IOC Report
order072724.docx.doc

loading gif

Files

File Path
Type
Category
Malicious
order072724.docx.doc
Microsoft Word 2007+
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\swagodi[1].scr
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{1C83C99B-998E-4DEF-B324-E69763DD529E}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpD135.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\meridianresourcellc.top.url
MS Windows 95 Internet shortcut text (URL=<https://meridianresourcellc.top/>), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\swagodi.doc.url
MS Windows 95 Internet shortcut text (URL=<https://meridianresourcellc.top/swagodi.doc>), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\gRpkBp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\swagodi78811.scr
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\swagodi[1].doc
Rich Text Format data, version 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9F4A4ED3.doc
Rich Text Format data, version 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{33BDEDAF-FD20-43DA-A75E-5CAD44283C48}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4FA22C98-7DA0-493A-91D1-4967A9EB7810}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BC768F9A-1E23-42EC-BFB7-497C7ADC86A6}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{DFDAF9DF-6BC4-4F6A-A0FF-C33A9DF361BF}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\1zbxn4w1.5ag.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\3ak1eazt.2jo.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ipm54scl.0fx.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ob5jkauh.3vm.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\t3xzkerh.51d.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\tdci0il4.ovp.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\tmpED3D.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\wna1cdrj.utj.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\zanpl0wu.bwl.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\{4D4EF297-60A4-4F5E-91CE-187E9E616F6B}
data
dropped
C:\Users\user\AppData\Local\Temp\{9AEEB410-4587-48E6-B580-60B91D50D143}
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Generic INItialization configuration [folders]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\order072724.docx.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:08 2023, mtime=Fri Aug 11 15:42:08 2023, atime=Fri Jul 26 20:45:00 2024, length=96005, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\Desktop\~$der072724.docx.doc
data
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Users\user\AppData\Roaming\swagodi78811.scr
"C:\Users\user\AppData\Roaming\swagodi78811.scr"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\swagodi78811.scr"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gRpkBp.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gRpkBp" /XML "C:\Users\user\AppData\Local\Temp\tmpD135.tmp"
malicious
C:\Users\user\AppData\Roaming\swagodi78811.scr
"C:\Users\user\AppData\Roaming\swagodi78811.scr"
malicious
C:\Users\user\AppData\Roaming\swagodi78811.scr
"C:\Users\user\AppData\Roaming\swagodi78811.scr"
malicious
C:\Users\user\AppData\Roaming\gRpkBp.exe
C:\Users\user\AppData\Roaming\gRpkBp.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gRpkBp.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gRpkBp.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gRpkBp" /XML "C:\Users\user\AppData\Local\Temp\tmpED3D.tmp"
malicious
C:\Users\user\AppData\Roaming\gRpkBp.exe
"C:\Users\user\AppData\Roaming\gRpkBp.exe"
malicious
C:\Windows\System32\taskeng.exe
taskeng.exe {52F5B264-C702-43C6-8445-EB0747C55549} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://meridianresourcellc.top/
unknown
malicious
https://meridianresourcellc.top/swagodi.doc
104.21.52.88
malicious
https://meridianresourcellc.top/swagodi.scr
104.21.52.88
malicious
http://reallyfreegeoip.orgX
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/search%3Fq%3Dwmf%2B5.1%26oq%3Dwmf
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
https://meridianresourcellc.top/swagodi.scrj
unknown
http://api.telegram.orgX
unknown
http://ocsp.entrust.net03
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:528110%0D%0ADate%20a
unknown
https://reallyfreegeoip.org/xml/8.46.123.334
unknown
https://meridianresourcellc.top/swagodi.scrsoC:
unknown
http://varders.kozow.com:8081
unknown
http://checkip.dyndns.org/
132.226.247.73
https://www.google.com/search?q=wmf
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
http://checkip.dyndns.org/X
unknown
http://checkip.dyndns.com
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
https://download.visualstud
unknown
http://crl.entrust.net/server1.crl0
unknown
https://www.google.com/search?q=test&oq=test&aqs=chrome..69i57j46j0l3j46j0.427j0j7&sourceid=chrome&i
unknown
http://schemas.microsoftXT7/windows/2004/02/mit/tas
unknown
https://reallyfreegeoip.org/xml/8.46.123.330Kp
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:528110%0D%0ADate%20and%20Time:%207/27/2024%20/%207:26:36%20AM%0D%0ACountry%20Name:%20United%20States%0D%0A[%20528110%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20]
149.154.167.220
http://checkip.dyndns.org
unknown
http://ocsp.c
unknown
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
https://www.google.com/favicon.ico
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:528110%0D%0ADate%20and%20Time:%207/27/2024%20/%2010:06:41%20AM%0D%0ACountry%20Name:%20United%20States%0D%0A[%20528110%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20]
149.154.167.220
