IOC Report
WC5Gv13cOQ.rtf

loading gif

Files

File Path
Type
Category
Malicious
WC5Gv13cOQ.rtf
Rich Text Format data, version 1
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\taskhostw[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
dropped
malicious
C:\Users\user\AppData\Roaming\taskhostw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{40B684B2-6E04-4D52-883C-BB9A6B4BB620}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{01A01F5C-BCA2-4E40-B13F-9E3E6DA46ECE}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7D5F291B-FC4E-4817-A29C-C6E550DE4245}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Citlaltpetl
data
dropped
C:\Users\user\AppData\Local\Temp\aut2C8D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut2D49.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut32A5.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut3313.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut651A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut6605.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\bhv41C2.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x0f970b0e, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\siqmroydgnmmmfpuczimwafbeumewarjhx
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\teres
ASCII text, with very long lines (28674), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\WC5Gv13cOQ.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:06 2023, mtime=Fri Aug 11 15:42:06 2023, atime=Sun Oct 13 04:28:54 2024, length=99712, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Generic INItialization configuration [folders]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\~$5Gv13cOQ.rtf
data
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Users\user\AppData\Roaming\taskhostw.exe
"C:\Users\user\AppData\Roaming\taskhostw.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Roaming\taskhostw.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Roaming\taskhostw.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\siqmroydgnmmmfpuczimwafbeumewarjhx"
malicious
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\ckvxrh"
malicious
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\feapszuyi"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://104.168.7.25/350/taskhostw.exej
unknown
malicious
http://104.168.7.25/350/taskhostw.exennC:
unknown
malicious
http://104.168.7.25/350/taskhostw.exe&c
unknown
malicious
http://104.168.7.25/350/taskhostw.exe
104.168.7.25
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
107.173.4.16
malicious
http://b.scorecardresearch.com/beacon.js
unknown
http://acdn.adnxs.com/ast/ast.js
unknown
http://www.imvu.comr
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
unknown
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
unknown
https://support.google.com
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
unknown
https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
unknown
http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
unknown
http://www.nirsoft.net
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://cache.btrll.com/default/Pix-1x1.gif
unknown
http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
unknown
https://www.google.com
unknown
http://geoplugin.net/json.gp/C
unknown
http://o.aolcdn.com/ads/adswrappermsni.js
unknown
http://cdn.taboola.com/libtrc/msn-home-network/loader.js
unknown
http://www.msn.com/?ocid=iehp
unknown
https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
unknown
http://static.chartbeat.com/js/chartbeat.js
unknown
http://www.msn.com/de-de/?ocid=iehp
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
unknown
http://www.nirsoft.net/
unknown
https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
unknown
http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
unknown
http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
unknown
https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
unknown
http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
unknown
https://www.ccleaner.com/go/app_cc_pro_trialkey
unknown
https://contextual.media.net/8/nrrV73987.js
unknown
http://www.imvu.com
unknown
https://contextual.media.net/
unknown
http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
unknown
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
unknown
http://www.msn.com/
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
unknown
https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
unknown
http://www.imvu.com/Y
unknown
http://cdn.at.atwola.com/_media/uac/msn.html
unknown
http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
unknown
https://policies.yahoo.com/w3c/p3p.xml
unknown
http://www.msn.com/advertisement.ad.js
unknown
http://www.ebuddy.com
unknown
There are 43 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50
malicious

IPs

IP
Domain
Country
Malicious
104.168.7.25
unknown
United States
malicious
107.173.4.16
unknown
United States
malicious
178.237.33.50
geoplugin.net
