IOC Report
OKhCyJ619J.rtf

loading gif

Files

File Path
Type
Category
Malicious
OKhCyJ619J.rtf
Rich Text Format data, version 1
initial sample
malicious
C:\ProgramData\Remcos\remcos.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\fggrt\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\HJC[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\hjc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\Rdxcjsng
data
dropped
malicious
C:\Users\Public\Libraries\Rdxcjsng.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\easinvoker.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\netutils.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\Public\Rdxcjsng.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Rdxcjsng.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{129D962A-5FC6-4BE0-AE16-F065D9439DFB}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{394B02A8-4B26-437D-917E-451A70C83A85}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{AB72E720-F3E3-45DA-ADEC-6B3AF7E8AA01}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\bhv1FE0.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x0da30b1b, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\bhvF6ED.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x0da30b1b, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\pisbdjmsvpzm
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\qrvhclucfnyufuwghezckwpljsyrzdsj
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\OKhCyJ619J.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:03 2023, mtime=Fri Aug 11 15:42:03 2023, atime=Wed Apr 24 04:41:49 2024, length=65610, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Generic INItialization configuration [folders]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\Desktop\~$hCyJ619J.rtf
data
dropped
C:\Users\Public\Libraries\Null
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Libraries\RdxcjsngO.bat
Unicode text, UTF-16, little-endian text, with very long lines (15012), with no line terminators
dropped
C:\Users\Public\Libraries\aaa.bat
DOS batch file, ASCII text, with very long lines (468), with CRLF line terminators
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Users\user\AppData\Roaming\hjc.exe
"C:\Users\user\AppData\Roaming\hjc.exe"
malicious
C:\Windows\SysWOW64\extrac32.exe
C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\AppData\Roaming\hjc.exe C:\\Users\\Public\\Libraries\\Rdxcjsng.PIF
malicious
C:\ProgramData\Remcos\remcos.exe
"C:\ProgramData\Remcos\remcos.exe"
malicious
C:\Users\Public\Libraries\Rdxcjsng.PIF
"C:\Users\Public\Libraries\Rdxcjsng.PIF"
malicious
C:\ProgramData\Remcos\remcos.exe
C:\ProgramData\Remcos\remcos.exe /stext "C:\Users\user\AppData\Local\Temp\qrvhclucfnyufuwghezckwpljsyrzdsj"
malicious
C:\ProgramData\Remcos\remcos.exe
C:\ProgramData\Remcos\remcos.exe /stext "C:\Users\user\AppData\Local\Temp\amas"
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\ProgramData\Remcos\remcos.exe
C:\ProgramData\Remcos\remcos.exe /stext "C:\Users\user\AppData\Local\Temp\dgnkdwq"
malicious
C:\ProgramData\Remcos\remcos.exe
"C:\ProgramData\Remcos\remcos.exe"
malicious
C:\ProgramData\Remcos\remcos.exe
C:\ProgramData\Remcos\remcos.exe /stext "C:\Users\user\AppData\Local\Temp\pisbdjmsvpzm"
malicious
C:\ProgramData\Remcos\remcos.exe
C:\ProgramData\Remcos\remcos.exe /stext "C:\Users\user\AppData\Local\Temp\skxtebeuixrzqiq"
malicious
C:\ProgramData\Remcos\remcos.exe
C:\ProgramData\Remcos\remcos.exe /stext "C:\Users\user\AppData\Local\Temp\cecmfupoefjdsweembv"
malicious
C:\ProgramData\Remcos\remcos.exe
"C:\ProgramData\Remcos\remcos.exe"
malicious
C:\Users\Public\Libraries\Rdxcjsng.PIF
"C:\Users\Public\Libraries\Rdxcjsng.PIF"
malicious
C:\ProgramData\Remcos\remcos.exe
"C:\ProgramData\Remcos\remcos.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\RdxcjsngO.bat" "
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://103.198.26.173/360/HJC.exe
103.198.26.173
malicious
http://geoplugin.net/json.gp/C
unknown
malicious
uckdns.org
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
http://b.scorecardresearch.com/beacon.js
unknown
http://acdn.adnxs.com/ast/ast.js
unknown
http://www.imvu.comr
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
unknown
http://crl.comode
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://ocsp.entrust.net03
unknown
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
http://103.198.26.173/360/HJC.exej
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
https://www.adobe.
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
unknown
http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
unknown
https://onedrive.live.com/download?resid=FDB0512DE793B32E%21191&authkey=
unknown
https://support.google.comH
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://cache.btrll.com/default/Pix-1x1.gif
unknown
http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
unknown
https://www.google.com
unknown
https://live.com/4
unknown
https://live.com/7
unknown
http://103.198.26.173/360/HJC.exehhC:
unknown
https://live.com/9
unknown
http://o.aolcdn.com/ads/adswrappermsni.js
unknown
http://cdn.taboola.com/libtrc/msn-home-network/loader.js
unknown
http://www.msn.com/?ocid=iehp
unknown
https://live.com/
unknown
https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
unknown
http://static.chartbeat.com/js/chartbeat.js
unknown
http://www.msn.com/de-de/?ocid=iehp
unknown
https://onedrive.live.com/download?resid=FDB0512DE79
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
unknown
http://www.imvu.com/#
unknown
http://www.nirsoft.net/
unknown
http://ocsp.entrust.net0D
unknown
https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
unknown
http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
unknown
https://live.com/-
unknown
http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
unknown
https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
unknown
http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
unknown
https://www.ccleaner.com/go/app_cc_pro_trialkey
unknown
https://sectigo.com/CPS0
unknown
https://support.google.com/chrome/?p=plugin_fl
unknown
http://geoplugin.net/json.gpg
unknown
http://crl.entrust.net/server1.crl0
unknown
https://oqgpra.db.files.1drv.com/y4mYCQQoHB3biLh5JPth5_f-kOB87DNi8p0jtMSHrwPoPCEVl-mpqMaKw_mqKIpuxjn
unknown
https://contextual.media.net/8/nrrV73987.js
unknown
http://www.imvu.com
unknown
https://oqgpra.db.files.1drv.com/y4m1QphtspBBMGygafIGFYGxEUuSWjKY2dMrUpXGeJNpqtj0i_A5B0XA1Aj7IMN8zjT
unknown
https://contextual.media.net/
unknown
https://oqgpra.db.files.1drv.com/y4mpZajfWPqKjdE4uGrq5tmWJHmffdrvebeUi1KiWBx9grNpUr-Q2JlZ3LArHG3A_O0
unknown
http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
unknown
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
unknown
https://oqgpra.db.files.1drv.com/y4mpZ
unknown
https://support.google.com/chrome/h
unknown
http://www.msn.com/
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
unknown
http://www.imvu.com/T
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
https://www.adobe.c
unknown
https://onedrive.live.com/download?resid=FDB0512DE793B32E%21191&authkey=!ANO4kMGOfcJo8rs
13.107.137.11
https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
unknown
https://live.com/v
unknown
https://oqgpra.db.files.1drv.com/y4mTC_XyZRHB379OztWxqX44YH0ZY7OaAZhjXGrl4fCtKBoRTQqeK6A_lQZwfjwKNP7
unknown
https://oqgpra.db.files.1drv.com/y4m8jjd3f9BpBLsSbDI3D4w4BLmop1yruq85sZlFAr-4Rol8mEokjtpsS6ivaddcrG-
unknown
http://cdn.at.atwola.com/_media/uac/msn.html
unknown
https://live.com/e
unknown
http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
unknown
https://secure.comodo.com/CPS0
unknown
http://www.pmail.com
unknown
https://policies.yahoo.com/w3c/p3p.xml
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://ocsp.sectigo.com0C
unknown
http://www.msn.com/advertisement.ad.js
unknown
https://support.google.com/chrome/?p=ph
unknown
http://www.ebuddy.com
unknown
https://oqgpra.db.files.1drv.com/y4mio8rSS_2jC5-0VIhrGMPPnTg6gYb3Bxmu9ktmO2sVy1Vu5NgT_hEOa73bPesLFGH
unknown
There are 82 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
kenoss.duckdns.org
103.186.117.100
malicious
dual-spov-0006.spov-msedge.net
13.107.137.11
geoplugin.net
178.237.33.50
oqgpra.db.files.1drv.com
unknown
onedrive.live.com
unknown

IPs

IP
Domain
Country
Malicious
103.186.117.100
kenoss.duckdns.org
unknown
malicious
103.198.26.173
unknown
unknown
malicious
13.107.137.11
dual-spov-0006.spov-msedge.net
United States
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Rdxcjsng
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Rmc-L24XL1
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Rmc-L24XL1
exepath
malicious
HKEY_CURRENT_USER\Software\Rmc-L24XL1
licence
malicious
HKEY_CURRENT_USER\Software\Rmc-L24XL1
time
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
,k.
