IOC Report
12-09-2022 S#U0130PAR#U0130#U015e.docx.doc

loading gif

Files

File Path
Type
Category
Malicious
12-09-2022 S#U0130PAR#U0130#U015e.docx.doc
Microsoft Word 2007+
initial sample
malicious
C:\Users\user\AppData\Local\Temp\a0v2H8.jar
Zip archive data, at least v2.0 to extract
dropped
malicious
C:\ProgramData\Oracle\Java\.oracle_jre_usage\cce3fe3b0d8d83e2.timestamp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\C084E00E-2C37-4DA2-8B52-BBC9C24B7D11
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\6B8F5552.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\E748012B.png
PNG image data, 706 x 366, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\a0v2H8.jar:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\12-09-2022 S.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Aug 16 20:38:44 2022, mtime=Mon Sep 12 19:53:09 2022, atime=Mon Sep 12 19:53:04 2022, length=258604, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\~$-09-2022 S#U0130PAR#U0130#U015e.docx.doc
data
dropped
C:\ProgramData\Oracle\Java\.oracle_jre_usage\17dfc292991c7c05.timestamp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\37821B9D.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5AF0F4FA.png
PNG image data, 706 x 366, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8C420CB3.PNG
PNG image data, 1037 x 72, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{D598F5A9-41E1-44C7-8D38-8B82E1D2FAA1}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4FFCC0C1-FAE9-48A2-A197-5DE81C053074}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D9320A51-5E17-41AC-AA14-257027C1CCDA}.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\12-09-2022 S#U0130PAR#U0130#U015e.docx.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:52 2022, mtime=Tue Mar 8 15:45:52 2022, atime=Mon Sep 12 19:45:10 2022, length=258604, window=hide
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe
"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe" -jar "C:\Users\user\AppData\Local\Temp\a0v2H8.jar"
malicious
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic CPU get ProcessorId
malicious
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic bios get serialnumber
malicious
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic csproduct get name
malicious
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic csproduct get UUID
malicious
C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe
"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe" -jar "C:\Users\user\AppData\Local\Temp\a0v2H8.jar"
malicious
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic CPU get ProcessorId
malicious
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic bios get serialnumber
malicious
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic csproduct get name
malicious
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic csproduct get UUID
malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Java\jre1.8.0_121\bin\javaw.exe
"C:\Program Files\Java\jre1.8.0_121\bin\javaw.exe" -jar "C:\Users\user\AppData\Local\Temp\a0v2H8.jar"
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic CPU get ProcessorId
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic bios get serialnumber
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get name
malicious
C:\Program Files\Java\jre1.8.0_121\bin\javaw.exe
"C:\Program Files\Java\jre1.8.0_121\bin\javaw.exe" -jar "C:\Users\user\AppData\Local\Temp\a0v2H8.jar"
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get UUID
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic CPU get ProcessorId
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic bios get serialnumber
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get name
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get UUID
malicious
C:\Windows\splwow64.exe
C:\Windows\splwow64.exe 12288
C:\Windows\SysWOW64\icacls.exe
C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c ver
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c ver
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 27 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://java.sun.com/xml/dom/properties/(
unknown
http://apache.org/xml/features/validation/schema/augment-psvi
unknown
https://shell.suite.office.com:1443
unknown
http://xml.org/sax/features/use-entity-resolver2S
unknown
http://apache.org/xml/properties/input-buffer-size
unknown
https://autodiscover-s.outlook.com/
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
http://apache.org/xml/properties/internal/document-scanner=
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
http://java.sun.com/dtd/properties.dtdS
unknown
http://apache.org/xml/properties/schema/external-schemaLocation(
unknown
http://apache.org/xml/features/standard-uri-conformantxe2
unknown
http://apache.org/xml/properties/internal/entity-manager
unknown
http://apache.org/xml/properties/internal/symbol-tableQ
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
http://apache.org/xml/features/internal/parser-settings
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
http://apache.org/xml/features/dom/include-ignorable-whitespace
unknown
http://apache.org/xml/properties/internal/document-scanner7
unknown
https://api.aadrm.com/
unknown
http://java.sun.com/xml/dom/properties/
unknown
http://apache.org/xml/properties/internal/stax-entity-resolver
unknown
http://xml.org/sax/features/namespacessZ
unknown
http://xml.org/sax/properties/3
unknown
http://java.sun.com/dtd/properties.dtd#
unknown
http://apache.org/xml/features/3
unknown
http://apache.org/xml/properties/internal/symbol-table#
unknown
http://apache.org/xml/features/xinclude/fixup-base-uris
unknown
http://apache.org/xml/properties/schema/external-noNamespaceSchemaLocation
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
http://apache.org/xml/properties/internal/error-reporter
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
http://apache.org/xml/properties/security-managerk
unknown
http://java.sun.com/xml/stream/properties/ignore-external-dtdkin
unknown
http://xml.org/sax/properties/(
unknown
http://apache.org/xml/features/include-comments
unknown
http://apache.org/xml/features/scanner/notify-char-refs
unknown
http://java.sun.com/xml/stream/properties/S
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
http://apache.org/xml/properties/dom/current-element-node9
unknown
https://tasks.office.com
unknown
http://apache.org/xml/features/disallow-doctype-declxcep
unknown
https://officeci.azurewebsites.net/api/
unknown
http://apache.org/xml/features/validation/schema/normalized-valueB
unknown
http://xml.org/sax/features/allow-dtd-events-after-endDTD#Y
unknown
https://my.microsoftpersonalcontent.com
unknown
http://apache.org/xml/features/continue-after-fatal-error
unknown
http://apache.org/xml/features/scanner/notify-builtin-refsK
unknown
http://apache.org/xml/features/standard-uri-conformant
unknown
http://apache.org/xml/properties/internal/document-scanner
unknown
https://store.office.cn/addinstemplate
unknown
http://apache.org/xml/properties/internal/datatype-validator-factoryh
unknown
https://messaging.engagement.office.com/
unknown
http://bugreport.sun.com/bugreport/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
http://java.oracle.com/
unknown
https://www.odwebp.svc.ms
unknown
http://apache.org/xml/features/
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
http://apache.org/xml/features/generate-synthetic-annotations
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
http://java.sun.com/xml/stream/properties/6
unknown
https://graph.windows.net
unknown
http://apache.org/xml/properties/internal/datatype-validator-factoryC.
unknown
http://xml.org/sax/features/allow-dtd-events-after-endDTD
unknown
http://apache.org/xml/features/internal/validation/schema/use-grammar-pool-only
unknown
http://apache.org/xml/features/validate-annotations3
unknown
http://java.sun.com/dtd/properties.dtdc
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
http://apache.org/xml/features/s
unknown
http://apache.org/xml/properties/internal/namespace-binder
unknown
http://apache.org/xml/properties/internal/namespace-binder39
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
http://apache.org/xml/properties/dom/current-element-nodem
unknown
http://javax.xml.XMLConstants/property/accessExternalDTD;
unknown
https://ncus.contentsync.