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
https://meridianresourcellc.top/swagodi.scrllC:
unknown
https://www.google.com/sorry/index
unknown
http://anotherarmy.dns.army:8081
unknown
https://reallyfreegeoip.org
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/search%3Fq%3Dtest%26oq%3Dtest%26a
unknown
https://www.google.com/search?q=net
unknown
https://www.google.com/sorry/indextest
unknown
http://api.telegram.org
unknown
https://secure.comodo.com/CPS0
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://checkip.dyndns.comX
unknown
http://checkip.dyndns.orgX
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
There are 50 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
meridianresourcellc.top
104.21.52.88
malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
132.226.247.73

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
104.21.52.88
meridianresourcellc.top
United States
malicious
172.67.197.72
unknown
United States
132.226.8.169
unknown
United States
193.122.6.168
unknown
United States
188.114.96.3
unknown
European Union
193.122.130.0
unknown
United States
158.101.44.242
unknown
United States
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://meridianresourcellc.top/
Type
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://meridianresourcellc.top/
Protocol
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://meridianresourcellc.top/
Version
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://meridianresourcellc.top/
Flags
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://meridianresourcellc.top/
CobaltMajorVersion
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://meridianresourcellc.top/
CobaltMinorVersion
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://meridianresourcellc.top/
MsDavExt
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://meridianresourcellc.top/
Expiration
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://meridianresourcellc.top/
EnableBHO
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
`0*
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Word
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
(1*
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
.3*
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
3q*
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\2CDBA
2CDBA
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\swagodi78811_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\swagodi78811_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\swagodi78811_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\swagodi78811_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\swagodi78811_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\swagodi78811_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\swagodi78811_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\swagodi78811_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\swagodi78811_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\swagodi78811_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\swagodi78811_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\swagodi78811_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Handshake\{52F5B264-C702-43C6-8445-EB0747C55549}
data
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\gRpkBp_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\gRpkBp_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\gRpkBp_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\gRpkBp_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\gRpkBp_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\gRpkBp_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\gRpkBp_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\gRpkBp_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\gRpkBp_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\gRpkBp_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\gRpkBp_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\gRpkBp_RASMANCS
FileDirectory
There are 374 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3129000
trusted library allocation
page read and write
malicious
42B000
remote allocation
page execute and read and write
malicious
22F1000
trusted library allocation
page read and write
malicious
23F1000
trusted library allocation
page read and write
malicious
492E000
stack
page read and write
43B000
remote allocation
page execute and read and write
3356000
trusted library allocation
page read and write
427000
remote allocation
page execute and read and write
79D000
heap
page read and write
2398000
trusted library allocation
page read and write
4C10000
heap
page execute and read and write
34AC000
trusted library allocation
page read and write
1BE000
stack
page read and write
66CE000
stack
page read and write
2424000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
538F000
stack
page read and write
2530000
trusted library allocation
page read and write
20CF000
stack
page read and write
50F000
heap
page read and write
22B000
stack
page read and write
3A0000
heap
page read and write
422000
remote allocation
page execute and read and write
24B0000
trusted library allocation
page read and write
124000
trusted library allocation
page read and write
33F8000
trusted library allocation
page read and write
4780000
heap
page read and write
35C1000
trusted library allocation
page read and write
2493000
trusted library allocation
page read and write
2513000
trusted library allocation
page read and write
2482000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
404F000
stack
page read and write
40E000
remote allocation