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Word
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
"m.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
gn.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\288EE
288EE
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\32A6A
32A6A
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\32A6A
32A6A
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\32A6A
32A6A
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\32A6A
32A6A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run
Rmc-L24XL1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
There are 371 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2CF000
heap
page read and write
malicious
6E7000
heap
page read and write
malicious
3191000
direct allocation
page execute read
malicious
2FD0000
direct allocation
page read and write
malicious
7A9000
heap
page read and write
malicious
2B9000
heap
page read and write
malicious
729000
heap
page read and write
malicious
15CA0000
trusted library allocation
page execute and read and write
malicious
71F000
heap
page read and write
malicious
3321000
direct allocation
page execute read
malicious
30A1000
direct allocation
page execute read
malicious
695000
heap
page read and write
malicious
3331000
direct allocation
page execute read
malicious
6A9000
heap
page read and write
malicious
6D8000
heap
page read and write
malicious
3231000
direct allocation
page execute read
malicious
31D1000
direct allocation
page execute read
malicious
7DA80000
trusted library allocation
page read and write
malicious
3130000
direct allocation
page read and write
malicious
23E4000
heap
page read and write
14890000
heap
page read and write
154F0000
trusted library allocation
page read and write
26AF000
stack
page read and write
15820000
trusted library allocation
page read and write
32EC000
direct allocation
page read and write
31C0000
direct allocation
page read and write
15960000
trusted library allocation
page read and write
14D27000
trusted library allocation
page execute and read and write
56D000
unkown
page read and write
31AC000
direct allocation
page read and write
856D000
heap
page read and write
1457A000
trusted library allocation
page read and write
31BD000
direct allocation
page read and write
14663000
trusted library allocation
page read and write
10000
heap
page read and write
3310000
direct allocation
page read and write
2E0CC000
trusted library allocation
page read and write
534000
heap
page read and write
18D000
stack
page read and write
3304000
direct allocation
page read and write
312000
heap
page read and write
3310000
direct allocation
page read and write
15010000
heap
page read and write
309C000
direct allocation
page read and write
215E000
heap
page read and write
8FE0000
trusted library allocation
page read and write
31BB000
direct allocation
page read and write
30CB000
direct allocation
page read and write
1FCE000
stack
page read and write
7DCC0000
trusted library allocation
page read and write
31B4000
direct allocation
page read and write
6DF000
stack
page read and write
2490000
heap
page read and write
2E065000
trusted library allocation
page read and write
15507000
trusted library allocation
page execute and read and write
1465C000
trusted library allocation
page read and write
2052000
heap
page read and write
7E611000
trusted library allocation
page read and write
152ED000
stack
page read and write
157E7000
trusted library allocation
page execute and read and write
31AC000
direct allocation
page read and write
15812000
unkown
page read and write
2154000
heap
page read and write
3074000
direct allocation
page read and write
2E090000
trusted library allocation
page read and write
31B1000
direct allocation
page read and write
715000
heap
page read and write
7EE00000
trusted library allocation
page read and write
3304000
direct allocation
page read and write
5D9000
heap
page read and write
1C3E000
heap
page read and write
2FA0000
direct allocation
page read and write
2187000
heap
page read and write
694000
heap
page read and write
1E70000
direct allocation
page read and write
2EBC000
direct allocation
page read and write
3284000
direct allocation
page read and write
3084000
direct allocation
page read and write
7E548000
trusted library allocation
page read and write
3092000
direct allocation
page read and write
188000
stack
page read and write
1C6B000
heap
page read and write
8BE000
heap
page read and write
34B000
heap
page read and write
2FB000
heap
page read and write
31EF000
direct allocation
page read and write
696000
heap
page read and write
146E6000
trusted library allocation
page read and write
2EA0D000
trusted library allocation
page read and write
1501F000
stack
page read and write
6D3000
heap
page read and write
656000
heap
page read and write
20AE000
heap
page read and write
8594000
heap
page read and write
307C000
direct allocation
page read and write
151F0000
trusted library allocation
page read and write
10000
heap
page read and write
29C000
heap
page read and write
25B0000
heap
page read and write
309C000
direct allocation
page read and write
5DC000
stack
page read and write
7DDA0000
trusted library allocation
page read and write
2E6000
heap
page read and write
2F50000
direct allocation
page read and write
2DE91000
trusted library allocation
page execute and read and write
31A8000
direct allocation
page read and write
14556000
trusted library allocation
page read and write
147F4000
trusted library allocation
page read and write
3074000
direct allocation
page read and write
285F000
stack
page read and write
14E79000
trusted library allocation
page execute and read and write
32F4000
direct allocation
page read and write
1D0000
heap
page read and write
7DB10000
trusted library allocation
page read and write
148BC000
stack
page read and write
3088000
direct allocation
page read and write
2ED3000
direct allocation
page read and write
14D31000
trusted library allocation
page execute and read and write
630000
heap
page read and write
8E71000
heap
page read and write
31A9000
direct allocation
page read and write
5F7000
heap
page read and write
20F3000
heap
page read and write
3304000
direct allocation
page read and write
32FC000
direct allocation
page read and write
7B1000
heap
page read and write
30F3000
direct allocation
page read and write
572000
heap
page read and write
28C000
heap
page read and write
14BF9000
heap
page read and write
14CBF000
stack
page read and write
475000
system
page execute and read and write
10000
heap
page read and write
150EF000
stack
page read and write
7C7000
heap
page read and write
2E0CD000
unkown
page read and write
3312000
direct allocation
page read and write
1D47000
heap
page read and write
10000
heap
page read and write
7DCA0000
trusted library allocation
page read and write
1BDC000
heap
page read and write
331C000
direct allocation
page read and write
2E56F000
stack
page read and write
5A4000
heap
page read and write
2ED0000
direct allocation
page read and write
1446D000
trusted library allocation
page read and write
2D44000
heap
page read and write
1F30000
heap
page read and write
56D000
unkown
page read and write
2E08F000
trusted library allocation
page read and write
31A4000
direct allocation
page read and write
30B000
heap
page read and write
3150000
direct allocation
page read and write
1480A000
trusted library allocation
page read and write
146D8000
trusted library allocation
page read and write
14F6F000
stack
page read and write
86E0000
heap
page read and write
2E1C000
direct allocation
page read and write
1C32000
heap
page read and write
200F000
stack
page read and write
2E2FF000
stack
page read and write
2E761000
trusted library allocation
page read and write
308B000
direct allocation
page read and write
612000
heap
page read and write
20000
heap
page read and write
8B6D000
stack
page read and write
207F000
stack
page read and write
7DE90000
trusted library allocation
page read and write
1BDC000
heap
page read and write
31A4000
direct allocation
page read and write
1C99000
heap
page read and write
1491B000
stack
page read and write
14440000
trusted library allocation
page read and write
18D000
stack
page read and write
31B6000
direct allocation
page read and write