unknown
http://xml.org/sax/features/allow-dtd-events-after-endDTDw=
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://apache.org/xml/properties/security-manager
unknown
http://weather.service.msn.com/data.aspx
unknown
http://java.sun.com/xml/dom/properties/ancestor-check
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
http://java.sun.com/xml/dom/properties/ancestor-checkour
unknown
http://apache.org/xml/features/validation/balance-syntax-trees1
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
http://apache.org/xml/properties/internal/xinclude-handler=
unknown
https://wus2.contentsync.
unknown
http://javax.xml.XMLConstants/property/accessExternalSchemak
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
http://apache.org/xml/features/create-cdata-nodes:
unknown
http://apache.org/xml/features/xinclude
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
http://apache.org/xml/properties/input-buffer-sizec
unknown
http://javax.xml.XMLConstants/property/accessExternalSchemas3p
unknown
http://apache.org/xml/features/dom/create-entity-ref-nodes
unknown
http://apache.org/xml/features/validation/dynamic
unknown
http://java.sun.com/xml/schema/features/
unknown
http://xml.org/sax/features/tream$PutFie
unknown
http://apache.org/xml/properties/internal/validator/dtd
unknown
http://apache.org/xml/properties/internal/datatype-validator-factory
unknown
http://apache.org/xml/properties/internal/validator/schema
unknown
http://apache.org/xml/features/internal/parser-settingss8q
unknown
http://apache.org/xml/features/internal/tolerate-duplicatesO
unknown
http://apache.org/xml/features/validate-annotations
unknown
http://apache.org/xml/features/standard-uri-conformantK
unknown
http://java.oracle.com/sha
unknown
http://apache.org/xml/properties/internal/namespace-contextV
unknown
http://apache.org/xml/features/dom/create-entity-ref-nodes?
unknown
http://apache.org/xml/properties/internal/dtd-processor
unknown
http://apache.org/xml/features/namespace-growth
unknown
http://apache.org/xml/properties/dom/document-class-name$
unknown
http://xml.org/sax/features/allow-dtd-events-after-endDTD=
unknown
http://apache.org/xml/features/create-cdata-nodes
unknown
http://apache.org/xml/properties/internal/document-scannerk
unknown
http://javax.xml.XMLConstants/property/accessExternalDTDs
unknown
http://apache.org/xml/features/scanner/notify-char-refs3
unknown
http://apache.org/xml/features/xinclude/fixup-base-uris6
unknown
http://javax.xml.XMLConstants/feature/secure-processing
unknown
http://apache.org/xml/properties/internal/grammar-pool6
unknown
http://apache.org/xml/properties/internal/namespace-context
unknown
http://apache.org/xml/features/warn-on-duplicate-entitydef
unknown
http://apache.org/xml/features/;
unknown
http://ipinfo.io/
unknown
http://java.sun.com/dtd/properties.dtd3
unknown
http://apache.org/xml/features/scanner/notify-char-refsC
unknown
http://javax.xml.XMLConstants/property/accessExternalSchema
unknown
http://java.sun.com/xml/schema/features/report-ignored-element-content-whitespace;
unknown
http://apache.org/xml/features/internal/tolerate-duplicatesY
unknown
http://java.sun.com/xml/schema/features/report-ignored-element-content-whitespace0
unknown
http://java.sun.com/xml/stream/properties/report-cdata-event
unknown
http://apache.org/xml/features/nonvalidating/load-external-dtd:
unknown
http://apache.org/xml/properties/internal/validation/schema/dv-factory7
unknown
http://xml.org/sax/features/use-entity-resolver2
unknown
http://apache.org/xml/properties/internal/entity-resolver
unknown
http://xml.org/sax/properties/C
unknown
http://apache.org/xml/features/standard-uri-conformanter2
unknown
http://java.sun.com/dtd/properties.dtd
unknown
http://apache.org/xml/features/validation/balance-syntax-trees
unknown
http://java.sun.com/xml/stream/properties/ignore-external-dtdV
unknown
http://apache.org/xml/features/include-comments0
unknown
http://apache.org/xml/properties/schema/external-noNamespaceSchemaLocation;
unknown
http://apache.org/xml/features/validation/balance-syntax-treesK
unknown
http://ipinfo.io/ipX
unknown
http://apache.org/xml/features/validation/schema/augment-psviK
unknown
http://apache.org/xml/properties/internal/namespace-contextk5p
unknown
http://xml.org/sax/features/validation
unknown
http://apache.org/xml/features/scanner/notify-builtin-refs7
unknown
http://apache.org/xml/properties/internal/namespace-context:
unknown
http://apache.org/xml/properties/internal/xinclude-handler
unknown
http://apache.org/xml/features/validation/schema/augment-psvic
unknown
http://apache.org/xml/features/namespace-growthK
unknown
http://java.sun.com/xml/stream/properties/
unknown
http://www.oracle.com/feature/use-service-mechanismjectI
unknown
http://apache.org/xml/features/validation/schema
unknown
http://apache.org/xml/properties/internal/dtd-scanner
unknown
http://apache.org/xml/features/validation/warn-on-undeclared-elemdefs
unknown
http://apache.org/xml/properties/schema/external-schemaLocation
unknown
http://xml.org/sax/features/
unknown
http://apache.org/xml/properties/internal/error-handler
unknown
http://apache.org/xml/features/validation/schema-full-checkingP
unknown
There are 157 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
>.
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
>.
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
oa.
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
}f.
