heap
page read and write
259E8462000
heap
page read and write
174957CD000
heap
page read and write
2B54B88D000
heap
page read and write
5C94C7B000
stack
page read and write
CBB60AB000
stack
page read and write
3D91C7B000
stack
page read and write
CBB61AE000
stack
page read and write
1749AD13000
heap
page read and write
1749A64E000
trusted library allocation
page read and write
222B5A5E000
heap
page read and write
1749AE34000
heap
page read and write
545E5DC000
stack
page read and write
1749A7A4000
trusted library allocation
page read and write
1749A970000
remote allocation
page read and write
1749A6D0000
trusted library allocation
page read and write
28979A29000
heap
page read and write
17495658000
heap
page read and write
26969BA0000
heap
page read and write
1749AE39000
heap
page read and write
1749AF44000
heap
page read and write
2B54C780000
trusted library section
page readonly
1749AC2F000
heap
page read and write
1749AC26000
heap
page read and write
5C94D7D000
stack
page read and write
1749AD81000
heap
page read and write
17494C8A000
heap
page read and write
1749AE00000
heap
page read and write
1749ADA4000
heap
page read and write
1749ADF5000
heap
page read and write
1749AD13000
heap
page read and write
2980AE02000
heap
page read and write
2B550E4D000
heap
page read and write
26969C05000
heap
page read and write
2B54BD90000
trusted library allocation
page read and write
1749AE4D000
heap
page read and write
1749AF02000
heap
page read and write
8D94AFE000
stack
page read and write
222B59E0000
remote allocation
page read and write
1749AC2F000
heap
page read and write
1749AC2D000
heap
page read and write
17495772000
heap
page read and write
1749AFB9000
heap
page read and write
1749AEC9000
heap
page read and write
174957F8000
heap
page read and write
1749AC26000
heap
page read and write
2B54C770000
trusted library section
page readonly
1749A630000
trusted library allocation
page read and write
1749AFA1000
heap
page read and write
202F5602000
heap
page read and write
1749A790000
trusted library allocation
page read and write
19EF2400000
heap
page read and write
17495402000
heap
page read and write
1749AE4C000
heap
page read and write
19EF242C000
heap
page read and write
1749AC3C000
heap
page read and write
EFBB97C000
stack
page read and write
174957A8000
heap
page read and write
2B550CB0000
trusted library allocation
page read and write
B02C87E000
stack
page read and write
1749ADC7000
heap
page read and write
174957CD000
heap
page read and write
1749AEBB000
heap
page read and write
174957A4000
heap
page read and write
174957CD000
heap
page read and write
27D047A0000
heap
page read and write
1749AC2F000
heap
page read and write
545E8FE000
stack
page read and write
17494BE0000
heap
page read and write
1749AD02000
heap
page read and write
222B631C000
heap
page read and write
1749AE6D000
heap
page read and write
1749AE15000
heap
page read and write
259E843B000
heap
page read and write
B02C28C000
stack
page read and write
1749AD86000
heap
page read and write
1749AEC9000
heap
page read and write
1749AEB7000
heap
page read and write
1749AC69000
heap
page read and write
222B5A5C000
heap
page read and write
2B54CAE0000
trusted library allocation
page read and write
17494C29000
heap
page read and write
27D04868000
heap
page read and write
17495594000
heap
page read and write
1749AC69000
heap
page read and write
27D04730000
heap
page read and write
174957AD000
heap
page read and write
19EF2B30000
remote allocation
page read and write
222B5AAC000
heap
page read and write
2B54B89E000
heap
page read and write
259E8400000
heap
page read and write
1749AE99000
heap
page read and write
1749AECA000
heap
page read and write
259E8350000
heap
page read and write
2B54C740000
trusted library section
page readonly
1749AF07000
heap
page read and write
1749AD88000
heap
page read and write
3D9207F000
stack
page read and write
1749AD50000
heap
page read and write
1749AEDB000
heap
page read and write