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Rmc-FI789R
exepath
malicious
HKEY_CURRENT_USER\Software\Rmc-FI789R
licence
malicious
HKEY_CURRENT_USER\Software\Rmc-FI789R
time
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
yd/
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Word
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
1e/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
+f/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\2908C
2908C
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
There are 313 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
system
page execute and read and write
malicious
794000
heap
page read and write
malicious
234000
heap
page read and write
malicious
D70000
direct allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
28E0000
direct allocation
page read and write
malicious
55E000
heap
page read and write
259E000
stack
page read and write
8D9000
heap
page read and write
2CA0000
direct allocation
page read and write
459000
system
page execute and read and write
6B1000
heap
page read and write
6B6000
heap
page read and write
957000
heap
page read and write
2AAE000
stack
page read and write
CF0000
unkown
page readonly
2BC0000
direct allocation
page read and write
2CA4000
direct allocation
page read and write
54D000
stack
page read and write
2CC0000
direct allocation
page read and write
51E000
stack
page read and write
2C11000
direct allocation
page read and write
31BD000
unclassified section
page execute and read and write
7CA000
heap
page read and write
144E000
unkown
page read and write
2990000
heap
page read and write
2A9D000
direct allocation
page read and write
73B000
heap
page read and write
2980000
heap
page read and write
2CA1000
direct allocation
page read and write
3FE0000
trusted library allocation
page read and write
400000
system
page execute and read and write
2B00000
heap
page read and write
2C00000
direct allocation
page read and write
50F000
stack
page read and write
3FE0000
trusted library allocation
page read and write
73A000
heap
page read and write
31A000
heap
page read and write
2CA0000
direct allocation
page read and write
1150000
direct allocation
page read and write
3FE0000
trusted library allocation
page read and write
2CA4000
direct allocation
page read and write
39CC000
stack
page read and write
DA0000
heap
page read and write
4F0000
heap
page read and write
803000
heap
page read and write
65F000
heap
page read and write
2B04000
heap
page read and write
1391000
unkown
page execute read
96B000
heap
page read and write
35B000
heap
page read and write
12BD000
direct allocation
page read and write
249F000
stack
page read and write
8CB000
heap
page read and write
1457000
unkown
page readonly
1444000
unkown
page readonly
2CA1000
direct allocation
page read and write
2BB0000
direct allocation
page read and write
268F000
stack
page read and write
2CA7000
direct allocation
page read and write
E00000
heap
page read and write
2CB4000
direct allocation
page read and write
63D000
heap
page read and write
264000
heap
page read and write
10000
heap
page read and write
294000
heap
page read and write
6CE000
heap
page read and write
352000
heap
page read and write
371000
heap
page read and write
2A9A000
direct allocation
page read and write
5EA000
stack
page read and write
478000
system
page execute and read and write
538000
heap
page read and write
10016000
direct allocation
page execute and read and write
2B08000
heap
page read and write
26D000
heap
page read and write
55B000
heap
page read and write
2C80000
direct allocation
page read and write
300000
heap
page read and write
3C8D000
stack
page read and write
328000
heap
page read and write
2CC0000
direct allocation
page read and write
2B2A000
direct allocation
page read and write
FA4000
heap
page read and write
10C000
stack
page read and write
2D10000
direct allocation
page read and write
50E000
stack
page read and write
2AE000
heap
page read and write
2B20000
direct allocation
page read and write
351000
heap
page read and write
69A000
heap
page read and write
26A000
heap
page read and write
29C000
heap
page read and write
1457000
unkown
page readonly
36F0000
heap
page read and write
20F000
stack
page read and write
400000
system
page execute and read and write
2BB0000
direct allocation
page read and write
730000
heap
page read and write
10000
heap
page read and write
DB2000
unkown
page write copy
576000
heap
page read and write
2B2A000
direct allocation
page read and write
478000
system
page execute and read and write
1390000
unkown
page readonly
2BC0000
direct allocation
page read and write
26B000
heap
page read and write
2CA7000
direct allocation
page read and write
188000
stack
page read and write
4EE000
heap
page read and write
777000
heap
page read and write
4EB000
heap
page read and write
10000
heap
page read and write
DA4000
unkown
page readonly
144E000
unkown
page read and write
3281000
heap
page read and write
6BD000
heap
page read and write
73A000