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\1C85D
1C85D
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\packager.dll,-3017
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\packager.dll,-3018
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe.ApplicationCompany
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2649D
2649D
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jar\OpenWithProgids
jarfile
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\fsquirt.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\fsquirt.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2649D
2649D
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
sw+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
yy+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
;{+
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6584D
6584D
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\GDIPlus
FontCachePath
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@%SystemRoot%\system32\packager.dll,-3017
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@%SystemRoot%\system32\packager.dll,-3018
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
HKEY_CURRENT_USER_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\WFS.exe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6DAA6
6DAA6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\6DAA6
6DAA6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
There are 407 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4F88000
trusted library allocation
page read and write
malicious
458C000
trusted library allocation
page read and write
malicious
D14000
trusted library allocation
page read and write
7A0000
heap
page read and write
395F000
stack
page read and write
382A000
trusted library allocation
page read and write
2A8D000
heap
page read and write
15340000
trusted library allocation
page read and write
455A000
trusted library allocation
page read and write
21DD8600000
heap
page read and write
61E000
stack
page read and write
15EB9A52000
heap
page read and write
45AF000
trusted library allocation
page read and write
3410000
heap
page read and write
1080000
trusted library allocation
page read and write
2564DC6A000
heap
page read and write
A356000
trusted library allocation
page read and write
2CC2000
heap
page read and write
1590F000
trusted library allocation
page read and write
2CA1000
heap
page read and write
507A000
trusted library allocation
page read and write
1557E000
stack
page read and write
4D21000
trusted library allocation
page read and write
144DF000
unkown
page read and write
3C8027E000
stack
page read and write
995F000
trusted library allocation
page read and write
2BB1E257000
heap
page read and write
4E00000
trusted library allocation
page read and write
162E0000
trusted library allocation
page read and write
CB26EFF000
stack
page read and write
3775000
trusted library allocation
page read and write
92F000
stack
page read and write
1ED57D54000
heap
page read and write
5340000
trusted library allocation
page read and write
30BB000
heap
page read and write
1ED57D02000
heap
page read and write
3080000
heap
page read and write
2C52000
heap
page read and write
1ED57653000
heap
page read and write
25249613000
heap
page read and write
1ED57667000
heap
page read and write
21DD8677000
heap
page read and write
25F8AFF000
stack
page read and write
32B0000
trusted library allocation
page read and write
25249410000
heap
page read and write
47A7000
trusted library allocation
page read and write
4934000
trusted library allocation
page read and write
51EF000
stack
page read and write
4A40000
trusted library allocation
page read and write
3C7FFCC000
stack
page read and write
1A7721E0000
heap
page read and write
2A60000
heap
page read and write
308D000
heap
page read and write
391D000
trusted library allocation
page read and write
1ED57673000
heap
page read and write
381A000
heap
page read and write
2A80000
trusted library allocation
page read and write
1ED57C02000
heap
page read and write
20CD0020000
heap
page read and write
812247E000
stack
page read and write
2AA5000
heap
page read and write
3B8000
stack
page read and write
2CD2000
heap
page read and write
51A5000
trusted library allocation
page read and write
2E76000
trusted library allocation
page read and write
317E000
stack
page read and write
32E8000
heap
page read and write
4812000
trusted library allocation
page read and write
2AB5000
heap
page read and write
3151000
heap
page read and write
2454000
trusted library allocation
page execute and read and write
2A9E000
heap
page read and write
211E3429000
heap
page read and write
2DAB000
trusted library allocation
page read and write
15A31000
trusted library allocation
page read and write
3C8077E000
stack
page read and write
51DC000
trusted library allocation
page read and write
397F000
stack
page read and write
15EB9B00000
heap
page read and write
3829000
trusted library allocation
page read and write
252495A0000
remote allocation
page read and write
47AC000
trusted library allocation
page read and write
BEC000
stack
page read and write
48DE000
stack
page read and write
750000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
21DD8670000
heap
page read and write
48AF000
stack
page read and write
30A4000
heap
page read and write
378B000
trusted library allocation
page read and write
211E3360000
trusted library allocation
page read and write
211E3400000
heap
page read and write
D07000
trusted library allocation
page read and write
9ADE000
trusted library allocation
page read and write
2EAF000
trusted library allocation
page read and write
2564DC7E000
heap
page read and write
4C40000
heap
page read and write
4B1E000
stack
page read and write
162D0000
trusted library allocation
page read and write
2DB8000
stack
page read and write
3830000
trusted library allocation
page read and write
1ED57D22000
heap
page read and write
3081000
heap
page read and write
77E000
stack
page read and write
6D8000
stack
page read and write
2CE5000
heap
page read and write
161F0000
heap
page read and write
15EAE000
unkown
page read and write
2C8F000
heap
page read and write
21DD8640000
heap
page read and write
1ED57629000
heap
page read and write
52A2000
trusted library allocation
page read and write
20CD025F000
heap
page read and write
86E000
stack
page read and write
158BB000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
3777000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
31C9000
trusted library allocation
page read and write
5320000
heap
page read and write
2C91000
heap
page read and write
CB26FFF000
stack
page read and write
5220000
trusted library allocation
page read and write
2E7D000
trusted library allocation
page read and write
159F2000
trusted library allocation
page read and write
4B0F000
stack
page read and write
FAD9DFF000
stack
page read and write
377D000
trusted library allocation
page read and write
2B20000
heap
page read and write
4D28000
trusted library allocation
page read and write
2BB1E0B0000
heap
page read and write
2CC2000
heap
page read and write
2564DC74000
heap
page read and write
4A8F000
stack
page read and write
2AB8000
heap
page read and write
328E000
stack
page read and write
2564DC4E000
heap
page read and write
309F000
heap
page read and write
9AF1000
trusted library allocation
page read and write
1ED57600000
heap
page read and write
49D8000
trusted library allocation
page read and write
23FA000
trusted library allocation
page execute and read and write
21DD8702000
heap
page read and write
3828000
trusted library allocation
page read and write
69E000
stack
page read and write
327E000
stack
page read and write
5311000
trusted library allocation
page read and write
2FF7000
heap
page read and write
5074000
trusted library allocation
page read and write
15906000
trusted library allocation
page read and write
3C802FE000
stack
page read and write
4814000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
46DB000
trusted library allocation
page read and write
23C2000
trusted library allocation
page execute and read and write
43E7C7E000
stack
page read and write
5368000
trusted library allocation
page read and write
2E83000
trusted library allocation
page read and write
5350000
heap
page read and write
15931000
trusted library allocation
page read and write
43E77FB000
stack
page read and write
31D0000
heap
page read and write
49D8000
trusted library allocation
page read and write
307E000
heap
page read and write
381A000
heap
page read and write
1591E000
trusted library allocation
page read and write
3920000
trusted library allocation
page read and write
529F000
trusted library allocation
page read and write
15EF0000
trusted library allocation
page execute read
4A4E000
stack
page read and write
50EE000
stack
page read and write