31B4000
direct allocation
page read and write
14581000
trusted library allocation
page read and write
336000
heap
page read and write
56D000
unkown
page read and write
3CD000
stack
page read and write
7D970000
trusted library allocation
page read and write
1EFA000
heap
page read and write
25F000
stack
page read and write
302000
heap
page read and write
5C0000
heap
page read and write
2D89000
direct allocation
page read and write
31A8000
direct allocation
page read and write
7E560000
trusted library allocation
page read and write
2DC000
heap
page read and write
292F000
stack
page read and write
14917000
heap
page read and write
147FC000
trusted library allocation
page read and write
2500000
trusted library allocation
page read and write
7BE000
heap
page read and write
14BC0000
heap
page read and write
7E250000
trusted library allocation
page read and write
1449D000
trusted library allocation
page read and write
3304000
direct allocation
page read and write
15D18000
trusted library allocation
page execute and read and write
7DA80000
trusted library allocation
page read and write
7EE00000
trusted library allocation
page read and write
20BC000
stack
page read and write
14A0F000
stack
page read and write
2D53C000
stack
page read and write
20AC000
stack
page read and write
280000
heap
page read and write
3B0000
trusted library allocation
page read and write
1B0000
direct allocation
page execute and read and write
14B0E000
stack
page read and write
15815000
unkown
page read and write
270000
heap
page read and write
331C000
direct allocation
page read and write
14524000
trusted library allocation
page read and write
2519000
trusted library allocation
page read and write
7E380000
trusted library allocation
page read and write
726000
heap
page read and write
1B8F000
stack
page read and write
148BF000
stack
page read and write
7E5AF000
trusted library allocation
page read and write
334000
heap
page read and write
2D40000
heap
page read and write
158AB000
trusted library allocation
page execute and read and write
14B80000
heap
page read and write
31B4000
direct allocation
page read and write
6A6000
heap
page read and write
3090000
direct allocation
page read and write
31A8000
direct allocation
page read and write
7B5000
heap
page read and write
62E000
heap
page read and write
1EB000
heap
page read and write
7E3A0000
trusted library allocation
page read and write
540000
heap
page read and write
3078000
direct allocation
page read and write
147E6000
trusted library allocation
page read and write
4BF000
stack
page read and write
31C0000
direct allocation
page read and write
238E000
stack
page read and write
5B4000
heap
page read and write
31A8000
direct allocation
page read and write
2E047000
trusted library allocation
page read and write
2F38000
direct allocation
page read and write
7DA80000
trusted library allocation
page read and write
670000
heap
page read and write
22A8000
heap
page read and write
157A1000
trusted library allocation
page read and write
31D000
heap
page read and write
15887000
trusted library allocation
page execute and read and write
2F68000
direct allocation
page read and write
7AF000
heap
page read and write
32FC000
direct allocation
page read and write
5A0000
direct allocation
page read and write
147CF000
stack
page read and write
2CB000
heap
page read and write
2DA3E000
stack
page read and write
145DF000
trusted library allocation
page read and write
2EA0B000
trusted library allocation
page read and write
14818000
trusted library allocation
page read and write
295F000
stack
page read and write
23C000
heap
page read and write
26E000
heap
page read and write
149BE000
stack
page read and write
2E0C0000
unkown
page read and write
14BEE000
stack
page read and write
14FEC000
stack
page read and write
20AF000
heap
page read and write
2EEAF000
stack
page read and write
2E060000
unkown
page read and write
7EE00000
trusted library allocation
page read and write
35D000
stack
page read and write
31B4000
direct allocation
page read and write
167000
stack
page read and write
14532000
trusted library allocation
page read and write
5F0000
heap
page read and write
14686000
trusted library allocation
page read and write
8C6F000
stack
page read and write
32FC000
direct allocation
page read and write
157E9000
trusted library allocation
page execute and read and write
147C0000
trusted library allocation
page read and write
1456E000
trusted library allocation
page read and write
15550000
trusted library allocation
page read and write
2EEEF000
stack
page read and write
31A8000
direct allocation
page read and write
20EF000
stack
page read and write
31C4000
direct allocation
page read and write
458000
unkown
page read and write
627000
heap
page read and write
31A8000
direct allocation
page read and write
149D0000
heap
page read and write
45C000
system
page execute and read and write
5B8000
heap
page read and write
1542F000
stack
page read and write
5F4000
heap
page read and write
14E11000
trusted library allocation
page execute and read and write
31C1000
direct allocation
page read and write
320000
heap
page read and write
340000
heap
page read and write
31A4000
direct allocation
page read and write
18D000
stack
page read and write
3300000
direct allocation
page read and write
36E000
stack
page read and write
1573E000
trusted library allocation
page read and write
2E24000
direct allocation
page read and write
7E6E0000
trusted library allocation
page read and write
61E000
direct allocation
page read and write
14803000
trusted library allocation
page read and write
18D000
stack
page read and write
3304000
direct allocation
page read and write
27F000
stack
page read and write
14E7C000
stack
page read and write
2DC7F000
stack
page read and write
26A000
heap
page read and write
2DE90000
trusted library allocation
page read and write
62D000
heap
page read and write
14E84000
trusted library allocation
page execute and read and write
7E540000
trusted library allocation
page read and write
2E0000
heap
page read and write
1584F000
trusted library allocation
page execute and read and write
2F12F000
stack
page read and write
1F00000
direct allocation
page read and write
3030000
direct allocation
page read and write
3BD000
stack
page read and write
10000
heap
page read and write
250000
trusted library allocation
page read and write
2E06B000
trusted library allocation
page read and write
1A2000
heap
page read and write
14BC2000
heap
page read and write
796000
heap
page read and write
799000
heap
page read and write
21C3000
direct allocation
page read and write
31C0000
direct allocation
page read and write
31C0000
direct allocation
page read and write
310000
heap
page read and write
34F000
heap
page read and write
10000
heap
page read and write
5F4000
heap
page read and write
2E30000
direct allocation
page read and write
31A8000
direct allocation
page read and write
6E4000
heap
page read and write
5B0000
heap
page read and write
3090000
direct allocation
page read and write
1D90000
heap
page read and write
25AE000
stack
page read and write
1EE0000
heap
page read and write
14D34000
trusted library allocation
page execute and read and write
1E60000
heap
page read and write
7DFB0000
trusted library allocation
page read and write
308C000
direct allocation
page read and write
31CC000
direct allocation
page read and write
3084000
direct allocation
page read and write
8FE0000
trusted library allocation
page read and write
17F000
stack
page read and write
30B8000
direct allocation
page read and write
7E540000
trusted library allocation
page read and write
3DF000
heap
page read and write
14EAF000
stack
page read and write
290000
heap
page read and write
1514E000
stack
page read and write
31C1000
direct allocation
page read and write
2619000
trusted library allocation
page read and write
32C000
heap
page read and write
147C8000
trusted library allocation
page read and write
31BB000
direct allocation
page read and write
2290000
heap
page read and write
188000
stack
page read and write
1BE0000
heap
page read and write
45D000
system
page execute and read and write
1EB0000
heap
page read and write
15745000
unkown
page read and write
9BE000
stack
page read and write
2070000
heap
page read and write
1532F000
stack
page read and write
148F9000