heap
page read and write
6BA000
heap
page read and write
2C90000
direct allocation
page read and write
294000
heap
page read and write
2BE000
heap
page read and write
30E000
heap
page read and write
300000
heap
page read and write
10000
heap
page read and write
2BD000
heap
page read and write
80F000
heap
page read and write
3D8D000
stack
page read and write
5E0000
direct allocation
page execute and read and write
2CB7000
direct allocation
page read and write
5C0000
heap
page read and write
2C90000
direct allocation
page read and write
1390000
unkown
page readonly
29C0000
direct allocation
page read and write
69D000
heap
page read and write
3FE0000
trusted library allocation
page read and write
3FE0000
trusted library allocation
page read and write
DAE000
unkown
page write copy
600000
heap
page read and write
53B000
heap
page read and write
2700000
trusted library allocation
page read and write
562000
heap
page read and write
6BD000
heap
page read and write
10000
heap
page read and write
371000
heap
page read and write
2CC0000
direct allocation
page read and write
2FAE000
stack
page read and write
406000
heap
page read and write
2CA0000
direct allocation
page read and write
26B000
heap
page read and write
26F4000
heap
page read and write
576000
heap
page read and write
695000
heap
page read and write
56C000
heap
page read and write
DB7000
unkown
page readonly
FA0000
heap
page read and write
4A0000
heap
page read and write
2B20000
direct allocation
page read and write
23DF000
stack
page read and write
4DF000
heap
page read and write
26D000
heap
page read and write
2B20000
direct allocation
page read and write
2AA000
heap
page read and write
2D10000
direct allocation
page read and write
95A000
heap
page read and write
2C11000
direct allocation
page read and write
2BA0000
direct allocation
page read and write
546000
heap
page read and write
564000
heap
page read and write
31B9000
unclassified section
page execute and read and write
3381000
heap
page read and write
2CB7000
direct allocation
page read and write
107000
stack
page read and write
840000
heap
page read and write
26F0000
heap
page read and write
3FE0000
trusted library allocation
page read and write
2AA000
heap
page read and write
670000
heap
page read and write
2D20000
direct allocation
page read and write
948000
heap
page read and write
144E000
unkown
page write copy
3372000
heap
page read and write
264000
heap
page read and write
2A80000
direct allocation
page read and write
1391000
unkown
page execute read
456000
system
page execute and read and write
3AF000
heap
page read and write
637000
heap
page read and write
3710000
trusted library allocation
page read and write
2BD000
heap
page read and write
13C000
stack
page read and write
3281000
heap
page read and write
5DF000
stack
page read and write
E6F000
stack
page read and write
6BB000
heap
page read and write
29C0000
direct allocation
page read and write
844000
heap
page read and write
5EC000
stack
page read and write
51F000
stack
page read and write
ACE000
stack
page read and write
473000
system
page execute and read and write
358D000
heap
page read and write
2BB0000
direct allocation
page read and write
3710000
trusted library allocation
page read and write
2CB0000
direct allocation
page read and write
3FE0000
trusted library allocation
page read and write
3570000
heap
page read and write
14D000
stack
page read and write
26AD000
heap
page read and write
2CB4000
direct allocation
page read and write
FC2000
heap
page read and write
55E000
heap
page read and write
4A0000
heap
page read and write
770000
heap
page read and write
2AEE000
stack
page read and write
294000
heap
page read and write
95B000
heap
page read and write
26B000
heap
page read and write
2C14000
direct allocation
page read and write
2C7000
heap
page read and write
25A1000
heap
page read and write
74C000
heap
page read and write
4E4000
heap
page read and write
3AF000
heap
page read and write
26CF000
stack
page read and write
2A50000
direct allocation
page read and write
1B0000
trusted library allocation
page read and write
2CA0000
direct allocation
page read and write
2D20000
direct allocation
page read and write
2D20000
direct allocation
page read and write
351000
heap
page read and write
538000
heap
page read and write
280000
heap
page read and write
3C0000
unclassified section
page execute and read and write
5B4000
heap
page read and write
956000
heap
page read and write
3FE0000
trusted library allocation
page read and write
4EB000
heap
page read and write
2EE000
heap
page read and write
3710000
trusted library allocation
page read and write
27EE000
stack
page read and write
170000
heap
page read and write
3F30000
trusted library allocation
page read and write
3DF000
unclassified section
page execute and read and write
480000
heap
page read and write
2719000
trusted library allocation
page read and write
926000
unclassified section
page execute and read and write
2CB4000
direct allocation