page execute and read and write
4B40000
heap
page execute and read and write
5A7E000
stack
page read and write
4FAF000
stack
page read and write
2244000
heap
page read and write
2035000
heap
page read and write
8C4000
heap
page read and write
1B4000
trusted library allocation
page read and write
262E000
trusted library allocation
page read and write
2610000
trusted library allocation
page read and write
4FA6000
heap
page read and write
40C000
remote allocation
page execute and read and write
61D000
stack
page read and write
247B000
trusted library allocation
page read and write
110000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
24D000
stack
page read and write
342E000
trusted library allocation
page read and write
224000
heap
page read and write
460000
heap
page execute and read and write
3C0000
trusted library allocation
page read and write
26AC000
trusted library allocation
page read and write
4FFC000
heap
page read and write
2418000
trusted library allocation
page read and write
2EF000
stack
page read and write
228D000
trusted library allocation
page read and write
4CAD000
stack
page read and write
B3000
trusted library allocation
page execute and read and write
3A1C000
stack
page read and write
2540000
trusted library allocation
page read and write
8D2000
unkown
page execute read
4FED000
heap
page read and write
340D000
trusted library allocation
page read and write
34B2000
trusted library allocation
page read and write
4A6F000
heap
page read and write
41F000
remote allocation
page execute and read and write
8C7E000
stack
page read and write
48DD000
stack
page read and write
26AF000
trusted library allocation
page read and write
120000
trusted library allocation
page read and write
24E6000
trusted library allocation
page read and write
5209000
heap
page read and write
4281000
heap
page read and write
5E6E000
stack
page read and write
420C000
heap
page read and write
3513000
trusted library allocation
page read and write
4F0000
heap
page read and write
24B4000
trusted library allocation
page read and write
955E000
stack
page read and write | page guard
67CF000
stack
page read and write
77A000
heap
page read and write
25CD000
trusted library allocation
page read and write
4224000
heap
page read and write
8646000
heap
page read and write
257C000
trusted library allocation
page read and write
400D000
stack
page read and write
A90000
trusted library allocation
page execute and read and write
3421000
trusted library allocation
page read and write
33AC000
trusted library allocation
page read and write
34D4000
trusted library allocation
page read and write
217000
trusted library allocation
page execute and read and write
888E000
stack
page read and write
3542000
trusted library allocation
page read and write
248D000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
187000
trusted library allocation
page execute and read and write
866F000
heap
page read and write
23DB000
heap
page read and write
905E000
stack
page read and write | page guard
42B0000
heap
page read and write
1B8000
trusted library allocation
page read and write
25D2000
trusted library allocation
page read and write
227000
trusted library allocation
page execute and read and write
93DE000
stack
page read and write
727D000
stack
page read and write
650000
trusted library allocation
page read and write
3860000
heap
page read and write
20000
heap
page read and write
22DF000
stack
page read and write
3450000
trusted library allocation
page read and write
241C000
trusted library allocation
page read and write
4CE000
stack
page read and write
1C2000
trusted library allocation
page read and write
5E9F000
stack
page read and write
340000
heap
page read and write
740000
heap
page read and write
32B2000
trusted library allocation
page read and write
258C000
trusted library allocation
page read and write
36EF000
stack
page read and write
2523000
trusted library allocation
page read and write
34DA000
trusted library allocation
page read and write
200000
trusted library allocation
page execute and read and write
5B30000
heap
page read and write
307000
heap
page read and write
407000
remote allocation
page execute and read and write
6F93000
trusted library allocation
page read and write
123000
trusted library allocation
page execute and read and write
677000
heap
page read and write
2414000
trusted library allocation
page read and write
21EE000
stack
page read and write
5178000
heap
page read and write
51E0000
heap
page read and write
8C0E000
stack
page read and write
40C0000
heap
page read and write
5F9E000
stack
page read and write
45AE000
stack
page read and write
864D000
heap
page read and write
503D000
heap
page read and write
56FE000
stack
page read and write
5020000
heap
page read and write
351B000
trusted library allocation
page read and write
146000
trusted library allocation
page execute and read and write
47A2000
heap
page read and write
597F000
stack
page read and write
197000
trusted library allocation
page execute and read and write
6D7000
heap
page read and write
352B000
trusted library allocation
page read and write
60EF000
stack
page read and write
8D0000
unkown
page readonly
2439000
trusted library allocation
page read and write
3CCC000
stack
page read and write
6E0000
trusted library allocation
page read and write
33E000
heap
page read and write
555E000
stack
page read and write
A0000
trusted library allocation
page read and write
5BC0000
heap
page read and write
5CA9000
heap
page read and write
443E000
stack
page read and write
80000
heap
page execute and read and write
23B1000
trusted library allocation