2D95000
heap
page read and write
211E3461000
heap
page read and write
2C5A000
heap
page read and write
2FF6000
heap
page read and write
A509000
trusted library allocation
page read and write
2CB3000
heap
page read and write
2E43000
trusted library allocation
page execute and read and write
31AC000
stack
page read and write
304F000
heap
page read and write
3179000
heap
page read and write
30BF000
heap
page read and write
2564DC58000
heap
page read and write
2A92000
heap
page read and write
10C5000
heap
page read and write
7CB000
heap
page read and write
2564DC6F000
heap
page read and write
15EB9A2A000
heap
page read and write
4D28000
trusted library allocation
page read and write
15E50000
heap
page read and write
A3F3000
trusted library allocation
page read and write
1A7721D0000
heap
page read and write
E0A000
trusted library allocation
page read and write
3910000
trusted library allocation
page read and write
15EB9A4E000
heap
page read and write
2405000
trusted library allocation
page execute and read and write
6FE000
stack
page read and write
A4F8000
trusted library allocation
page read and write
154EC000
trusted library allocation
page read and write
39BE000
stack
page read and write
2A92000
heap
page read and write
1590D000
trusted library allocation
page read and write
51AF000
stack
page read and write
FC000
stack
page read and write
4A48000
trusted library allocation
page read and write
147A8FF000
stack
page read and write
158E5000
trusted library allocation
page read and write
25249629000
heap
page read and write
309F000
heap
page read and write
5222000
trusted library allocation
page read and write
15EB9A92000
heap
page read and write
3416000
heap
page read and write
3188000
heap
page read and write
14D29000
trusted library allocation
page read and write
31C4000
trusted library allocation
page read and write
2A6E000
heap
page read and write
A4A2000
trusted library allocation
page read and write
2CDB000
heap
page read and write
2EAA000
trusted library allocation
page read and write
211E343C000
heap
page read and write
63D000
stack
page read and write
161F4000
heap
page read and write
2A92000
heap
page read and write
3071000
heap
page read and write
3060000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
2DBE000
stack
page read and write
827000
heap
page read and write
32FA000
heap
page read and write
1ED57D94000
heap
page read and write
1A772230000
heap
page read and write
31B5000
heap
page read and write
9997000
trusted library allocation
page read and write
15EB9B13000
heap
page read and write
51D7000
trusted library allocation
page read and write
15EB9840000
heap
page read and write
11D8000
heap
page read and write
3810000
heap
page read and write
2D96000
trusted library allocation
page read and write
3846000
trusted library allocation
page read and write
4F3D000
trusted library allocation
page read and write
481F000
stack
page read and write
3412000
heap
page read and write
4E9F000
stack
page read and write
3810000
heap
page read and write
15E4E000
stack
page read and write
7E0000
heap
page read and write
2EB0000
trusted library allocation
page read and write
5B0000
heap
page read and write
2A7E000
stack
page read and write
316F000
heap
page read and write
2B00000
heap
page read and write
211E3513000
heap
page read and write
2EA0000
trusted library allocation
page read and write
380E000
stack
page read and write
3914000
trusted library allocation
page read and write
1590D000
trusted library allocation
page read and write
3140000
heap
page read and write
1F0000
trusted library allocation
page read and write
3819000
heap
page read and write
32EC000
heap
page read and write
2DFE000
stack
page read and write
3831000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
31C6000
trusted library allocation
page read and write
341C000
heap
page read and write
2AFE000
stack
page read and write
3850000
trusted library allocation
page read and write
15EB9FA0000
trusted library allocation
page read and write
1ED5762E000
heap
page read and write
2CC6000
heap
page read and write
21DD8713000
heap
page read and write
82A000
heap
page read and write
21DD8E02000
trusted library allocation
page read and write
3080000
heap
page read and write
878000
stack
page read and write
15EB9A13000
heap
page read and write
2D97000
trusted library allocation
page read and write
316E000
heap
page read and write
33CD000
heap
page read and write
2CAF000
heap
page read and write
2400000
trusted library allocation
page execute and read and write
2AF0000
trusted library allocation
page read and write
2CCF000
heap
page read and write
1ED57DB1000
heap
page read and write
1ED57D00000
heap
page read and write
2AAB000
heap
page read and write
4950000
trusted library allocation
page read and write
1ED57656000
heap
page read and write
76A827E000
stack
page read and write
1A772402000
heap
page read and write
53C1000
trusted library allocation
page read and write
3172000
heap
page read and write
15EB9A3C000
heap
page read and write
46EF000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
CB2647B000
stack
page read and write
99FB000
trusted library allocation
page read and write
2CDF000
heap
page read and write
5333000
trusted library allocation
page read and write
15EB9A4C000
heap
page read and write
378E000
stack
page read and write
CB268FB000
stack
page read and write
16370000
trusted library allocation
page read and write
31D3000
trusted library allocation
page read and write
3077000
heap
page read and write
65F000
stack
page read and write
154FB000
trusted library allocation
page read and write
CB270FE000
stack
page read and write
3148000
heap
page read and write
3845000
trusted library allocation
page read and write
2CC6000
heap
page read and write
771000
heap
page read and write
3440000
trusted library allocation
page read and write
1EF000
stack
page read and write
30A4000
heap
page read and write
4678000
trusted library allocation
page read and write
A50E000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
69E000
stack
page read and write
630000
heap
page read and write
2CDF000
heap
page read and write
4B4E000
stack
page read and write
25249570000
trusted library allocation
page read and write
2C56000
heap
page read and write
489E000
trusted library allocation
page read and write
81226FD000
stack
page read and write
81222FF000
stack
page read and write
CB26CFF000
stack
page read and write
15EB9A88000
heap
page read and write
2D96000
trusted library allocation
page read and write
76A867E000
stack
page read and write
159ED000
trusted library allocation
page read and write
2A90000
heap
page read and write
A4A4000
trusted library allocation
page read and write
2CBE000
heap
page read and write
3087000
heap
page read and write
1646E000
unkown
page read and write
15EB9A8A000
heap
page read and write
34F0000
heap
page read and write
4CE8000
trusted library allocation
page read and write
2BB1E213000
heap
page read and write
2D95000
trusted library allocation
page read and write
5368000
trusted library allocation
page read and write
489F000
stack
page read and write
480F000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
2BB1E280000
heap
page read and write
2CC1000
heap
page read and write
314E000
heap
page read and write
50EB000
trusted library allocation
page read and write
318B000
heap
page read and write
3829000
trusted library allocation
page read and write
5318000
trusted library allocation
page read and write
25249400000
heap
page read and write
2564DC5A000
heap
page read and write
32F7000
heap
page read and write
2DEA000
trusted library allocation
page execute and read and write
211E3466000
heap
page read and write
2564DAA0000
heap
page read and write
43E7A77000
stack
page read and write
6A0000
heap
page read and write
53C4000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
D3D000
trusted library allocation
page read and write
1ED57B90000
trusted library allocation
page read and write
4CE4000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
43E797B000
stack
page read and write
46FF000
trusted library allocation
page read and write
111E000
stack
page read and write
2564DC3A000
heap
page read and write
78F000
heap
page read and write
15EB9A49000
heap
page read and write
4CE1000
trusted library allocation
page read and write
2ECD000
stack
page read and write
5210000
heap
page read and write
1599E000
unkown
page read and write
6A5000
heap
page read and write
2564DC31000
heap
page read and write
391E000
trusted library allocation
page read and write
147A5FB000
stack
page read and write
46C7000
trusted library allocation
page read and write
2AAA000
heap
page read and write
2DA8000
stack
page read and write
70D000
heap
page read and write
82A000
heap
page read and write
1A772452000
heap
page read and write
1A772A02000