page read and write
5F0000
heap
page read and write
9AD000
heap
page read and write
DA4000
unkown
page readonly
12BA000
direct allocation
page read and write
9EA000
heap
page read and write
7CA000
heap
page read and write
73A000
heap
page read and write
10000
heap
page read and write
1150000
direct allocation
page read and write
4E7000
heap
page read and write
9C3000
heap
page read and write
703000
heap
page read and write
4E4000
heap
page read and write
1452000
unkown
page write copy
264000
heap
page read and write
6A4000
heap
page read and write
3710000
trusted library allocation
page read and write
3EF000
stack
page read and write
331000
heap
page read and write
AB0000
heap
page read and write
24CF000
stack
page read and write
39CF000
stack
page read and write
56C000
heap
page read and write
CF1000
unkown
page execute read
25A0000
trusted library allocation
page read and write
34D7000
heap
page read and write
2A00000
direct allocation
page read and write
18A000
stack
page read and write
2CB7000
direct allocation
page read and write
264000
heap
page read and write
540000
heap
page read and write
2C14000
direct allocation
page read and write
639000
heap
page read and write
474000
system
page execute and read and write
737000
heap
page read and write
235F000
stack
page read and write
56A000
heap
page read and write
31F000
heap
page read and write
39E000
heap
page read and write
2EA000
heap
page read and write
3710000
trusted library allocation
page read and write
3710000
trusted library allocation
page read and write
2CB0000
direct allocation
page read and write
6B9000
heap
page read and write
2BA0000
direct allocation
page read and write
25A1000
heap
page read and write
351B000
heap
page read and write
AD0000
heap
page read and write
22A4000
heap
page read and write
B90000
heap
page read and write
2CB1000
direct allocation
page read and write
22A0000
heap
page read and write
2C14000
direct allocation
page read and write
3FE0000
trusted library allocation
page read and write
2CA7000
direct allocation
page read and write
1457000
unkown
page readonly
62B000
heap
page read and write
2690000
heap
page read and write
736000
heap
page read and write
3710000
trusted library allocation
page read and write
39A000
heap
page read and write
25FD000
heap
page read and write
73A000
heap
page read and write
2A6E000
stack
page read and write
36AE000
stack
page read and write
610000
heap
page read and write
2BC0000
direct allocation
page read and write
2709000
heap
page read and write
BC000
stack
page read and write
3FE0000
trusted library allocation
page read and write
19C000
stack
page read and write
25FC000
heap
page read and write
331000
heap
page read and write
7BA000
heap
page read and write
3380000
heap
page read and write
140000
trusted library allocation
page read and write
3E8F000
stack
page read and write
2AF4000
heap
page read and write
26B000
heap
page read and write
180000
heap
page read and write
590000
heap
page read and write
294000
heap
page read and write
3710000
trusted library allocation
page read and write
627000
heap
page read and write
88000
stack
page read and write
A09000
heap
page read and write
354C000
heap
page read and write
3F30000
trusted library allocation
page read and write
2500000
heap
page read and write
2AE000
heap
page read and write
9FA000
heap
page read and write
6BA000
heap
page read and write
398E000
stack
page read and write
1150000
direct allocation
page read and write
5A0000
heap
page read and write
616000
heap
page read and write
25A0000
trusted library allocation
page read and write
2EF000
heap
page read and write
12BA000
direct allocation
page read and write
2C17000
direct allocation
page read and write
73A000
heap
page read and write
2C20000
direct allocation
page read and write
210000
heap
page read and write
6B6000
heap
page read and write
55E000
heap
page read and write
2C00000
direct allocation
page read and write
26D000
heap
page read and write
3D2E000
stack
page read and write
2CB0000
direct allocation
page read and write
24FD000
stack
page read and write
7CA000
heap
page read and write
39E000
heap
page read and write
354F000
heap
page read and write
8DB000
heap
page read and write
3B2000
heap
page read and write
957000
heap
page read and write
947000
heap
page read and write
2C17000
direct allocation
page read and write
2CB1000
direct allocation
page read and write
862000
heap
page read and write
560000
heap
page read and write
2B0B000
heap
page read and write
2713000
trusted library allocation
page read and write
60D000
stack
page read and write
122A000
direct allocation
page read and write
379000
heap
page read and write
E1F000
stack
page read and write
966000
heap
page read and write
6B0000
heap
page read and write
474000
system
page execute and read and write
264E000
stack
page read and write
563000
heap
page read and write
2AA000
heap
page read and write
4EE000
stack
page read and write
1C80000
heap
page read and write
654000
heap
page read and write