page read and write
690000
heap
page execute and read and write
41FF000
heap
page read and write
42F0000
heap
page read and write
4A6F000
stack
page read and write
506D000
heap
page read and write
1F8C000
stack
page read and write
4A64000
heap
page read and write
5FCF000
stack
page read and write
544E000
stack
page read and write
630000
trusted library section
page read and write
341A000
trusted library allocation
page read and write
425000
remote allocation
page execute and read and write
336B000
trusted library allocation
page read and write
53EE000
stack
page read and write
237E000
trusted library allocation
page read and write
527000
heap
page read and write
536E000
stack
page read and write
640000
trusted library allocation
page read and write
1D2000
trusted library allocation
page read and write
21F9000
trusted library allocation
page read and write
620000
trusted library section
page read and write
B4000
trusted library allocation
page read and write
35C8000
trusted library allocation
page read and write
1DB000
trusted library allocation
page execute and read and write
1FA000
stack
page read and write
3520000
trusted library allocation
page read and write
26C2000
trusted library allocation
page read and write
3453000
trusted library allocation
page read and write
5D6E000
stack
page read and write
243E000
trusted library allocation
page read and write
23C4000
trusted library allocation
page read and write
B0000
trusted library allocation
page read and write
6FA3000
trusted library allocation
page read and write
22F000
stack
page read and write
2523000
trusted library allocation
page read and write
339E000
trusted library allocation
page read and write
3444000
trusted library allocation
page read and write
341C000
trusted library allocation
page read and write
35D000
stack
page read and write
228D000
stack
page read and write
955F000
stack
page read and write
6F7000
heap
page read and write
3349000
trusted library allocation
page read and write
33B7000
trusted library allocation
page read and write
4A7A000
heap
page read and write
3CD000
stack
page read and write
91FE000
stack
page read and write
34F6000
trusted library allocation
page read and write
23D3000
trusted library allocation
page read and write
2568000
trusted library allocation
page read and write
35DB000
trusted library allocation
page read and write
7CB000
heap
page read and write
3607000
trusted library allocation
page read and write
21C1000
trusted library allocation
page read and write
23A0000
heap
page read and write
64AE000
stack
page read and write
733000
heap
page read and write
32DE000
trusted library allocation
page read and write
454000
heap
page read and write
35D8000
trusted library allocation
page read and write
10000
heap
page read and write
1A3000
trusted library allocation
page execute and read and write
FA000
stack
page read and write
2B8B000
heap
page read and write
25C7000
trusted library allocation
page read and write
877E000
stack
page read and write
503000
heap
page read and write
4FC6000
heap
page read and write
2628000
trusted library allocation
page read and write
5BCF000
stack
page read and write
89000
stack
page read and write
260A000
trusted library allocation
page read and write
8C4E000
stack
page read and write
344A000
trusted library allocation
page read and write
1C0000
trusted library allocation
page read and write
460000
heap
page read and write
640000
heap
page read and write
399F000
stack
page read and write
4F0000
trusted library allocation
page read and write
267E000
trusted library allocation
page read and write
142000
trusted library allocation
page read and write
2C0000
heap
page read and write
56EE000
stack
page read and write
251F000
trusted library allocation
page read and write
670000
heap
page read and write
40D000
remote allocation
page execute and read and write
247F000
stack
page read and write
23EE000
stack
page read and write | page guard
501000
heap
page read and write
592F000
stack
page read and write
2559000
trusted library allocation
page read and write
5170000
heap
page read and write
3BCF000
stack
page read and write
4249000
heap
page read and write
37D000
heap
page read and write
280000
trusted library allocation
page read and write
10A000
stack
page read and write
35FE000
trusted library allocation
page read and write
406000
remote allocation
page execute and read and write
50E000
stack
page read and write
35D3000
trusted library allocation
page read and write
8DE000
stack
page read and write | page guard
51E0000
heap
page read and write
3548000
trusted library allocation
page read and write
2483000
trusted library allocation
page read and write
937E000
stack
page read and write | page guard
266E000
trusted library allocation
page read and write
520000
heap
page read and write
8644000
heap
page read and write
548000
heap
page read and write
371F000
heap
page read and write
33FE000
trusted library allocation
page read and write
335F000
trusted library allocation
page read and write
31C1000
trusted library allocation
page read and write
550000
trusted library allocation
page read and write
50D000
heap
page read and write
1A0000
trusted library allocation
page read and write
157000
trusted library allocation
page execute and read and write
1A4000
trusted library allocation
page read and write
200000
trusted library allocation
page execute and read and write
10000
heap
page read and write
2379000
trusted library allocation
page read and write
8E6000
heap
page read and write
5479000
heap
page read and write
2100000
trusted library allocation