heap
page read and write
15880000
trusted library allocation
page read and write
7E5AF000
trusted library allocation
page read and write
21D8000
heap
page read and write
15760000
unkown
page read and write
1455D000
trusted library allocation
page read and write
3098000
direct allocation
page read and write
7DC30000
trusted library allocation
page read and write
14AB0000
heap
page read and write
20DB000
heap
page read and write
1DEF000
stack
page read and write
3003000
direct allocation
page read and write
31A9000
direct allocation
page read and write
1EB0000
heap
page read and write
14350000
trusted library allocation
page read and write
57E000
heap
page read and write
14E3B000
trusted library allocation
page execute and read and write
10000
heap
page read and write
31CC000
direct allocation
page read and write
31BB000
direct allocation
page read and write
3F0000
heap
page read and write
7DC18000
trusted library allocation
page read and write
307C000
direct allocation
page read and write
7AB000
heap
page read and write
86CE000
stack
page read and write
290000
heap
page read and write
144E0000
trusted library allocation
page read and write
331C000
direct allocation
page read and write
1449D000
trusted library allocation
page read and write
61E000
stack
page read and write
2294000
heap
page read and write
20A4000
heap
page read and write
228F000
stack
page read and write
5A4000
heap
page read and write
31CC000
direct allocation
page read and write
2E671000
trusted library allocation
page read and write
2145000
heap
page read and write
2E963000
trusted library allocation
page read and write
20A0000
remote allocation
page read and write
7E550000
trusted library allocation
page read and write
7EE00000
trusted library allocation
page read and write
2FE8000
direct allocation
page read and write
295000
heap
page read and write
2D63A000
stack
page read and write
5A4000
heap
page read and write
214A000
heap
page read and write
595000
heap
page read and write
2FF0000
direct allocation
page read and write
236F000
stack
page read and write
149CE000
stack
page read and write
15891000
trusted library allocation
page execute and read and write
564000
heap
page read and write
799000
heap
page read and write
14D3E000
stack
page read and write
1EFC000
stack
page read and write
31A4000
direct allocation
page read and write
2E0C0000
unkown
page read and write
14480000
trusted library allocation
page read and write
3304000
direct allocation
page read and write
3153000
direct allocation
page read and write
18C000
stack
page read and write
3540000
heap
page read and write
155F0000
trusted library allocation
page read and write
7BE000
heap
page read and write
7E2D0000
trusted library allocation
page read and write
31B5000
direct allocation
page read and write
8F70000
trusted library allocation
page read and write
158C0000
trusted library allocation
page read and write
4CE000
stack
page read and write
144AF000
trusted library allocation
page read and write
2CDF000
stack
page read and write
20F2000
heap
page read and write
3318000
direct allocation
page read and write
1C36000
heap
page read and write
14C17000
heap
page read and write
7DF80000
trusted library allocation
page read and write
6F0000
heap
page read and write
1445D000
trusted library allocation
page read and write
30D0000
direct allocation
page read and write
510000
heap
page read and write
21DF000
heap
page read and write
14E30000
heap
page read and write
7DFF0000
trusted library allocation
page read and write
3084000
direct allocation
page read and write
15880000
trusted library allocation
page read and write
1B0000
heap
page read and write
396000
heap
page read and write
9E0000
heap
page read and write
3310000
direct allocation
page read and write
7E3E0000
trusted library allocation
page read and write
7E540000
trusted library allocation
page read and write
145ED000
trusted library allocation
page read and write
152CE000
stack
page read and write
15530000
trusted library allocation
page read and write
3000000
direct allocation
page read and write
14F7D000
stack
page read and write
154A0000
trusted library allocation
page read and write
14A1D000
stack
page read and write
1E5F000
stack
page read and write
183000
stack
page read and write
8DBF000
stack
page read and write
15550000
trusted library allocation
page read and write
7E540000
trusted library allocation
page read and write
209E000
stack
page read and write
27E000
heap
page read and write
3304000
direct allocation
page read and write
32C000
heap
page read and write
30B000
heap
page read and write
220000
direct allocation
page execute and read and write
14C50000
heap
page read and write
1484C000
stack
page read and write
7E550000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
14564000
trusted library allocation
page read and write
14A79000
heap
page read and write
2DA20000
trusted library allocation
page read and write
56D000
unkown
page read and write
2E0CE000
unkown
page read and write
400000
system
page execute and read and write
31B5000
direct allocation
page read and write
216F000
heap
page read and write
2BE000
stack
page read and write
5D7000
heap
page read and write
10000
heap
page read and write
249F000
stack
page read and write
8D0000
heap
page read and write
2343000
direct allocation
page read and write
294000
heap
page read and write
237000
heap
page read and write
2613000
trusted library allocation
page read and write
3090000
direct allocation
page read and write
7EE00000
trusted library allocation
page read and write
22A3000
heap
page read and write
2BD8000
heap
page read and write
14DE0000
heap
page read and write
214E000
heap
page read and write
1572B000
unkown
page read and write
145FF000
trusted library allocation
page read and write
458000
unkown
page read and write
1C37000
heap
page read and write
2E098000
trusted library allocation
page read and write
14CEF000
trusted library allocation
page execute and read and write
2E855000
trusted library allocation
page read and write
345000
heap
page read and write
31AD000
direct allocation
page read and write
200F000
stack
page read and write
80C000
heap
page read and write
31B4000
direct allocation
page read and write
858F000
heap
page read and write
293F000
stack
page read and write
18D000
stack
page read and write
637000
heap
page read and write
610000
heap
page read and write
14711000
trusted library allocation
page read and write
2D8FD000
stack
page read and write
146FC000
trusted library allocation
page read and write
2169000
heap
page read and write
1584B000
trusted library allocation
page execute and read and write
2A6000
heap
page read and write
2060000
heap
page read and write
2E38000
direct allocation
page read and write
7DFF0000
trusted library allocation
page read and write
280000
heap
page read and write
14703000
trusted library allocation
page read and write
760000
heap
page read and write
8FE0000
trusted library allocation
page read and write
146CF000
stack
page read and write
2E66F000
stack
page read and write
159B4000
trusted library allocation
page read and write
2178000
heap
page read and write
2E9DB000
trusted library allocation
page read and write
61C000
stack
page read and write
15250000
trusted library allocation
page read and write
3315000
direct allocation
page read and write
14A1F000
stack
page read and write
2294000
heap
page read and write
31CA000
direct allocation
page read and write
31A8000
direct allocation
page read and write
5AB000
heap
page read and write
67A000
heap
page read and write
31FB000
direct allocation
page read and write
15250000
trusted library allocation
page read and write
157AF000
trusted library allocation
page execute and read and write
2110000
heap
page read and write
10000
heap
page read and write
14588000
trusted library allocation
page read and write
216F000
stack
page read and write
14694000
trusted library allocation
page read and write
14CFF000
stack
page read and write
400000
system
page execute and read and write
886E000
stack
page read and write
571000
unkown
page readonly
1E6E000
direct allocation
page read and write
215A000
heap
page read and write
228E000
stack
page read and write
2C0000
heap
page read and write
310000
heap
page read and write
230000
heap
page read and write