27AF000
stack
page read and write
6C2000
heap
page read and write
1CBB000
heap
page read and write
968000
heap
page read and write
8D0000
unclassified section
page execute and read and write
34E000
stack
page read and write
30E000
stack
page read and write
284000
heap
page read and write
3160000
unclassified section
page execute and read and write
141F000
unkown
page readonly
62F000
heap
page read and write
25A0000
trusted library allocation
page read and write
694000
heap
page read and write
366000
heap
page read and write
620000
heap
page read and write
1CC0000
direct allocation
page read and write
229F000
stack
page read and write
96D000
heap
page read and write
2AA000
heap
page read and write
3473000
heap
page read and write
2CB7000
direct allocation
page read and write
280000
heap
page read and write
CF0000
unkown
page readonly
25C000
stack
page read and write
3710000
trusted library allocation
page read and write
2C00000
direct allocation
page read and write
10000
heap
page read and write
6B9000
heap
page read and write
6AB000
heap
page read and write
11E0000
direct allocation
page read and write
3DB000
unclassified section
page execute and read and write
52C000
stack
page read and write
53F000
stack
page read and write
95A000
heap
page read and write
255000
heap
page read and write
2D7000
heap
page read and write
90000
heap
page read and write
737000
heap
page read and write
2AFB000
heap
page read and write
9EA000
heap
page read and write
F0000
heap
page read and write
DAE000
unkown
page read and write
23C0000
heap
page read and write
3A50000
heap
page read and write
99D000
heap
page read and write
52A000
stack
page read and write
396000
heap
page read and write
360000
heap
page read and write
4EB000
heap
page read and write
560000
heap
page read and write
AD6000
heap
page read and write
356F000
stack
page read and write
6A2000
heap
page read and write
360000
heap
page read and write
34EB000
heap
page read and write
6F4000
heap
page read and write
8DD000
heap
page read and write
5EE000
stack
page read and write
95A000
heap
page read and write
124000
stack
page read and write
2CC0000
direct allocation
page read and write
3280000
heap
page read and write
25E0000
heap
page read and write
1452000
unkown
page write copy
8DD000
heap
page read and write
736000
heap
page read and write
2CB7000
direct allocation
page read and write
3FE0000
trusted library allocation
page read and write
3750000
heap
page read and write
26D000
heap
page read and write
956000
heap
page read and write
310000
heap
page read and write
1390000
unkown
page readonly
320000
heap
page read and write
563000
heap
page read and write
23E2000
heap
page read and write
1AB000
stack
page read and write
2BB0000
direct allocation
page read and write
35AF000
heap
page read and write
351000
heap
page read and write
2B2D000
direct allocation
page read and write
6B5000
heap
page read and write
4EB000
heap
page read and write
B80000
heap
page read and write
54D000
stack
page read and write
249F000
stack
page read and write
26D000
heap
page read and write
1391000
unkown
page execute read
2CB1000
direct allocation
page read and write
1444000
unkown
page readonly
6BA000
heap
page read and write
144E000
unkown
page write copy
607000
heap
page read and write
11B000
stack
page read and write
2B2D000
direct allocation
page read and write
25A0000
heap
page read and write
7E9000
heap
page read and write
691000
heap
page read and write
2CB1000
direct allocation
page read and write
73B000
heap
page read and write
35B000
heap
page read and write
92C000
unclassified section
page execute and read and write
EA000
stack
page read and write
E4E000
stack
page read and write
6B7000
heap
page read and write
2A9A000
direct allocation
page read and write
2CA0000
direct allocation
page read and write
396000
heap
page read and write
714000
heap
page read and write
353000
heap
page read and write
2CB1000
direct allocation
page read and write
2D0000
heap
page read and write
6BB000
heap
page read and write
396000
heap
page read and write
77A000
heap
page read and write
2B41000
direct allocation
page read and write
10000
heap
page read and write
3B8F000
stack
page read and write
18C000
stack
page read and write
2BF000
heap
page read and write
331000
heap
page read and write
74B000
heap
page read and write
122A000
direct allocation
page read and write
2BB0000
direct allocation
page read and write
259000
heap
page read and write
2A9D000
direct allocation
page read and write
7EA000
heap
page read and write
2767000
heap
page read and write
D7F000
unkown
page readonly
294000
heap
page read and write
A0A000
heap
page read and write
141F000
unkown
page readonly
D7F000
unkown
page readonly
2712000
heap
page read and write
3EB0000
heap
page read and write
2B33000
direct allocation
page read and write
43D0000
heap
page read and write
3710000
trusted library allocation
page read and write
338000
heap
page read and write
76A000
heap
page read and write