page read and write
5A3000
heap
page read and write
3353000
trusted library allocation
page read and write
17D000
trusted library allocation
page execute and read and write
356A000
trusted library allocation
page read and write
253C000
trusted library allocation
page read and write
2262000
heap
page read and write
544000
heap
page read and write
3518000
trusted library allocation
page read and write
48CE000
stack
page read and write
548E000
stack
page read and write
2457000
trusted library allocation
page read and write
5D6E000
stack
page read and write
356E000
trusted library allocation
page read and write
37000
heap
page read and write
574E000
stack
page read and write
4304000
heap
page read and write
2631000
trusted library allocation
page read and write
43EE000
stack
page read and write
33F1000
trusted library allocation
page read and write
1F90000
trusted library allocation
page read and write
1DAB000
heap
page read and write
402000
remote allocation
page execute and read and write
420000
trusted library allocation
page execute and read and write
BD000
trusted library allocation
page execute and read and write
2210000
heap
page read and write
1CA000
trusted library allocation
page execute and read and write
70F0000
heap
page read and write
31C9000
trusted library allocation
page read and write
2B00000
heap
page read and write
3414000
trusted library allocation
page read and write
152000
trusted library allocation
page read and write
480000
heap
page read and write
2B88000
heap
page read and write
5D0E000
stack
page read and write
4D6F000
stack
page read and write
182000
trusted library allocation
page read and write
342A000
trusted library allocation
page read and write
20F0000
trusted library allocation
page execute and read and write
624E000
stack
page read and write
2205000
trusted library allocation
page read and write
4E4000
heap
page read and write
88E000
unkown
page read and write
220000
heap
page read and write
20000
heap
page read and write
3396000
trusted library allocation
page read and write
242000
heap
page read and write
22BB000
trusted library allocation
page read and write
426000
remote allocation
page execute and read and write
322C000
trusted library allocation
page read and write
22A0000
trusted library allocation
page execute and read and write
2595000
trusted library allocation
page read and write
372F000
heap
page read and write
21A000
trusted library allocation
page execute and read and write
4300000
heap
page read and write
5C00000
heap
page read and write
5220000
heap
page read and write
4F1E000
stack
page read and write
5219000
heap
page read and write
284F000
stack
page read and write
57D0000
heap
page read and write
352D000
trusted library allocation
page read and write
2240000
heap
page read and write
3506000
trusted library allocation
page read and write
42A000
remote allocation
page execute and read and write
41F8000
heap
page read and write
48C5000
heap
page read and write
2683000
trusted library allocation
page read and write
3424000
trusted library allocation
page read and write
6F0000
heap
page read and write
905F000
stack
page read and write
1D70000
heap
page read and write
446E000
stack
page read and write
B44000
unkown
page execute read
561E000
stack
page read and write
430000
heap
page read and write
250F000
trusted library allocation
page read and write
3365000
trusted library allocation
page read and write
2030000
heap
page read and write
567F000
stack
page read and write
348000
stack
page read and write
346D000
trusted library allocation
page read and write
341F000
trusted library allocation
page read and write
130000
heap
page read and write
2681000
trusted library allocation
page read and write
426D000
heap
page read and write
41C0000
heap
page read and write
5C1E000
stack
page read and write
1D40000
direct allocation
page read and write
599000
heap
page read and write
5A9F000
heap
page read and write
25A4000
trusted library allocation
page read and write
3550000
trusted library allocation
page read and write
2621000
trusted library allocation
page read and write
4A60000
heap
page read and write
2145000
trusted library allocation
page read and write
25BD000
trusted library allocation
page read and write
4A1E000
stack
page read and write
2517000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
2536000
trusted library allocation
page read and write
2410000
trusted library allocation
page read and write
23A5000
heap
page read and write
5680000
heap
page read and write
35F7000
trusted library allocation
page read and write
58F000
heap
page read and write
5174000
heap
page read and write
242C000
trusted library allocation
page read and write
4FE7000
heap
page read and write
560000
heap
page read and write
351E000
trusted library allocation
page read and write
4246000
heap
page read and write
35C8000
trusted library allocation
page read and write
4FA9000
heap
page read and write
34B3000
trusted library allocation
page read and write
192000
trusted library allocation
page read and write
30F000
stack
page read and write
4DAE000
stack
page read and write
5DFF000
stack
page read and write
3511000
trusted library allocation
page read and write
35B2000
trusted library allocation
page read and write
6AE000
stack
page read and write
22B000
trusted library allocation
page execute and read and write
2101000
trusted library allocation
page read and write
290000
trusted library allocation
page read and write
34B000
stack
page read and write
250000
heap
page read and write
5BCE000
stack
page read and write | page guard
2586000
trusted library allocation