222B6396000
heap
page read and write
8D948FE000
stack
page read and write
17495E11000
trusted library allocation
page read and write
174957D7000
heap
page read and write
174957FF000
heap
page read and write
19EF2330000
heap
page read and write
EFBB0F7000
stack
page read and write
1749AE90000
heap
page read and write
2B550B00000
trusted library allocation
page read and write
1749ADC3000
heap
page read and write
222B6374000
heap
page read and write
1A1E0E7F000
heap
page read and write
26969BCB000
heap
page read and write
1749AC34000
heap
page read and write
1749AC38000
heap
page read and write
174957CD000
heap
page read and write
222B5A60000
heap
page read and write
1749ADC5000
heap
page read and write
DBD427E000
stack
page read and write
222B6382000
heap
page read and write
1749AE75000
heap
page read and write
FE2B9E000
stack
page read and write
1749AE4F000
heap
page read and write
1749AE4C000
heap
page read and write
1749AEC9000
heap
page read and write
1749AD7C000
heap
page read and write
1749AE3D000
heap
page read and write
222B5A5D000
heap
page read and write
222B6394000
heap
page read and write
1749AC48000
heap
page read and write
222B5AEC000
heap
page read and write
1749AD00000
heap
page read and write
1749A644000
trusted library allocation
page read and write
1749AD73000
heap
page read and write
1749A860000
trusted library allocation
page read and write
1749A64C000
trusted library allocation
page read and write
17495360000
trusted library allocation
page read and write
1749578F000
heap
page read and write
1749A7A0000
trusted library allocation
page read and write
2B552000000
heap
page read and write
174957A8000
heap
page read and write
1749AC2D000
heap
page read and write
17495775000
heap
page read and write
1749AF62000
heap
page read and write
19EF2B30000
remote allocation
page read and write
1749A640000
trusted library allocation
page read and write
1749A67A000
trusted library allocation
page read and write
1749AF84000
heap
page read and write
222B635A000
heap
page read and write
1749AC2F000
heap
page read and write
5C94FF7000
stack
page read and write
1749AF1E000
heap
page read and write
2980AF13000
heap
page read and write
222B6377000
heap
page read and write
17495554000
heap
page read and write
2B54BF18000
heap
page read and write
B02C97F000
stack
page read and write
1749AEC9000
heap
page read and write
259E8442000
heap
page read and write
27D04908000
heap
page read and write
1749A4F0000
trusted library allocation
page read and write
1749AF5B000
heap
page read and write
1749AC38000
heap
page read and write
1749AEE3000
heap
page read and write
1749A9E0000
trusted library allocation
page read and write
1749AC26000
heap
page read and write
2980AE57000
heap
page read and write
17494C00000
heap
page read and write
1749AD02000
heap
page read and write
174957D7000
heap
page read and write
1749A610000
trusted library allocation
page read and write
1A1E0E13000
heap
page read and write
1749AC69000
heap
page read and write
2B54CAF0000
trusted library allocation
page read and write
2B550F00000
heap
page read and write
1749ADE5000
heap
page read and write
1749AEC9000
heap
page read and write
1749A870000
trusted library allocation
page read and write
222B5AC9000
heap
page read and write
17495797000
heap
page read and write
222B6382000
heap
page read and write
97955AB000
stack
page read and write
1749AD05000
heap
page read and write
1749AC61000
heap
page read and write
2B550CC0000
trusted library allocation
page read and write
CBB67FE000
stack
page read and write
1749AC2D000
heap
page read and write
1749AC34000
heap
page read and write
1749AC69000
heap
page read and write
1749AF18000
heap
page read and write
222B635F000
heap
page read and write
17607730000
heap
page read and write
8D942FB000
stack
page read and write
1749AD13000
heap
page read and write
1749AD66000
heap
page read and write
2980AF02000
heap
page read and write
28979A51000
heap
page read and write
F2D3A7B000
stack