8D000
stack
page read and write
2E8EA000
trusted library allocation
page read and write
6F7000
heap
page read and write
400000
heap
page read and write
2123000
heap
page read and write
18E000
stack
page read and write
31A4000
direct allocation
page read and write
2160000
heap
page read and write
230000
heap
page read and write
146D0000
trusted library allocation
page read and write
2146000
heap
page read and write
20D4000
heap
page read and write
2F4000
heap
page read and write
31C2000
direct allocation
page read and write
1D0000
heap
page read and write
7DD30000
trusted library allocation
page read and write
31A4000
direct allocation
page read and write
2EFEF000
stack
page read and write
380000
heap
page read and write
14DBF000
stack
page read and write
767000
heap
page read and write
50E000
stack
page read and write
51F000
heap
page read and write
3231000
direct allocation
page read and write
7A8000
heap
page read and write
148B7000
heap
page read and write
209A000
heap
page read and write
3134000
direct allocation
page read and write
14A72000
heap
page read and write
2F54000
direct allocation
page read and write
18D000
stack
page read and write
2096000
heap
page read and write
57D000
heap
page read and write
309C000
direct allocation
page read and write
14E41000
heap
page read and write
7E560000
trusted library allocation
page read and write
31BD000
direct allocation
page read and write
2E0CD000
trusted library allocation
page read and write
14A70000
heap
page read and write
7E310000
trusted library allocation
page read and write
2E08F000
trusted library allocation
page read and write
1532F000
stack
page read and write
14718000
trusted library allocation
page read and write
277000
heap
page read and write
2E107000
unkown
page read and write
14D8F000
stack
page read and write
7DDC0000
trusted library allocation
page read and write
62E000
heap
page read and write
88000
stack
page read and write
240000
heap
page read and write
7DA80000
trusted library allocation
page read and write
3314000
direct allocation
page read and write
150FD000
stack
page read and write
2154000
heap
page read and write
2A9000
heap
page read and write
2E870000
trusted library allocation
page read and write
2D0000
heap
page read and write
8E70000
heap
page read and write
7E37F000
trusted library allocation
page read and write
2ED000
stack
page read and write
1450F000
trusted library allocation
page read and write
294000
heap
page read and write
15650000
trusted library allocation
page read and write
540000
heap
page read and write
146F4000
trusted library allocation
page read and write
5A8000
heap
page read and write
20F2000
heap
page read and write
3095000
direct allocation
page read and write
31AD000
direct allocation
page read and write
3310000
direct allocation
page read and write
2E107000
unkown
page read and write
1C32000
heap
page read and write
147FA000
trusted library allocation
page read and write
2A9000
heap
page read and write
14FAD000
stack
page read and write
147AF000
trusted library allocation
page read and write
2D7BD000
stack
page read and write
47D000
heap
page read and write
14E81000
trusted library allocation
page execute and read and write
31EC000
direct allocation
page read and write
31B2000
direct allocation
page read and write
2074000
heap
page read and write
8D000
stack
page read and write
281F000
stack
page read and write
7DFF0000
trusted library allocation
page read and write
2E065000
unkown
page read and write
799000
heap
page read and write
2E33F000
stack
page read and write
2BDD000
stack
page read and write
240000
heap
page read and write
458000
unkown
page read and write
31A9000
direct allocation
page read and write
7E560000
trusted library allocation
page read and write
2E871000
trusted library allocation
page read and write
7E478000
trusted library allocation
page read and write
2FF1000
direct allocation
page read and write
26B000
stack
page read and write
21FB000
heap
page read and write
7DEE0000
trusted library allocation
page read and write
240000
heap
page read and write
2BDB000
heap
page read and write
204E000
stack
page read and write
401000
unkown
page execute read
259F000
stack
page read and write
31BE000
direct allocation
page read and write
14D2B000
trusted library allocation
page execute and read and write
632000
heap
page read and write
32F8000
direct allocation
page read and write
1528F000
stack
page read and write
31B8000
direct allocation
page read and write
316000
heap
page read and write
21E3000
heap
page read and write
2143000
heap
page read and write
15781000
trusted library allocation
page execute and read and write
3152000
direct allocation
page read and write
5CF000
heap
page read and write
1C71000
heap
page read and write
88000
stack
page read and write
8C000
stack
page read and write
65E000
stack
page read and write
3C0000
heap
page read and write
458000
unkown
page read and write
7A7000
heap
page read and write
3078000
direct allocation
page read and write
154D0000
trusted library allocation
page read and write
1CFF000
stack
page read and write
3004000
direct allocation
page read and write
319C000
direct allocation
page read and write
224E000
stack
page read and write
3310000
direct allocation
page read and write
184000
heap
page read and write
220000
heap
page read and write
8E72000
heap
page read and write
8FE0000
trusted library allocation
page read and write
1C6D000
heap
page read and write
2ABE000
stack
page read and write
320C000
direct allocation
page read and write
1D2A000
heap
page read and write
2C8000
heap
page read and write
152CD000
stack
page read and write
31C0000
direct allocation
page read and write
14DE2000
heap
page read and write
1481A000
stack
page read and write
1460F000
trusted library allocation
page read and write
151ED000
stack
page read and write
289000
heap
page read and write
325B000
direct allocation
page read and write
1DF0000
direct allocation
page read and write
14DAF000
stack
page read and write
14B70000
heap
page read and write
1451F000
trusted library allocation
page read and write
3090000
direct allocation
page read and write
14F80000
heap
page read and write
14BAF000
stack
page read and write
30E000
heap
page read and write
7E160000
trusted library allocation
page read and write
215F000
heap
page read and write
1C37000
heap
page read and write
1BDC000
heap
page read and write
7DB10000
trusted library allocation
page read and write
144AF000
trusted library allocation
page read and write
5B3000
heap
page read and write
3381000
direct allocation
page read and write
7B4000
heap
page read and write
7E540000
trusted library allocation
page read and write
158A0000
trusted library allocation
page execute and read and write
18A000
stack
page read and write
8930000
heap
page read and write
14D00000
heap
page read and write
1C2E000
heap
page read and write
14540000
trusted library allocation
page read and write
2095000
heap
page read and write
147ED000
trusted library allocation
page read and write
2513000
trusted library allocation
page read and write
547000
heap
page read and write
17F000
stack
page read and write
146ED000
trusted library allocation
page read and write
3091000
direct allocation
page read and write
2FA3000
direct allocation
page read and write
7B1000
heap
page read and write
147D6000
trusted library allocation
page read and write
308000
heap
page read and write
15721000
trusted library allocation
page read and write
26EE000
stack
page read and write
89000
stack
page read and write
146B8000
trusted library allocation
page read and write
7E610000
trusted library allocation
page read and write
15110000
trusted library allocation
page read and write
184000
stack
page read and write
1C26000
heap
page read and write
7B9000
heap
page read and write
7BA000
heap
page read and write
248000
heap
page read and write
294000
heap
page read and write
3084000
direct allocation
page read and write
2DEEF000
stack
page read and write
1C10000
heap
page read and write
8BE000
heap
page read and write
10000
heap
page read and write
32F4000
direct allocation
page read and write
158F4000
trusted library allocation
page execute and read and write
33E000
direct allocation
page read and write
1E90000
direct allocation
page read and write