page read and write
1BD000
trusted library allocation
page execute and read and write
22B0000
heap
page read and write
34FC000
trusted library allocation
page read and write
1F5D000
stack
page read and write
883D000
stack
page read and write
258F000
trusted library allocation
page read and write
364D000
trusted library allocation
page read and write
637E000
stack
page read and write
437000
heap
page read and write
46C0000
heap
page execute and read and write
5450000
heap
page read and write
5560000
heap
page read and write
3B7000
stack
page read and write
247E000
trusted library allocation
page read and write
6E2000
trusted library allocation
page read and write
24C4000
trusted library allocation
page read and write
2B7E000
stack
page read and write
600000
heap
page read and write
714000
heap
page read and write
300000
heap
page read and write
18A000
trusted library allocation
page execute and read and write
4FCD000
heap
page read and write
5FCE000
stack
page read and write | page guard
247B000
trusted library allocation
page read and write
526000
heap
page read and write
1B0000
trusted library allocation
page read and write
6F4000
heap
page read and write
476E000
stack
page read and write
290000
heap
page execute and read and write
3109000
trusted library allocation
page read and write
3604000
trusted library allocation
page read and write
2591000
trusted library allocation
page read and write
36F0000
heap
page read and write
4C7000
heap
page read and write
540000
heap
page read and write
8A0000
heap
page read and write
2615000
trusted library allocation
page read and write
5EF000
heap
page read and write
571000
heap
page read and write
4E1E000
stack
page read and write
24DB000
trusted library allocation
page read and write
25B4000
trusted library allocation
page read and write
8D0000
unkown
page readonly
15B000
trusted library allocation
page execute and read and write
596E000
stack
page read and write
4FCD000
heap
page read and write
382E000
stack
page read and write
10000
heap
page read and write
3321000
trusted library allocation
page read and write
218D000
stack
page read and write
1B3000
trusted library allocation
page execute and read and write
710000
heap
page read and write
214E000
stack
page read and write
2527000
trusted library allocation
page read and write
4FA8000
heap
page read and write
2060000
heap
page execute and read and write
5050000
heap
page read and write
260000
trusted library allocation
page read and write
5A5000
heap
page read and write
2670000
trusted library allocation
page read and write
4A62000
heap
page read and write
5AC3000
heap
page read and write
863D000
stack
page read and write
25BA000
trusted library allocation
page read and write
8DF000
stack
page read and write
44FE000
stack
page read and write
2480000
trusted library allocation
page read and write
2270000
trusted library allocation
page execute and read and write
E4000
heap
page read and write
2586000
trusted library allocation
page read and write
240C000
trusted library allocation
page read and write
20D000
trusted library allocation
page execute and read and write
60AF000
stack
page read and write
3412000
trusted library allocation
page read and write
4F58000
heap
page read and write
210000
trusted library allocation
page read and write
1FDE000
stack
page read and write
530000
trusted library allocation
page read and write
3C8000
stack
page read and write
648E000
stack
page read and write
32F1000
trusted library allocation
page read and write
2518000
trusted library allocation
page read and write
4322000
heap
page read and write
900E000
stack
page read and write
351E000
trusted library allocation
page read and write
294F000
stack
page read and write
8E0000
heap
page read and write
62AD000
stack
page read and write
24D1000
trusted library allocation
page read and write
66D000
stack
page read and write
30000
heap
page read and write
5C14000
heap
page read and write
1D7000
trusted library allocation
page execute and read and write
700000
heap
page read and write
550000
heap
page read and write
10000
heap
page read and write
737F000
stack
page read and write
23EF000
stack
page read and write
A80000
trusted library allocation
page read and write
34CF000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
3427000
trusted library allocation
page read and write
41E000
remote allocation
page execute and read and write
405000
remote allocation
page execute and read and write
77C000
heap
page read and write
3F2000
heap
page read and write
361F000
trusted library allocation
page read and write
10000
heap
page read and write
4630000
trusted library section
page read and write
2579000
trusted library allocation
page read and write
662E000
stack
page read and write
7E6000
heap
page read and write
2496000
trusted library allocation
page read and write
6C0000
trusted library allocation
page execute and read and write
435E000
stack
page read and write
21FE000
stack
page read and write
4FB0000
heap
page read and write
2449000
trusted library allocation
page read and write
4F20000
heap
page read and write
5C29000
heap
page read and write
521E000
stack
page read and write
4A68000
heap
page read and write
4A44000
heap
page read and write
4784000
heap
page read and write
34CC000
trusted library allocation
page read and write
3F0C000
stack
page read and write
871D000
stack
page read and write
58C000
heap
page read and write
18B000
stack
page read and write
4FE1000
heap
page read and write
8D2000
unkown
page execute read
60AE000
stack
page read and write | page guard
361C000
trusted library allocation