page read and write
1749AECF000
heap
page read and write
DBD437C000
stack
page read and write
5C9547F000
unkown
page read and write
2980ACF0000
heap
page read and write
257F4FE000
stack
page read and write
1749B010000
heap
page read and write
26969BEE000
heap
page read and write
28979840000
heap
page read and write
17607829000
heap
page read and write
174957D1000
heap
page read and write
259E844E000
heap
page read and write
174955D5000
heap
page read and write
1749AF09000
heap
page read and write
222B5A55000
heap
page read and write
1749AC2D000
heap
page read and write
225A0D02000
heap
page read and write
2B54B8FD000
heap
page read and write
1749A64E000
trusted library allocation
page read and write
1749AC34000
heap
page read and write
1749AE61000
heap
page read and write
222B5AC3000
heap
page read and write
2B550EB5000
heap
page read and write
222B5A87000
heap
page read and write
8D944FE000
stack
page read and write
1749AC26000
heap
page read and write
FE38FF000
stack
page read and write
222B6373000
heap
page read and write
222B6356000
heap
page read and write
222B6377000
heap
page read and write
174955D0000
heap
page read and write
28979A3C000
heap
page read and write
1749A790000
trusted library allocation
page read and write
28979A83000
heap
page read and write
1749ADDD000
heap
page read and write
1749AF9D000
heap
page read and write
17495415000
heap
page read and write
1749AC55000
heap
page read and write
17495763000
heap
page read and write
1749A8B0000
trusted library allocation
page read and write
1749A67A000
trusted library allocation
page read and write
222B6395000
heap
page read and write
259E847A000
heap
page read and write
17496460000
trusted library allocation
page read and write
2980AD00000
heap
page read and write
1760784C000
heap
page read and write
2980AE64000
heap
page read and write
F42339D000
stack
page read and write
1749AEC9000
heap
page read and write
1749ADB3000
heap
page read and write
1749ADFB000
heap
page read and write
1749AC61000
heap
page read and write
1749AEA3000
heap
page read and write
222B637D000
heap
page read and write
2B550DC0000
trusted library allocation
page read and write
1749A7B0000
trusted library allocation
page read and write
1749A7F0000
trusted library allocation
page read and write
1749AE94000
heap
page read and write
1749AC2F000
heap
page read and write
2980AE79000
heap
page read and write
222B6394000
heap
page read and write
1749A63C000
trusted library allocation
page read and write
1749AF66000
heap
page read and write
1749AE45000
heap
page read and write
2B550C90000
trusted library allocation
page read and write
17495528000
heap
page read and write
FE2B1B000
stack
page read and write
1A1E0E61000
heap
page read and write
222B63A5000
heap
page read and write
1749A970000
remote allocation
page read and write
1749AD5B000
heap
page read and write
1749AD9D000
heap
page read and write
1749AC2F000
heap
page read and write
17496410000
trusted library section
page readonly
1749ADBF000
heap
page read and write
1A1E1602000
trusted library allocation
page read and write
1749AF98000
heap
page read and write
1749AE6D000
heap
page read and write
27D04913000
heap
page read and write
FE30FF000
stack
page read and write
2B550E00000
heap
page read and write
1749A62C000
trusted library allocation
page read and write
1749AD1F000
heap
page read and write
1749AFF2000
heap
page read and write
2B54BF18000
heap
page read and write
222B6802000
heap
page read and write
1749AFCA000
heap
page read and write
1A1E0C50000
heap
page read and write
27D04863000
heap
page read and write
17495D90000
trusted library allocation
page read and write
8D949FE000
stack
page read and write
225A0BD0000
heap
page read and write
545EEFF000
stack
page read and write
1749A810000
trusted library allocation
page read and write
1749AE40000
heap
page read and write
1749AEDA000
heap
page read and write
9795F7D000
stack
page read and write
EFBB7FE000
stack
page read and write