620000
heap
page read and write
1C2E000
heap
page read and write
31A0000
direct allocation
page read and write
2030000
heap
page read and write
8FE0000
trusted library allocation
page read and write
31AB000
direct allocation
page read and write
10000
heap
page read and write
1DFE000
direct allocation
page read and write
7D8A0000
trusted library allocation
page read and write
14FEF000
stack
page read and write
2F6000
heap
page read and write
7B9000
heap
page read and write
2E060000
trusted library allocation
page read and write
390000
heap
page read and write
18C000
stack
page read and write
15190000
trusted library allocation
page read and write
3318000
direct allocation
page read and write
14480000
trusted library allocation
page read and write
10000
heap
page read and write
14CEB000
trusted library allocation
page execute and read and write
31AC000
direct allocation
page read and write
5F0000
heap
page read and write
7B4000
heap
page read and write
307C000
direct allocation
page read and write
456000
system
page execute and read and write
3C0000
heap
page read and write
88ED000
stack
page read and write
8D6000
heap
page read and write
7E21F000
trusted library allocation
page read and write
36F000
stack
page read and write
31B4000
direct allocation
page read and write
1490B000
stack
page read and write
21A6000
heap
page read and write
88000
stack
page read and write
20A4000
heap
page read and write
2E08F000
unkown
page read and write
3078000
direct allocation
page read and write
294000
heap
page read and write
3EF000
stack
page read and write
2F16E000
stack
page read and write
1B0000
direct allocation
page execute and read and write
690000
heap
page read and write
1470E000
trusted library allocation
page read and write
147BB000
stack
page read and write
158F1000
trusted library allocation
page execute and read and write
31B5000
direct allocation
page read and write
296000
heap
page read and write
15D14000
trusted library allocation
page execute and read and write
2E762000
trusted library allocation
page read and write
1436D000
trusted library allocation
page read and write
56D000
unkown
page read and write
8F70000
trusted library allocation
page read and write
14A60000
heap
page read and write
147E4000
trusted library allocation
page read and write
666000
heap
page read and write
3229000
direct allocation
page read and write
6C0000
heap
page read and write
31B4000
direct allocation
page read and write
2E08F000
unkown
page read and write
31C1000
direct allocation
page read and write
3094000
direct allocation
page read and write
23FF000
stack
page read and write
14A0E000
stack
page read and write
282E000
stack
page read and write
8A6F000
stack
page read and write
7E5AF000
trusted library allocation
page read and write
15889000
trusted library allocation
page execute and read and write
10000
heap
page read and write
157A0000
unkown
page read and write
580000
heap
page read and write
7A7000
heap
page read and write
277000
heap
page read and write
2F57000
direct allocation
page read and write
1D80000
direct allocation
page read and write
320C000
direct allocation
page read and write
1469C000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
1468B000
stack
page read and write
426000
heap
page read and write
2298000
heap
page read and write
3311000
direct allocation
page read and write
32F4000
direct allocation
page read and write
254000
heap
page read and write
2400000
trusted library allocation
page read and write
7E560000
trusted library allocation
page read and write
3080000
direct allocation
page read and write
14D12000
heap
page read and write
7E03F000
trusted library allocation
page read and write
32F2000
direct allocation
page read and write
1E9F000
stack
page read and write
14622000
trusted library allocation
page read and write
21A7000
heap
page read and write
56E000
unkown
page write copy
31CC000
direct allocation
page read and write
2073000
heap
page read and write
1BDC000
heap
page read and write
147C2000
trusted library allocation
page read and write
1B0000
heap
page read and write
5F7000
heap
page read and write
31C0000
direct allocation
page read and write
3304000
direct allocation
page read and write
5D7000
heap
page read and write
3304000
direct allocation
page read and write
237000
heap
page read and write
2257000
heap
page read and write
230000
heap
page read and write
147EC000
trusted library allocation
page read and write
31C4000
direct allocation
page read and write
3090000
direct allocation
page read and write
246F000
stack
page read and write
8550000
heap
page read and write
7DA40000
trusted library allocation
page read and write
14E8F000
stack
page read and write
31B4000
direct allocation
page read and write
400000
unkown
page readonly
3230000
direct allocation
page readonly
1C3C000
heap
page read and write
8FE0000
trusted library allocation
page read and write
62D000
heap
page read and write
14899000
heap
page read and write
1550B000
trusted library allocation
page execute and read and write
88AC000
stack
page read and write
9E6000
heap
page read and write
1C0E000
heap
page read and write
892F000
stack
page read and write
14A5E000
stack
page read and write
3312000
direct allocation
page read and write
2EDAF000
stack
page read and write
145E0000
trusted library allocation
page read and write
370000
heap
page read and write
14E3F000
trusted library allocation
page execute and read and write
1F17000
heap
page read and write
2B0000
heap
page read and write
2D1000
heap
page read and write
7E560000
trusted library allocation
page read and write
153CE000
stack
page read and write
3304000
direct allocation
page read and write
7DAF8000
trusted library allocation
page read and write
1C4B000
heap
page read and write
14C1F000
stack
page read and write
3094000
direct allocation
page read and write
390000
heap
page read and write
14646000
trusted library allocation
page read and write
32F8000
direct allocation
page read and write
2494000
heap
page read and write
246F000
stack
page read and write
2EA0B000
trusted library allocation
page read and write
2E6E9000
trusted library allocation
page read and write
589000
heap
page read and write
45D000
system
page execute and read and write
459000
system
page execute and read and write
2FF3000
direct allocation
page read and write
157AB000
trusted library allocation
page execute and read and write
2146000
heap
page read and write
20A9000
heap
page read and write
7DC40000
trusted library allocation
page read and write
150F0000
trusted library allocation
page read and write
458000
unkown
page read and write
8D000
stack
page read and write
147D0000
trusted library allocation
page read and write
31CC000
direct allocation
page read and write
14E30000
trusted library allocation
page execute and read and write
14E7B000
trusted library allocation
page execute and read and write
145E0000
trusted library allocation
page read and write
2114000
heap
page read and write
7BE000
heap
page read and write
88000
stack
page read and write
31C8000
direct allocation
page read and write
2E963000
trusted library allocation
page read and write
14FF0000
heap
page read and write
31B2000
direct allocation
page read and write
14C80000
heap
page read and write
167000
stack
page read and write
31B4000
direct allocation
page read and write
15894000
trusted library allocation
page execute and read and write
784000
heap
page read and write
1479F000
trusted library allocation
page read and write
270000
heap
page read and write
57F000
stack
page read and write
31C2000
direct allocation
page read and write
214A000
heap
page read and write
7AB000
heap
page read and write
2E360000
heap
page read and write
1447D000
trusted library allocation
page read and write
2C0000
direct allocation
page read and write
28C000
heap
page read and write
14BF0000
heap
page read and write
1BC0000
heap
page read and write
32F8000
direct allocation
page read and write
14A6E000
stack
page read and write
10000
heap
page read and write
2D83000
direct allocation
page read and write
31F1000
direct allocation
page read and write
1480E000
stack
page read and write
14F1F000
stack
page read and write
31A0000
direct allocation
page read and write
23B0000
heap
page read and write
2E0C1000
trusted library allocation