page read and write
4FE0000
heap
page read and write
22E0000
trusted library allocation
page execute and read and write
87EE000
stack
page read and write
26F000
unkown
page read and write
4E4D000
stack
page read and write
4EAE000
stack
page read and write
3D4000
heap
page read and write
4FFD000
heap
page read and write
8DDE000
stack
page read and write
B17000
heap
page read and write
4226000
heap
page read and write
43C000
remote allocation
page execute and read and write
1D74000
heap
page read and write
542E000
stack
page read and write
4DCF000
stack
page read and write
71EE000
stack
page read and write
130000
trusted library allocation
page read and write
257E000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
5ADE000
stack
page read and write
5A1000
heap
page read and write
24D7000
trusted library allocation
page read and write
33A0000
trusted library allocation
page read and write
3504000
trusted library allocation
page read and write
2C4000
heap
page read and write
4C0000
heap
page read and write
4FB6000
heap
page read and write
47E000
heap
page read and write
346B000
trusted library allocation
page read and write
5BD2000
heap
page read and write
10000
heap
page read and write
120000
trusted library allocation
page read and write
709000
heap
page read and write
255E000
trusted library allocation
page read and write
54F000
heap
page read and write
34DE000
trusted library allocation
page read and write
5A80000
heap
page read and write
25BF000
trusted library allocation
page read and write
342E000
trusted library allocation
page read and write
210C000
trusted library allocation
page read and write
41CF000
stack
page read and write
2396000
trusted library allocation
page read and write
26BF000
trusted library allocation
page read and write
4D9E000
stack
page read and write
380000
trusted library allocation
page read and write
587F000
stack
page read and write
380000
heap
page read and write
200000
heap
page read and write
27B000
stack
page read and write
436000
heap
page read and write
3459000
trusted library allocation
page read and write
3528000
trusted library allocation
page read and write
5E5E000
stack
page read and write
2583000
trusted library allocation
page read and write
212000
trusted library allocation
page read and write
4F6D000
stack
page read and write
140000
trusted library allocation
page read and write
8640000
heap
page read and write
41DA000
heap
page read and write
1AD000
trusted library allocation
page execute and read and write
34C5000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
254E000
trusted library allocation
page read and write
3A90000
heap
page read and write
370D000
heap
page read and write
3552000
trusted library allocation
page read and write
428000
remote allocation
page execute and read and write
21BF000
stack
page read and write
14A000
trusted library allocation
page execute and read and write
3DCD000
stack
page read and write
266B000
trusted library allocation
page read and write
21B0000
trusted library allocation
page execute and read and write
5DF000
heap
page read and write
237F000
stack
page read and write
155000
trusted library allocation
page execute and read and write
409000
remote allocation
page execute and read and write
435D000
stack
page read and write
4287000
heap
page read and write
10000
heap
page read and write
400000
remote allocation
page execute and read and write
514E000
stack
page read and write
26C4000
trusted library allocation
page read and write
400000
heap
page read and write
670000
trusted library allocation
page execute and read and write
50D000
heap
page read and write
201E000
stack
page read and write
54CE000
stack
page read and write
519E000
stack
page read and write
19B000
trusted library allocation
page execute and read and write
5A8E000
heap
page read and write
4260000
heap
page read and write
3101000
trusted library allocation
page read and write
2539000
trusted library allocation
page read and write
420000
remote allocation
page execute and read and write
2678000
trusted library allocation
page read and write
899E000
stack
page read and write
486E000
stack
page read and write
24B0000
trusted library allocation
page read and write
976000
unkown
page readonly
170000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
42C000
stack
page read and write
5211000
heap
page read and write
4950000
heap
page read and write
25C5000
trusted library allocation
page read and write
33B2000
trusted library allocation
page read and write
40B000
remote allocation
page execute and read and write
280000
trusted library allocation
page execute and read and write
2381000
trusted library allocation
page read and write
250000
trusted library allocation
page execute and read and write
8F5E000
stack
page read and write
3558000
trusted library allocation
page read and write
4B8F000
stack
page read and write
49B0000
heap
page execute and read and write
7D0000
trusted library allocation
page read and write
2428000
trusted library allocation
page read and write
7EF40000
trusted library allocation
page execute and read and write
24D3000
trusted library allocation
page read and write
2E2000
heap
page read and write
360D000
trusted library allocation
page read and write
587E000
stack
page read and write | page guard
253F000
trusted library allocation
page read and write
1D5000
trusted library allocation
page execute and read and write
AA0000
unkown
page readonly
4256000
heap
page read and write
6D0000
heap
page read and write
590000
trusted library allocation
page execute and read and write
31E9000
trusted library allocation