F42331B000
stack
page read and write
19EF2B30000
remote allocation
page read and write
1749A610000
trusted library allocation
page read and write
5C94CFE000
stack
page read and write
1749A642000
trusted library allocation
page read and write
1749ADA7000
heap
page read and write
1749ADD2000
heap
page read and write
1749AE7F000
heap
page read and write
1749AEAE000
heap
page read and write
1A1E0E4D000
heap
page read and write
222B5AA5000
heap
page read and write
1749A638000
trusted library allocation
page read and write
202F4DB0000
heap
page read and write
1749AD27000
heap
page read and write
1749AF1C000
heap
page read and write
8D946FE000
stack
page read and write
1749AED1000
heap
page read and write
1749ADD2000
heap
page read and write
202F5013000
heap
page read and write
1749AEB0000
heap
page read and write
222B639C000
heap
page read and write
222B5A63000
heap
page read and write
1A1E0F13000
heap
page read and write
1749AF54000
heap
page read and write
222B5A00000
heap
page read and write
26969F25000
heap
page read and write
1749A7A4000
trusted library allocation
page read and write
2B550B80000
trusted library allocation
page read and write
1749AD07000
heap
page read and write
1749AEFC000
heap
page read and write
1749A640000
trusted library allocation
page read and write
26969BE7000
heap
page read and write
222B639C000
heap
page read and write
2B54BF13000
heap
page read and write
EFBB47E000
stack
page read and write
1749AE85000
heap
page read and write
1749AC69000
heap
page read and write
9795D7F000
stack
page read and write
1749A64A000
trusted library allocation
page read and write
222B6300000
heap
page read and write
27D047D0000
trusted library allocation
page read and write
222B5B02000
heap
page read and write
1749AC55000
heap
page read and write
28979A77000
heap
page read and write
1749AE4C000
heap
page read and write
2B54B902000
heap
page read and write
222B6844000
heap
page read and write
1749AE83000
heap
page read and write
F2D356C000
stack
page read and write
1749AE44000
heap
page read and write
FE3AFD000
stack
page read and write
28979850000
heap
page read and write
225A0C72000
heap
page read and write
259E8463000
heap
page read and write
1749ADAE000
heap
page read and write
174963F0000
trusted library section
page readonly
174957C6000
heap
page read and write
1A1E0E3C000
heap
page read and write
1749AF31000
heap
page read and write
1749AE71000
heap
page read and write
26969BE6000
heap
page read and write
1749AE26000
heap
page read and write
1749556F000
heap
page read and write
1A1E0CB0000
heap
page read and write
17496441000
trusted library allocation
page read and write
1A1E0F00000
heap
page read and write
2B550EE3000
heap
page read and write
202F4E20000
heap
page read and write
9795AFE000
stack
page read and write
1749AC61000
heap
page read and write
1749A830000
trusted library allocation
page read and write
1749AD4E000
heap
page read and write
1749AFEB000
heap
page read and write
2B550CB4000
trusted library allocation
page read and write
2B54C790000
trusted library section
page readonly
222B5B13000
heap
page read and write
2B550EFD000
heap
page read and write
1749AE73000
heap
page read and write
1749AC2F000
heap
page read and write
1749AE4E000
heap
page read and write
1749ADB6000
heap
page read and write
1749AC2D000
heap
page read and write
1749AE8A000
heap
page read and write
1749AE55000
heap
page read and write
222B5A61000
heap
page read and write
3D9197F000
stack
page read and write
1749AF24000
heap
page read and write
174957C7000
heap
page read and write
1749574C000
heap
page read and write
1749AC50000
heap
page read and write
1749A470000
trusted library allocation
page read and write
19EF2340000
heap
page read and write
17495500000
heap
page read and write
1749AF0A000
heap
page read and write
1749AD52000
heap
page read and write
259E8459000
heap
page read and write
1749AF7C000
heap
page read and write
There are 1203 hidden memdumps, click here to show them.