trusted library allocation
page read and write
159D3000
trusted library allocation
page read and write
4ACE000
stack
page read and write
20CD027C000
heap
page read and write
2C87000
heap
page read and write
1594E000
stack
page read and write
252495A0000
remote allocation
page read and write
21DD8666000
heap
page read and write
211E348A000
heap
page read and write
1A77241F000
heap
page read and write
37CF000
stack
page read and write
7C0000
heap
page read and write
2AA9000
heap
page read and write
107E000
stack
page read and write
3774000
trusted library allocation
page read and write
7C5000
heap
page read and write
308C000
heap
page read and write
FAD9BF7000
stack
page read and write
2C50000
heap
page read and write
1ED57E23000
heap
page read and write
79B000
heap
page read and write
2564E260000
trusted library allocation
page read and write
2564DC7A000
heap
page read and write
49D8000
trusted library allocation
page read and write
3816000
heap
page read and write
150E0000
trusted library allocation
page read and write
2AA5000
heap
page read and write
1A77242F000
heap
page read and write
760000
heap
page read and write
2C53000
heap
page read and write
15914000
trusted library allocation
page read and write
15939000
trusted library allocation
page read and write
3A36000
heap
page read and write
15964000
trusted library allocation
page read and write
2F2C000
heap
page read and write
156EF000
unkown
page read and write
CB26BFD000
stack
page read and write
2FFA000
heap
page read and write
15939000
trusted library allocation
page read and write
20CD0313000
heap
page read and write
25249640000
heap
page read and write
822000
heap
page read and write
382E000
trusted library allocation
page read and write
A350000
trusted library allocation
page read and write
1448E000
stack
page read and write
4FA7000
trusted library allocation
page read and write
3779000
trusted library allocation
page read and write
2E7E000
trusted library allocation
page read and write
3780000
trusted library allocation
page read and write
D4C000
trusted library allocation
page read and write
2C4E000
stack
page read and write
2CF8000
stack
page read and write
158C7000
trusted library allocation
page read and write
15931000
trusted library allocation
page read and write
7A9000
heap
page read and write
7A2000
heap
page read and write
3A37000
heap
page read and write
1ED575E0000
trusted library allocation
page read and write
16368000
trusted library allocation
page read and write
1ED57D22000
heap
page read and write
382D000
trusted library allocation
page read and write
4B70000
heap
page read and write
1ED57613000
heap
page read and write
513E000
stack
page read and write
2B4E000
stack
page read and write
2DE2000
trusted library allocation
page execute and read and write
3A3A000
heap
page read and write
3848000
trusted library allocation
page read and write
2564DC84000
heap
page read and write
2D70000
heap
page read and write
2FAF000
stack
page read and write
2CE5000
heap
page read and write
50F0000
trusted library allocation
page read and write
76A82FE000
stack
page read and write
2D60000
trusted library allocation
page read and write
324E000
stack
page read and write
3088000
heap
page read and write
241FE7E000
stack
page read and write
11C0000
trusted library allocation
page read and write
2D90000
heap
page read and write
2B28000
heap
page read and write
1ED577E6000
heap
page read and write
7A7000
heap
page read and write
7C5000
heap
page read and write
6A0000
trusted library allocation
page read and write
2BB1E302000
heap
page read and write
20CD0257000
heap
page read and write
2564DC27000
heap
page read and write
15EB9A53000
heap
page read and write
516E000
stack
page read and write
15EB9A00000
heap
page read and write
1ED57692000
heap
page read and write
2F20000
heap
page read and write
3093000
heap
page read and write
377A000
trusted library allocation
page read and write
A3ED000
trusted library allocation
page read and write
76E000
heap
page read and write
51FF000
stack
page read and write
2E70000
trusted library allocation
page read and write
211E3330000
heap
page read and write
43E76FE000
stack
page read and write
453D000
trusted library allocation
page read and write
791000
heap
page read and write
2AB0000
unkown
page read and write
823000
heap
page read and write
7A8000
heap
page read and write
3779000
trusted library allocation
page read and write
2CB0000
heap
page read and write
15931000
trusted library allocation
page read and write
3038000
stack
page read and write
76A877F000
stack
page read and write
69C000
stack
page read and write
2CC8000
heap
page read and write
C78000
trusted library allocation
page read and write
32C0000
heap
page read and write
2CE8000
heap
page read and write
2BB1E200000
heap
page read and write
3820000
trusted library allocation
page read and write
2D9A000
trusted library allocation
page read and write
211E3C02000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
2564DA90000
heap
page read and write
20CD025C000
heap
page read and write
4A41000
trusted library allocation
page read and write
211E32C0000
heap
page read and write
150CE000
stack
page read and write
159A0000
trusted library allocation
page read and write
20CD023C000
heap
page read and write
FAD956B000
stack
page read and write
15F20000
trusted library allocation
page read and write
342C000
heap
page read and write
309A000
heap
page read and write
3070000
heap
page read and write
2F28000
heap
page read and write
76A7FEB000
stack
page read and write
53C8000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
97E000
stack
page read and write
3828000
trusted library allocation
page read and write
2CD7000
heap
page read and write
32ED000
heap
page read and write
2A8D000
heap
page read and write
2564DC56000
heap
page read and write
2AB0000
heap
page read and write
2FF0000
heap
page read and write
4BDF000
stack
page read and write
158A0000
trusted library allocation
page read and write
147A6F7000
stack
page read and write
3817000
heap
page read and write
2EA8000
trusted library allocation
page read and write
1ED57681000
heap
page read and write
11B0000
heap
page read and write
2DA2000
trusted library allocation
page read and write
2CBC000
stack
page read and write
469E000
trusted library allocation
page read and write
2C90000
heap
page read and write
20CD028A000
heap
page read and write
1596B000
trusted library allocation
page read and write
21DD865B000
heap
page read and write
32F0000
heap
page read and write
32ED000
stack
page read and write
3380000
trusted library allocation
page read and write
21DD8679000
heap
page read and write
3A00000
heap
page read and write
7C5000
heap
page read and write
11D0000
heap
page read and write
50DA000
trusted library allocation
page read and write
3824000
trusted library allocation
page read and write
6EE000
stack
page read and write
D21000
trusted library allocation
page read and write
211E3480000
heap
page read and write
1ED57713000
heap
page read and write
4ADF000
stack
page read and write
4930000
heap
page read and write
384E000
trusted library allocation
page read and write
45DD000
trusted library allocation
page read and write
310000
heap
page read and write
51CF000
trusted library allocation
page read and write
50FF000
trusted library allocation
page read and write
9A9C000
trusted library allocation
page read and write
384D000
trusted library allocation
page read and write
211E348E000
heap
page read and write
7AC000
heap
page read and write
4B5F000
stack
page read and write
381C000
heap
page read and write
2CAD000
heap
page read and write
30A1000
heap
page read and write
32F2000
heap
page read and write
4E5E000
stack
page read and write
1577E000
unkown
page read and write
49D0000
trusted library allocation
page read and write
1ED57DC5000
heap
page read and write
79A000
heap
page read and write
3047000
heap
page read and write
CB2667B000
stack
page read and write
2CC6000
heap
page read and write
3419000
heap
page read and write
15972000
trusted library allocation
page read and write
3099000
heap
page read and write
2AB8000
heap
page read and write
2AA9000
heap
page read and write
4F0000
heap
page read and write
2DA0000
trusted library allocation
page execute and read and write
76A857E000
stack
page read and write
529F000
stack
page read and write
49D4000
trusted library allocation
page read and write
7BC000
stack
page read and write
65E000
stack
page read and write
20CD0300000
heap
page read and write
FAD9A7B000
stack
page read and write
3813000
heap
page read and write
25249702000
heap
page read and write
2564DC7B000
heap
page read and write
15EB97E0000
heap
page read and write
2AB8000
heap
page read and write
7BD000
heap
page read and write
25F89FF000
stack
page read and write
241F67B000
stack
page read and write