page read and write
149BE000
stack
page read and write
146FE000
trusted library allocation
page read and write
20A4000
heap
page read and write
280000
heap
page read and write
3B0000
heap
page read and write
23E0000
heap
page read and write
256F000
stack
page read and write
5C2000
heap
page read and write
7EE00000
trusted library allocation
page read and write
7E2E0000
trusted library allocation
page read and write
2E110000
unkown
page read and write
1470A000
trusted library allocation
page read and write
3078000
direct allocation
page read and write
148BF000
stack
page read and write
236F000
stack
page read and write
341000
heap
page read and write
8E72000
heap
page read and write
308C000
direct allocation
page read and write
1456C000
trusted library allocation
page read and write
47B000
heap
page read and write
240000
heap
page read and write
223E000
stack
page read and write
26DF000
stack
page read and write
614000
heap
page read and write
24B2000
heap
page read and write
180000
heap
page read and write
31BD000
direct allocation
page read and write
304F000
direct allocation
page read and write
1C6B000
heap
page read and write
21D0000
heap
page read and write
8E30000
heap
page read and write
510000
heap
page read and write
2160000
heap
page read and write
7E5C0000
trusted library allocation
page read and write
147F3000
trusted library allocation
page read and write
305000
heap
page read and write
5C0000
trusted library allocation
page read and write
2D67E000
stack
page read and write
21FF000
heap
page read and write
14808000
trusted library allocation
page read and write
309C000
direct allocation
page read and write
2092000
heap
page read and write
240000
heap
page read and write
14801000
trusted library allocation
page read and write
14B1D000
stack
page read and write
3074000
direct allocation
page read and write
564000
heap
page read and write
1588B000
trusted library allocation
page execute and read and write
2E8000
heap
page read and write
513000
heap
page read and write
1C22000
heap
page read and write
157F4000
trusted library allocation
page execute and read and write
15821000
trusted library allocation
page execute and read and write
23F8000
heap
page read and write
31AF000
direct allocation
page read and write
14CAD000
stack
page read and write
5A0000
direct allocation
page read and write
420000
heap
page read and write
3314000
direct allocation
page read and write
147DD000
trusted library allocation
page read and write
1552F000
stack
page read and write
2164000
heap
page read and write
7DD42000
trusted library allocation
page read and write
220000
direct allocation
page execute and read and write
3E0000
trusted library allocation
page read and write
200C000
stack
page read and write
316000
heap
page read and write
22A8000
heap
page read and write
14603000
trusted library allocation
page read and write
2DB3F000
stack
page read and write
2DB7F000
stack
page read and write
5DF000
stack
page read and write
146B1000
trusted library allocation
page read and write
147D8000
trusted library allocation
page read and write
14BAF000
stack
page read and write
650000
heap
page read and write
154CF000
stack
page read and write
146AA000
trusted library allocation
page read and write
1C36000
heap
page read and write
3314000
direct allocation
page read and write
153D0000
trusted library allocation
page read and write
3D3000
heap
page read and write
32F8000
direct allocation
page read and write
14630000
trusted library allocation
page read and write
3054000
direct allocation
page read and write
8FE0000
trusted library allocation
page read and write
1542F000
stack
page read and write
8D000
stack
page read and write
2DEA6000
trusted library allocation
page execute and read and write
14FBE000
stack
page read and write
220E000
stack
page read and write
2600000
trusted library allocation
page read and write
213E000
stack
page read and write
15960000
trusted library allocation
page read and write
220000
direct allocation
page execute and read and write
5B0000
heap
page read and write
2D9FF000
stack
page read and write
614000
heap
page read and write
5AF000
stack
page read and write
2290000
heap
page read and write
331C000
direct allocation
page read and write
10000
heap
page read and write
458000
unkown
page write copy
10000
heap
page read and write
7E60F000
trusted library allocation
page read and write
2EA000
heap
page read and write
20E2000
heap
page read and write
240000
heap
page read and write
1477B000
stack
page read and write
2F2000
heap
page read and write
430000
heap
page read and write
3091000
direct allocation
page read and write
14548000
trusted library allocation
page read and write
41B000
system
page execute and read and write
2132000
heap
page read and write
31AC000
direct allocation
page read and write
14CE0000
trusted library allocation
page execute and read and write
669000
heap
page read and write
8FE0000
trusted library allocation
page read and write
14E0F000
stack
page read and write
2E040000
unkown
page read and write
7DBC4000
trusted library allocation
page read and write
235E000
stack
page read and write
20C4000
heap
page read and write
32F4000
direct allocation
page read and write
25DE000
stack
page read and write
307000
heap
page read and write
3084000
direct allocation
page read and write
14C5F000
stack
page read and write
31C8000
direct allocation
page read and write
300000
heap
page read and write
1447E000
trusted library allocation
page read and write
15130000
trusted library allocation
page read and write
2D8BF000
stack
page read and write
38C000
stack
page read and write
62D000
heap
page read and write
309C000
direct allocation
page read and write
7DF80000
trusted library allocation
page read and write
3078000
direct allocation
page read and write
31BC000
direct allocation
page read and write
14C2E000
stack
page read and write
330C000
direct allocation
page read and write
31B4000
direct allocation
page read and write
18E000
stack
page read and write
5A0000
heap
page read and write
1E3E000
direct allocation
page read and write
14B6F000
stack
page read and write
31B4000
direct allocation
page read and write
23F3000
heap
page read and write
154A0000
trusted library allocation
page read and write
15780000
trusted library allocation
page read and write
3092000
direct allocation
page read and write
31A0000
direct allocation
page read and write
2E23F000
stack
page read and write
14654000
trusted library allocation
page read and write
16C000
stack
page read and write
23E8000
heap
page read and write
144FD000
trusted library allocation
page read and write
158EB000
trusted library allocation
page execute and read and write
58F000
heap
page read and write
800000
heap
page read and write
14A97000
heap
page read and write
245F000
stack
page read and write
66F000
stack
page read and write
1D1F000
stack
page read and write
20C2000
heap
page read and write
20D8000
heap
page read and write
31C2000
direct allocation
page read and write
32F8000
direct allocation
page read and write
400000
system
page execute and read and write
1C2B000
heap
page read and write
2298000
heap
page read and write
31B8000
direct allocation
page read and write
677000
heap
page read and write
7DE50000
trusted library allocation
page read and write
1491F000
stack
page read and write
31B5000
direct allocation
page read and write
16C000
stack
page read and write
3090000
direct allocation
page read and write
145FD000
trusted library allocation
page read and write
31C6000
direct allocation
page read and write
277000
heap
page read and write
1574B000
unkown
page read and write
2168000
heap
page read and write
2E0FE000
unkown
page read and write
14678000
trusted library allocation
page read and write
3084000
direct allocation
page read and write
30F4000
direct allocation
page read and write
41F000
system
page execute and read and write
284000
heap
page read and write
2070000
heap
page read and write
154A1000
trusted library allocation
page execute and read and write
868D000
stack
page read and write
8FE0000
trusted library allocation
page read and write
2F02F000
stack
page read and write
1468D000
trusted library allocation
page read and write
27EF000
stack
page read and write
308C000
direct allocation
page read and write