page read and write
8AAE000
stack
page read and write
23D7000
trusted library allocation
page read and write
720000
heap
page read and write
26A6000
trusted library allocation
page read and write
3830000
remote allocation
page read and write
8DEF000
stack
page read and write
350C000
trusted library allocation
page read and write
48BD000
stack
page read and write
1C6000
trusted library allocation
page execute and read and write
35ED000
stack
page read and write
10000
heap
page read and write
8A0E000
stack
page read and write
26B1000
trusted library allocation
page read and write
24D3000
trusted library allocation
page read and write
2ACE000
stack
page read and write
2498000
trusted library allocation
page read and write
429C000
heap
page read and write
35C4000
trusted library allocation
page read and write
4B0000
trusted library allocation
page read and write
61C000
stack
page read and write
5BAE000
stack
page read and write
521E000
stack
page read and write
4A0000
heap
page read and write
39DC000
stack
page read and write
5B19000
heap
page read and write
390000
trusted library allocation
page read and write
428D000
heap
page read and write
2386000
trusted library allocation
page read and write
200000
trusted library allocation
page read and write
3734000
heap
page read and write
926E000
stack
page read and write
2665000
trusted library allocation
page read and write
24CF000
trusted library allocation
page read and write
4279000
heap
page read and write
34BE000
trusted library allocation
page read and write
448D000
stack
page read and write
1E7F000
stack
page read and write
2B84000
heap
page read and write
24A1000
trusted library allocation
page read and write
3468000
trusted library allocation
page read and write
852E000
stack
page read and write
4229000
heap
page read and write
18A000
stack
page read and write
8A7000
heap
page read and write
6A4E000
stack
page read and write
883E000
stack
page read and write
2573000
trusted library allocation
page read and write
937F000
stack
page read and write
48C0000
heap
page read and write
24C7000
trusted library allocation
page read and write
2408000
trusted library allocation
page read and write
251B000
trusted library allocation
page read and write
508000
heap
page read and write
1EE000
unkown
page read and write
E0000
heap
page read and write
21FB000
trusted library allocation
page read and write
2465000
trusted library allocation
page read and write
579000
heap
page read and write
220F000
unkown
page read and write
4F2E000
stack
page read and write
408000
remote allocation
page execute and read and write
20C0000
heap
page read and write
23DB000
trusted library allocation
page read and write
21BE000
stack
page read and write | page guard
190000
trusted library allocation
page read and write
49AD000
stack
page read and write
202F000
stack
page read and write
868E000
stack
page read and write
5222000
heap
page read and write
3A5F000
stack
page read and write
6D0000
trusted library allocation
page execute and read and write
421000
remote allocation
page execute and read and write
1B0000
trusted library allocation
page read and write
3DE000
stack
page read and write
5C40000
heap
page read and write
86CE000
stack
page read and write
3526000
trusted library allocation
page read and write
12D000
trusted library allocation
page execute and read and write
4A40000
heap
page read and write
5C9A000
heap
page read and write
500000
heap
page read and write
1BD000
trusted library allocation
page execute and read and write
508000
heap
page read and write
3830000
remote allocation
page read and write
473000
heap
page read and write
53F0000
heap
page read and write
26B9000
trusted library allocation
page read and write
20000
heap
page read and write
377000
stack
page read and write
34D2000
trusted library allocation
page read and write
35DF000
trusted library allocation
page read and write
210000
heap
page execute and read and write
3D0000
heap
page read and write
23CF000
trusted library allocation
page read and write
3567000
trusted library allocation
page read and write
429000
remote allocation
page execute and read and write
3ECF000
stack
page read and write
4FA0000
heap
page read and write
251E000
trusted library allocation
page read and write
252B000
trusted library allocation
page read and write
1FA000
stack
page read and write
13D000
trusted library allocation
page execute and read and write
620000
trusted library allocation
page read and write
40A000
remote allocation
page execute and read and write
AA0000
unkown
page readonly
500000
heap
page read and write
35CE000
trusted library allocation
page read and write
222000
trusted library allocation
page read and write
569000
heap
page read and write
439D000
stack
page read and write
480C000
stack
page read and write
3543000
trusted library allocation
page read and write
2420000
trusted library allocation
page read and write
540000
heap
page read and write
42A0000
heap
page read and write
351B000
trusted library allocation
page read and write
609000
heap
page read and write
22B9000
trusted library allocation
page read and write
360000
heap
page read and write
20E0000
trusted library allocation
page execute and read and write
694000
heap
page read and write
2B80000
heap
page read and write
25DF000
stack
page read and write
55CD000
stack
page read and write
4F84000
heap
page read and write
B10000
heap
page read and write
342C000
trusted library allocation
page read and write
51F8000
heap
page read and write
527E000
stack
page read and write
There are 796 hidden memdumps, click here to show them.