2564DC6D000
heap
page read and write
400000
heap
page read and write
2DAB000
trusted library allocation
page read and write
34FD000
heap
page read and write
306E000
heap
page read and write
2E7C000
heap
page read and write
15EB9A4F000
heap
page read and write
49A0000
heap
page read and write
1ED57643000
heap
page read and write
501E000
trusted library allocation
page read and write
522E000
stack
page read and write
2D94000
trusted library allocation
page read and write
7C0000
trusted library allocation
page read and write
43E7D7F000
stack
page read and write
4DA0000
trusted library allocation
page read and write
15EB97D0000
heap
page read and write
2E7D000
heap
page read and write
47A1000
trusted library allocation
page read and write
1ED573B0000
heap
page read and write
930000
trusted library allocation
page read and write
23C0000
trusted library allocation
page execute and read and write
46C000
stack
page read and write
159ED000
trusted library allocation
page read and write
20CCFFB0000
heap
page read and write
51AB000
trusted library allocation
page read and write
1580E000
unkown
page read and write
25F877E000
stack
page read and write
21DD84E0000
heap
page read and write
1A772502000
heap
page read and write
25249E02000
trusted library allocation
page read and write
2564DC75000
heap
page read and write
241FF7A000
stack
page read and write
53E8000
trusted library allocation
page read and write
CB26DFF000
stack
page read and write
3C80677000
stack
page read and write
2AAA000
heap
page read and write
2D9F000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
A4E4000
trusted library allocation
page read and write
20CD0302000
heap
page read and write
76A847E000
stack
page read and write
211E3500000
heap
page read and write
33CE000
stack
page read and write
3782000
trusted library allocation
page read and write
492E000
trusted library allocation
page read and write
3413000
heap
page read and write
7C1000
heap
page read and write
2EAA000
trusted library allocation
page read and write
1ED57DD0000
heap
page read and write
147A27C000
stack
page read and write
2564DD02000
heap
page read and write
391B000
trusted library allocation
page read and write
2564DC29000
heap
page read and write
25249470000
heap
page read and write
4FDD000
trusted library allocation
page read and write
2E70000
heap
page read and write
21DD8613000
heap
page read and write
2FF2000
heap
page read and write
2DFC000
stack
page read and write
211E3508000
heap
page read and write
1ED57E28000
heap
page read and write
3C8057E000
stack
page read and write
2564DC57000
heap
page read and write
CB269FF000
stack
page read and write
768000
heap
page read and write
1ED57E02000
heap
page read and write
15EB9A70000
heap
page read and write
3052000
heap
page read and write
512F000
stack
page read and write
1572E000
stack
page read and write
15A30000
trusted library allocation
page read and write
306F000
heap
page read and write
525E000
stack
page read and write
6B5000
heap
page read and write
489C000
trusted library allocation
page read and write
342D000
heap
page read and write
3420000
heap
page read and write
3819000
heap
page read and write
47BE000
stack
page read and write
86F000
stack
page read and write
2C80000
heap
page read and write
20CD0254000
heap
page read and write
377D000
trusted library allocation
page read and write
45A9000
trusted library allocation
page read and write
378B000
trusted library allocation
page read and write
483E000
stack
page read and write
1A77243B000
heap
page read and write
3851000
trusted library allocation
page read and write
1565E000
unkown
page read and write
50B1000
trusted library allocation
page read and write
14F14000
trusted library allocation
page read and write
7B1000
heap
page read and write
33C0000
heap
page read and write
2564DB00000
heap
page read and write
47DE000
stack
page read and write
309A000
heap
page read and write
2E3B000
trusted library allocation
page execute and read and write
15414000
trusted library allocation
page read and write
2E78000
heap
page read and write
2DF0000
trusted library allocation
page read and write
8121CAB000
stack
page read and write
377F000
trusted library allocation
page read and write
15EB9A4B000
heap
page read and write
2BB1E24C000
heap
page read and write
9950000
trusted library allocation
page read and write
1A77243D000
heap
page read and write
20CD0228000
heap
page read and write
147A2FD000
stack
page read and write
152FE000
trusted library allocation
page read and write
2C57000
heap
page read and write
160AF000
unkown
page read and write
158BE000
stack
page read and write
3A33000
heap
page read and write
2DDA000
trusted library allocation
page execute and read and write
241FD7F000
stack
page read and write
47D6000
trusted library allocation
page read and write
7AD000
heap
page read and write
4400000
trusted library allocation
page read and write
4D24000
trusted library allocation
page read and write
2B00000
heap
page read and write
2FB0000
heap
page read and write
2C98000
trusted library allocation
page read and write
32E0000
heap
page read and write
31EC000
stack
page read and write
E70000
trusted library allocation
page read and write
2C98000
heap
page read and write
9B0B000
trusted library allocation
page read and write
47FF000
stack
page read and write
21DD8580000
trusted library allocation
page read and write
43E767E000
stack
page read and write
491F000
stack
page read and write
2413000
trusted library allocation
page execute and read and write
25F88F9000
stack
page read and write
391A000
trusted library allocation
page read and write
14E2A000
trusted library allocation
page read and write
2E74000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
2C9E000
heap
page read and write
2564DC41000
heap
page read and write
3915000
trusted library allocation
page read and write
3081000
heap
page read and write
20CD0802000
trusted library allocation
page read and write
31CE000
trusted library allocation
page read and write
2BB1E27E000
heap
page read and write
2CD2000
heap
page read and write
4D20000
trusted library allocation
page read and write
32F8000
heap
page read and write
332E000
stack
page read and write
827000
heap
page read and write
40000
heap
page read and write
32F6000
heap
page read and write
241F7FF000
stack
page read and write
31D5000
heap
page read and write
381A000
heap
page read and write
3330000
heap
page read and write
53C0000
trusted library allocation
page read and write
4C90000
heap
page read and write
2DDE000
trusted library allocation
page execute and read and write
3089000
heap
page read and write
245F000
trusted library allocation
page execute and read and write
2BB1E252000
heap
page read and write
2B2C000
heap
page read and write
1ED5767E000
heap
page read and write
1593B000
trusted library allocation
page read and write
21DD867F000
heap
page read and write
2BB1E870000
trusted library allocation
page read and write
700000
heap
page read and write
2CC6000
heap
page read and write
29CF000
stack
page read and write
7FE000
heap
page read and write
5082000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
730000
trusted library allocation
page read and write
31AE000
stack
page read and write
829000
heap
page read and write
9B10000
trusted library allocation
page read and write
2564DC47000
heap
page read and write
32F3000
heap
page read and write
15109000
trusted library allocation
page read and write
53E000
stack
page read and write
1A772413000
heap
page read and write
70C000
heap
page read and write
47CD000
trusted library allocation
page read and write
467A000
trusted library allocation
page read and write
2E75000
trusted library allocation
page read and write
31CD000
trusted library allocation
page read and write
3919000
trusted library allocation
page read and write
2CB3000
heap
page read and write
31CA000
trusted library allocation
page read and write
532D000
trusted library allocation
page read and write
2CB3000
heap
page read and write
3813000
heap
page read and write
21DD8550000
heap
page read and write
4CE8000
trusted library allocation
page read and write
6F0000
trusted library allocation
page read and write
241FAFC000
stack
page read and write
C60000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
2CBF000
heap
page read and write
1A772400000
heap
page read and write
15962000
trusted library allocation
page read and write
82A000
heap
page read and write
2564E402000
trusted library allocation
page read and write
3A32000
heap
page read and write
83C000
stack
page read and write
211E347E000
heap
page read and write
51CC000
trusted library allocation
page read and write
45FC000
trusted library allocation
page read and write
47C2000
trusted library allocation
page read and write
31D1000
trusted library allocation
page read and write