897000
heap
page read and write
2A9D000
direct allocation
page read and write
217000
heap
page read and write
356000
heap
page read and write
28F000
stack
page read and write
95A000
heap
page read and write
22C2000
heap
page read and write
6BA000
heap
page read and write
359F000
heap
page read and write
2F2000
heap
page read and write
2B10000
direct allocation
page read and write
2AA000
heap
page read and write
34A2000
heap
page read and write
571000
heap
page read and write
11E0000
direct allocation
page read and write
2BC0000
direct allocation
page read and write
2BB0000
direct allocation
page read and write
540000
heap
page read and write
355F000
stack
page read and write
255000
heap
page read and write
2B10000
direct allocation
page read and write
2C80000
direct allocation
page read and write
6BA000
heap
page read and write
672000
heap
page read and write
3281000
heap
page read and write
3710000
trusted library allocation
page read and write
7DA000
heap
page read and write
D70000
heap
page read and write
41F000
system
page execute and read and write
31D3000
unclassified section
page execute and read and write
8CF000
stack
page read and write
9DA000
heap
page read and write
2D4000
heap
page read and write
614000
heap
page read and write
2D20000
direct allocation
page read and write
388D000
stack
page read and write
2BB0000
direct allocation
page read and write
5F7000
heap
page read and write
379000
heap
page read and write
2BB0000
direct allocation
page read and write
130000
direct allocation
page execute and read and write
7CB000
heap
page read and write
45D000
system
page execute and read and write
32F8000
heap
page read and write
3FE0000
trusted library allocation
page read and write
262000
heap
page read and write
7DA000
heap
page read and write
630000
heap
page read and write
597000
heap
page read and write
294000
heap
page read and write
1C85000
heap
page read and write
240000
heap
page read and write
3D0000
heap
page read and write
10000000
direct allocation
page read and write
2B0000
heap
page read and write
49C000
heap
page read and write
12BA000
direct allocation
page read and write
270F000
stack
page read and write
2CC0000
direct allocation
page read and write
568000
heap
page read and write
2CB1000
direct allocation
page read and write
11E0000
direct allocation
page read and write
2536000
heap
page read and write
52A000
stack
page read and write
26A000
heap
page read and write
122D000
direct allocation
page read and write
D6F000
stack
page read and write
32F8000
heap
page read and write
6BA000
heap
page read and write
5DE000
stack
page read and write
26A000
heap
page read and write
39C000
heap
page read and write
400000
system
page execute and read and write
4F0000
heap
page read and write
7BA000
heap
page read and write
4DC000
heap
page read and write
58F000
stack
page read and write
2A50000
direct allocation
page read and write
9DA000
heap
page read and write
1AD000
stack
page read and write
3710000
trusted library allocation
page read and write
3A40000
heap
page read and write
294000
heap
page read and write
DB7000
unkown
page readonly
2D20000
direct allocation
page read and write
57A000
heap
page read and write
130000
direct allocation
page execute and read and write
10000
heap
page read and write
6BA000
heap
page read and write
39E000
heap
page read and write
141F000
unkown
page readonly
3F30000
trusted library allocation
page read and write
330000
heap
page read and write
2C20000
direct allocation
page read and write
3FE0000
trusted library allocation
page read and write
28EF000
stack
page read and write
12A000
stack
page read and write
2BE000
heap
page read and write
2D20000
direct allocation
page read and write
5CF000
stack
page read and write
95A000
heap
page read and write
32C000
heap
page read and write
264000
heap
page read and write
52C000
stack
page read and write
39C000
heap
page read and write
2C20000
direct allocation
page read and write
73C000
heap
page read and write
2BC0000
direct allocation
page read and write
5F0000
direct allocation
page read and write
957000
heap
page read and write
76B000
heap
page read and write
2FE000
stack
page read and write
32F8000
heap
page read and write
6BB000
heap
page read and write
EB0000
heap
page read and write
23C4000
heap
page read and write
2AA000
heap
page read and write
20AF000
stack
page read and write
E00000
trusted library allocation
page read and write
3FE0000
trusted library allocation
page read and write
260000
heap
page read and write
255000
heap
page read and write
122D000
direct allocation
page read and write
45C000
system
page execute and read and write
2B6000
heap
page read and write
2C90000
direct allocation
page read and write
6BB000
heap
page read and write
39C000
heap
page read and write
737000
heap
page read and write
294000
heap
page read and write
273E000
stack
page read and write
2AA000
heap
page read and write
300000
heap
page read and write
63B000
heap
page read and write
980000
heap