2D98000
trusted library allocation
page read and write
3C8087F000
stack
page read and write
211E32D0000
heap
page read and write
3330000
trusted library allocation
page read and write
34A0000
heap
page read and write
51E5000
trusted library allocation
page read and write
31C5000
trusted library allocation
page read and write
507C000
trusted library allocation
page read and write
19D000
stack
page read and write
1ED57E31000
heap
page read and write
382A000
trusted library allocation
page read and write
39FF000
stack
page read and write
1ED57676000
heap
page read and write
4A48000
trusted library allocation
page read and write
43E7B7D000
stack
page read and write
3826000
trusted library allocation
page read and write
9991000
trusted library allocation
page read and write
3181000
heap
page read and write
377B000
trusted library allocation
page read and write
3812000
heap
page read and write
7A6000
heap
page read and write
241F9FF000
stack
page read and write
211E3413000
heap
page read and write
4D28000
trusted library allocation
page read and write
20CD0308000
heap
page read and write
2B05000
heap
page read and write
2DA1000
trusted library allocation
page read and write
6B0000
heap
page read and write
7BD000
heap
page read and write
3916000
trusted library allocation
page read and write
240B000
trusted library allocation
page execute and read and write
4FFC000
trusted library allocation
page read and write
155CF000
unkown
page read and write
37C000
stack
page read and write
20CD028C000
heap
page read and write
CB26AFF000
stack
page read and write
3428000
heap
page read and write
30A0000
heap
page read and write
43E787F000
stack
page read and write
3850000
trusted library allocation
page read and write
53E1000
trusted library allocation
page read and write
485E000
stack
page read and write
479F000
trusted library allocation
page read and write
15BCE000
stack
page read and write
384A000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
81221FE000
stack
page read and write
3A30000
heap
page read and write
3200000
heap
page read and write
32D0000
trusted library allocation
page read and write
50CB000
trusted library allocation
page read and write
245C000
trusted library allocation
page execute and read and write
A3E0000
trusted library allocation
page read and write
4F57000
trusted library allocation
page read and write
3417000
heap
page read and write
15EB9A54000
heap
page read and write
2564DC62000
heap
page read and write
30B2000
heap
page read and write
3C0000
heap
page read and write
3098000
heap
page read and write
3918000
trusted library allocation
page read and write
51D1000
trusted library allocation
page read and write
2BB1E308000
heap
page read and write
2AA6000
heap
page read and write
31CD000
trusted library allocation
page read and write
1582E000
stack
page read and write
4B9E000
stack
page read and write
2564DC40000
heap
page read and write
5270000
heap
page read and write
5310000
trusted library allocation
page read and write
50AF000
stack
page read and write
2564DC67000
heap
page read and write
2AB6000
heap
page read and write
50DD000
trusted library allocation
page read and write
1ED57E13000
heap
page read and write
2F0E000
stack
page read and write
20CD0263000
heap
page read and write
147A7FF000
stack
page read and write
1444E000
unkown
page read and write
154F8000
trusted library allocation
page read and write
32F0000
heap
page read and write
15EB9A4A000
heap
page read and write
153CD000
trusted library allocation
page read and write
1ED57D6D000
heap
page read and write
20CD0266000
heap
page read and write
5A0000
heap
page read and write
29C0000
trusted library allocation
page read and write
1A772429000
heap
page read and write
7AC000
heap
page read and write
2E81000
trusted library allocation
page read and write
2D7C000
stack
page read and write
1ED573A0000
heap
page read and write
3080000
heap
page read and write
14AB0000
trusted library allocation
page read and write
806000
heap
page read and write
384A000
trusted library allocation
page read and write
5314000
trusted library allocation
page read and write
2EA8000
trusted library allocation
page read and write
3847000
trusted library allocation
page read and write
81223FD000
stack
page read and write
4E0000
heap
page read and write
2C59000
heap
page read and write
2ACE000
stack
page read and write
2E7D000
trusted library allocation
page read and write
330E000
stack
page read and write
2EB1000
trusted library allocation
page read and write
4818000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
32CE000
stack
page read and write
5320000
heap
page read and write
820000
heap
page read and write
31A0000
trusted library allocation
page read and write
2D00000
heap
page read and write
47CB000
trusted library allocation
page read and write
2524964A000
heap
page read and write
7A0000
unkown
page read and write
FEE000
stack
page read and write
25249637000
heap
page read and write
2D9F000
trusted library allocation
page read and write
7EE000
stack
page read and write
20CD022A000
heap
page read and write
21DD8602000
heap
page read and write
15939000
trusted library allocation
page read and write
826000
heap
page read and write
5226000
trusted library allocation
page read and write
49C0000
trusted library allocation
page read and write
1587E000
unkown
page read and write
4681000
trusted library allocation
page read and write
2AA0000
heap
page read and write
1590D000
unkown
page read and write
47AA000
trusted library allocation
page read and write
2C50000
heap
page read and write
211E3502000
heap
page read and write
10C0000
heap
page read and write
47D3000
trusted library allocation
page read and write
51E2000
trusted library allocation
page read and write
4A48000
trusted library allocation
page read and write
158A1000
trusted library allocation
page read and write
16348000
trusted library allocation
page read and write
2564DC60000
heap
page read and write
2BB1E300000
heap
page read and write
790000
heap
page read and write
5A8000
heap
page read and write
3812000
heap
page read and write
305E000
stack
page read and write
2CDF000
heap
page read and write
20CD0200000
heap
page read and write
1ED5778F000
heap
page read and write
21DD862A000
heap
page read and write
FAD9CFE000
stack
page read and write
B80000
heap
page read and write
2EA4000
trusted library allocation
page read and write
2AAB000
heap
page read and write
158DD000
trusted library allocation
page read and write
15934000
trusted library allocation
page read and write
521E000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
2A3E000
stack
page read and write
2CCC000
heap
page read and write
2A92000
heap
page read and write
7F0000
heap
page read and write
2B2D000
heap
page read and write
2CCC000
heap
page read and write
33CC000
heap
page read and write
2A68000
heap
page read and write
2BB1EA02000
trusted library allocation
page read and write
318F000
heap
page read and write
7A0000
heap
page read and write
49D1000
trusted library allocation
page read and write
25F831C000
stack
page read and write
53E8000
trusted library allocation
page read and write
3916000
trusted library allocation
page read and write
82C000
heap
page read and write
32F9000
heap
page read and write
2EAB000
trusted library allocation
page read and write
2D75000
heap
page read and write
2A8D000
heap
page read and write
34FC000
heap
page read and write
780000
heap
page read and write
81225FE000
stack
page read and write
15921000
trusted library allocation
page read and write
46B1000
trusted library allocation
page read and write
1641E000
stack
page read and write
3778000
trusted library allocation
page read and write
2564DC5C000
heap
page read and write
2BB1E24F000
heap
page read and write
2BB1E0A0000
heap
page read and write
381A000
heap
page read and write
377F000
trusted library allocation
page read and write
2564DC13000
heap
page read and write
2A5E000
stack
page read and write
103E000
stack
page read and write
317A000
heap
page read and write
1ED57DBD000
heap
page read and write
2BB1E229000
heap
page read and write
73F000
stack
page read and write
1ED57410000
heap
page read and write
157BE000
stack
page read and write
340F000
stack
page read and write
2FF9000
heap
page read and write
3817000
heap
page read and write
4A44000
trusted library allocation
page read and write
3817000
heap
page read and write
2C10000
trusted library allocation
page read and write
FAD997B000
stack
page read and write
25249600000
heap
page read and write
241FC7A000
stack
page read and write
7B0000
heap
page read and write
158FE000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
3921000
trusted library allocation
page read and write
2D99000
trusted library allocation
page read and write
21DD8624000
heap
page read and write
377A000
trusted library allocation
page read and write
51BE000
stack
page read and write
47C0000
trusted library allocation
page read and write
2E7A000
trusted library allocation
page read and write
2BB1E28B000
heap
page read and write
2DF2000
trusted library allocation
page execute and read and write
334C000
stack
page read and write
2CB3000
heap
page read and write
2564DC42000
heap
page read and write
43FE000
stack
page read and write
4558000
trusted library allocation
page read and write
2CE5000
heap
page read and write
15921000
trusted library allocation
page read and write
2CCD000
heap
page read and write
384D000
trusted library allocation
page read and write
2CC6000
heap
page read and write
51D0000
heap
page read and write
2B10000
trusted library allocation
page read and write
3919000
trusted library allocation
page read and write
15952000
trusted library allocation
page read and write
15EB9A51000
heap
page read and write
2D9B000
trusted library allocation
page read and write
CFD000
trusted library allocation
page read and write
4672000
trusted library allocation
page read and write
1ED5763C000
heap
page read and write
46CB000
trusted library allocation
page read and write
211E347E000
heap
page read and write
FAD95EE000
stack
page read and write
15E54000
heap
page read and write
1560E000
stack
page read and write
31C0000
trusted library allocation
page read and write
58E000
stack
page read and write
2BB1E110000
heap
page read and write
2A8B000
heap
page read and write
1605E000
stack
page read and write
14CE0000
trusted library allocation
page read and write
99E8000
trusted library allocation
page read and write
2FF3000
heap
page read and write
2E79000
trusted library allocation
page read and write
158D6000
trusted library allocation
page read and write
391A000
trusted library allocation
page read and write
7CA000
heap
page read and write
7C8000
heap
page read and write
812257D000
stack
page read and write
2DA2000
trusted library allocation
page execute and read and write
15EBA002000
trusted library allocation
page read and write
158B1000
trusted library allocation
page read and write
241F87F000
stack
page read and write
53E4000
trusted library allocation
page read and write
2D90000
heap
page read and write
2BB1E272000
heap
page read and write
309A000
heap
page read and write
33C8000
heap
page read and write
FAD9AFF000
stack
page read and write
3205000
heap
page read and write
2A1E000
stack
page read and write
521E000
stack
page read and write
29F0000
heap
page read and write
823000
heap
page read and write
51DA000
trusted library allocation
page read and write
D07000
trusted library allocation
page read and write
147A37F000
stack
page read and write
7AC000
heap
page read and write
3180000
trusted library allocation
page read and write
5318000
trusted library allocation
page read and write
1A772445000
heap
page read and write
241FB79000
stack
page read and write
3171000
heap
page read and write
2CC0000
heap
page read and write
2EA9000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
3920000
trusted library allocation
page read and write
4CE8000
trusted library allocation
page read and write
46DE000
trusted library allocation
page read and write
1ED5766E000
heap
page read and write
1ED57687000
heap
page read and write
2D10000
heap
page read and write
3840000
trusted library allocation
page read and write
20CD0213000
heap
page read and write
20CCFFC0000
heap
page read and write
15C1F000
unkown
page read and write
812217F000
stack
page read and write
2CDF000
heap
page read and write
310E000
stack
page read and write
4860000
heap
page read and write
14E90000
trusted library allocation
page read and write
5C9000
heap
page read and write
7E5000
heap
page read and write
2D6C000
stack
page read and write
7F7000
heap
page read and write
15916000
trusted library allocation
page read and write
25249651000
heap
page read and write
2E34000
trusted library allocation
page execute and read and write
2F2D000
heap
page read and write
E4C000
stack
page read and write
2CE2000
heap
page read and write
7AD000
heap
page read and write
CB267FE000
stack
page read and write
509C000
trusted library allocation
page read and write
3776000
trusted library allocation
page read and write
154FB000
trusted library allocation
page read and write
CFC000
trusted library allocation
page read and write
2BB1E202000
heap
page read and write
4CA0000
trusted library allocation
page read and write
1ED57665000
heap
page read and write
99F5000
trusted library allocation
page read and write
D4C000
trusted library allocation
page read and write
3920000
trusted library allocation
page read and write
4EA000
heap
page read and write
2564DC55000
heap
page read and write
2DAB000
trusted library allocation
page read and write
2564DC59000
heap
page read and write
2BB1E23C000
heap
page read and write
AC000
stack
page read and write
21DD84F0000
heap
page read and write
47BD000
trusted library allocation
page read and write
3781000
trusted library allocation
page read and write
FAD987E000
stack
page read and write
1ED57E00000
heap
page read and write
1A772990000
trusted library allocation
page read and write
67C000
stack
page read and write
211E3451000
heap
page read and write
3C804FB000
stack
page read and write
3849000
trusted library allocation
page read and write
82E000
stack
page read and write
15EB9B08000
heap
page read and write
378B000
trusted library allocation
page read and write
3776000
trusted library allocation
page read and write
A38E000
trusted library allocation
page read and write
A35D000
trusted library allocation
page read and write
2EAE000
trusted library allocation
page read and write
792000
heap
page read and write
50C7000
trusted library allocation
page read and write
158E9000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
43E73BB000
stack
page read and write
525F000
stack
page read and write
6F0000
trusted library allocation
page read and write
D45000
trusted library allocation
page read and write
384B000
trusted library allocation
page read and write
2EAD000
trusted library allocation
page read and write
382B000
trusted library allocation
page read and write
2D99000
trusted library allocation
page read and write
34F8000
heap
page read and write
211E345C000
heap
page read and write
506E000
stack
page read and write
3850000
trusted library allocation
page read and write
5368000
trusted library allocation
page read and write
30A4000
heap
page read and write
20CD0262000
heap
page read and write
1ED57D43000
heap
page read and write
147A4FE000
stack
page read and write
3813000
heap
page read and write
477F000
stack
page read and write
25249602000
heap
page read and write
9957000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
3846000
trusted library allocation
page read and write
526F000
stack
page read and write
7AD000
heap
page read and write
5318000
trusted library allocation
page read and write
2EA9000
trusted library allocation
page read and write
700000
heap
page read and write
2564DC77000
heap
page read and write
A382000
trusted library allocation
page read and write
391D000
trusted library allocation
page read and write
3816000
heap
page read and write
34EE000
stack
page read and write
3070000
heap
page read and write
2D9A000
trusted library allocation
page read and write
3917000
trusted library allocation
page read and write
31B0000
heap
page read and write
2CAE000
heap
page read and write
341A000
heap
page read and write
3A39000
heap
page read and write
1595B000
trusted library allocation
page read and write
3770000
trusted library allocation
page read and write
2A71000
heap
page read and write
47C8000
trusted library allocation
page read and write
2C5C000
heap
page read and write
4E5000
heap
page read and write
2A8D000
heap
page read and write
382F000
trusted library allocation
page read and write
20CD01F0000
trusted library allocation
page read and write
309F000
heap
page read and write
51A3000
trusted library allocation
page read and write
517F000
stack
page read and write
3040000
heap
page read and write
2BB1E313000
heap
page read and write
1ED577BA000
heap
page read and write
338E000
stack
page read and write
2564DC00000
heap
page read and write
211E345F000
heap
page read and write
D5A000
trusted library allocation
page read and write
2EA6000
trusted library allocation
page read and write
2564DC3C000
heap
page read and write
4A8000
stack
page read and write
4BBF000
stack
page read and write
381C000
heap
page read and write
4CE0000
trusted library allocation
page read and write
252495A0000
remote allocation
page read and write
15EB9B02000
heap
page read and write
708000
heap
page read and write
4F5000
heap
page read and write
9985000
trusted library allocation
page read and write
There are 1226 hidden memdumps, click here to show them.