page read and write
71F000
heap
page read and write
95A000
heap
page read and write
711000
heap
page read and write
141F000
unkown
page readonly
25A0000
trusted library allocation
page read and write
3710000
trusted library allocation
page read and write
572000
heap
page read and write
2CB4000
direct allocation
page read and write
52F000
stack
page read and write
EEF000
stack
page read and write
2AF8000
heap
page read and write
4A0000
heap
page read and write
371000
heap
page read and write
49C000
heap
page read and write
200000
heap
page read and write
2CA4000
direct allocation
page read and write
2EE0000
heap
page read and write
26D000
heap
page read and write
2CB4000
direct allocation
page read and write
75B000
heap
page read and write
35B4000
heap
page read and write
B86000
heap
page read and write
34EB000
heap
page read and write
8C0000
heap
page read and write
10001000
direct allocation
page execute and read and write
890000
heap
page read and write
73A000
heap
page read and write
1444000
unkown
page readonly
255000
heap
page read and write
DF0000
heap
page read and write
1E60000
direct allocation
page read and write
5F7000
heap
page read and write
2CB4000
direct allocation
page read and write
3710000
trusted library allocation
page read and write
1444000
unkown
page readonly
259000
heap
page read and write
290000
heap
page read and write
29C0000
direct allocation
page read and write
26D000
heap
page read and write
39E000
heap
page read and write
2D10000
direct allocation
page read and write
26AE000
heap
page read and write
2CC0000
direct allocation
page read and write
2B10000
direct allocation
page read and write
1AB000
stack
page read and write
74B000
heap
page read and write
3710000
trusted library allocation
page read and write
2C17000
direct allocation
page read and write
624000
heap
page read and write
2AA000
heap
page read and write
264000
heap
page read and write
614000
heap
page read and write
1A5000
stack
page read and write
10000
heap
page read and write
2BF000
heap
page read and write
25FD000
heap
page read and write
49C000
heap
page read and write
2F2000
heap
page read and write
6B6000
heap
page read and write
396000
heap
page read and write
3710000
trusted library allocation
page read and write
12BD000
direct allocation
page read and write
2DD000
stack
page read and write
4E7000
heap
page read and write
2CA1000
direct allocation
page read and write
4DB000
heap
page read and write
800000
heap
page read and write
2C80000
direct allocation
page read and write
4E0000
heap
page read and write
331000
heap
page read and write
2CA0000
direct allocation
page read and write
23EE000
stack
page read and write
35B000
heap
page read and write
2AE000
heap
page read and write
22D000
stack
page read and write
2C11000
direct allocation
page read and write
F2F000
stack
page read and write
26B000
heap
page read and write
3710000
trusted library allocation
page read and write
1390000
unkown
page readonly
1391000
unkown
page execute read
2BC0000
direct allocation
page read and write
6A6000
heap
page read and write
55D000
heap
page read and write
41B000
system
page execute and read and write
5F0000
heap
page read and write
2B2A000
direct allocation
page read and write
26D000
heap
page read and write
122A000
direct allocation
page read and write
940000
heap
page read and write
11F000
stack
page read and write
2A8D000
stack
page read and write
2A50000
direct allocation
page read and write
650000
heap
page read and write
727000
heap
page read and write
CF1000
unkown
page execute read
122D000
direct allocation
page read and write
1457000
unkown
page readonly
36EC000
stack
page read and write
2B2D000
direct allocation
page read and write
6CF000
heap
page read and write
3AF000
heap
page read and write
4EF000
stack
page read and write
3710000
trusted library allocation
page read and write
1DE000
stack
page read and write
34E1000
heap
page read and write
8B4000
heap
page read and write
3AF000
heap
page read and write
9EA000
heap
page read and write
379000
heap
page read and write
3A0F000
stack
page read and write
9BD000
heap
page read and write
89000
stack
page read and write
2AF0000
heap
page read and write
3240000
heap
page read and write
48E000
stack
page read and write
379000
heap
page read and write
2A9A000
direct allocation
page read and write
12BD000
direct allocation
page read and write
3DE000
stack
page read and write
371000
heap
page read and write
1DE000
stack
page read and write
2BB0000
direct allocation
page read and write
2BA0000
direct allocation
page read and write
3FE0000
trusted library allocation
page read and write
240000
heap
page read and write
6BA000
heap
page read and write
35B000
heap
page read and write
677000
heap
page read and write
2CB7000
direct allocation
page read and write
D1E000
stack
page read and write
547000
heap
page read and write
10000
heap
page read and write
26AD000
heap
page read and write
There are 783 hidden memdumps, click here to show them.