5D0000
heap
page read and write
857F000
heap
page read and write
3074000
direct allocation
page read and write
14671000
trusted library allocation
page read and write
3310000
direct allocation
page read and write
334B000
direct allocation
page read and write
2E0C4000
trusted library allocation
page read and write
7DD90000
trusted library allocation
page read and write
15720000
trusted library allocation
page read and write
31C5000
direct allocation
page read and write
155F0000
trusted library allocation
page read and write
2D8000
heap
page read and write
2D4000
heap
page read and write
3188000
direct allocation
page read and write
33B000
heap
page read and write
215E000
heap
page read and write
270000
heap
page read and write
30D000
stack
page read and write
3101000
direct allocation
page read and write
336C000
direct allocation
page read and write
15B00000
trusted library allocation
page read and write
32F8000
direct allocation
page read and write
2133000
direct allocation
page read and write
14E34000
trusted library allocation
page execute and read and write
15780000
trusted library allocation
page read and write
2231000
heap
page read and write
10000
heap
page read and write
3EF000
stack
page read and write
15511000
trusted library allocation
page execute and read and write
31B4000
direct allocation
page read and write
2EA0D000
trusted library allocation
page read and write
15430000
trusted library allocation
page read and write
8730000
heap
page read and write
330C000
direct allocation
page read and write
7DF70000
trusted library allocation
page read and write
14B0F000
stack
page read and write
3090000
direct allocation
page read and write
2D4B000
heap
page read and write
3094000
direct allocation
page read and write
8FE0000
trusted library allocation
page read and write
145D0000
trusted library allocation
page read and write
3089000
direct allocation
page read and write
31BF000
direct allocation
page read and write
1D7F000
stack
page read and write
2E46F000
stack
page read and write
31AC000
direct allocation
page read and write
1D3E000
stack
page read and write
15509000
trusted library allocation
page execute and read and write
2960000
trusted library allocation
page read and write
14FFC000
stack
page read and write
14E77000
trusted library allocation
page execute and read and write
157EB000
trusted library allocation
page execute and read and write
4D2000
unkown
page write copy
473000
system
page execute and read and write
309D000
direct allocation
page read and write
20AB000
heap
page read and write
31B0000
direct allocation
page read and write
18C000
stack
page read and write
1BE2000
heap
page read and write
2E078000
trusted library allocation
page read and write
2096000
heap
page read and write
31FB000
direct allocation
page read and write
57A000
heap
page read and write
229F000
heap
page read and write
30DC000
direct allocation
page read and write
21D4000
heap
page read and write
2C0000
heap
page read and write
23EF000
heap
page read and write
8B0000
heap
page read and write
3098000
direct allocation
page read and write
14F92000
heap
page read and write
31B6000
direct allocation
page read and write
146A3000
trusted library allocation
page read and write
32FC000
direct allocation
page read and write
154C4000
trusted library allocation
page execute and read and write
627000
heap
page read and write
2120000
heap
page read and write
1C0E000
heap
page read and write
5AF000
heap
page read and write
2F26F000
stack
page read and write
22A3000
heap
page read and write
226F000
stack
page read and write
2300000
trusted library allocation
page read and write
2E091000
trusted library allocation
page read and write
154CF000
trusted library allocation
page execute and read and write
1F0E000
direct allocation
page read and write
1C23000
heap
page read and write
14E3F000
stack
page read and write
8BD000
heap
page read and write
3D0000
heap
page read and write
2E27F000
stack
page read and write
474000
system
page execute and read and write
3DC000
stack
page read and write
61E000
direct allocation
page read and write
31A4000
direct allocation
page read and write
3084000
direct allocation
page read and write
14A4C000
stack
page read and write
147BB000
stack
page read and write
8D000
stack
page read and write
7E540000
trusted library allocation
page read and write
307C000
direct allocation
page read and write
14CE4000
trusted library allocation
page execute and read and write
32FC000
direct allocation
page read and write
1487F000
stack
page read and write
31A8000
direct allocation
page read and write
8CB0000
heap
page read and write
154C0000
trusted library allocation
page execute and read and write
20AE000
heap
page read and write
1437F000
trusted library allocation
page read and write
89000
stack
page read and write
5AF000
heap
page read and write
3084000
direct allocation
page read and write
2E06B000
trusted library allocation
page read and write
14A2D000
stack
page read and write
478000
heap
page read and write
15844000
trusted library allocation
page execute and read and write
14CD0000
heap
page read and write
2E08F000
trusted library allocation
page read and write
2E107000
trusted library allocation
page read and write
15514000
trusted library allocation
page execute and read and write
3311000
direct allocation
page read and write
2173000
heap
page read and write
3234000
direct allocation
page read and write
1451F000
trusted library allocation
page read and write
21A3000
heap
page read and write
157F1000
trusted library allocation
page execute and read and write
20A0000
heap
page read and write
2A6000
heap
page read and write
2F23000
direct allocation
page read and write
14BEF000
stack
page read and write
2E73000
direct allocation
page read and write
307C000
direct allocation
page read and write
7B3000
heap
page read and write
8FE0000
trusted library allocation
page read and write
154CB000
trusted library allocation
page execute and read and write
33C000
heap
page read and write
56D000
unkown
page read and write
1573D000
unkown
page read and write
14573000
trusted library allocation
page read and write
2E2BF000
stack
page read and write
7B8000
heap
page read and write
2EA0B000
trusted library allocation
page read and write
319C000
direct allocation
page read and write
15650000
trusted library allocation
page read and write
14FFE000
stack
page read and write
283F000
stack
page read and write
7DBA0000
trusted library allocation
page read and write
31BC000
direct allocation
page read and write
5DC000
stack
page read and write
306C000
direct allocation
page read and write
5F0000
heap
page read and write
7E5B0000
trusted library allocation
page read and write
6C7000
heap
page read and write
31B4000
direct allocation
page read and write
2A9000
heap
page read and write
31A8000
direct allocation
page read and write
2BD4000
heap
page read and write
14DFF000
stack
page read and write
2ED6F000
stack
page read and write
330000
heap
page read and write
88000
stack
page read and write
7C0000
heap
page read and write
2280000
heap
page read and write
281000
heap
page read and write
2DFEF000
stack
page read and write
157A0000
trusted library allocation
page execute and read and write
8FE0000
trusted library allocation
page read and write
28F000
stack
page read and write
2E02F000
stack
page read and write
271F000
stack
page read and write
14FAC000
stack
page read and write
31BC000
direct allocation
page read and write
608000
heap
page read and write
614000
heap
page read and write
6F6000
heap
page read and write
7E2DF000
trusted library allocation
page read and write
574000
unkown
page readonly
229F000
heap
page read and write
158AF000
trusted library allocation
page execute and read and write
290000
heap
page read and write
21E8000
heap
page read and write
23C000
heap
page read and write
2FD0000
direct allocation
page read and write
517000
heap
page read and write
14811000
trusted library allocation
page read and write
3078000
direct allocation
page read and write
30D000
heap
page read and write
1C32000
heap
page read and write
1466A000
trusted library allocation
page read and write
62F000
heap
page read and write
8F70000
trusted library allocation
page read and write
290000
heap
page read and write
15840000
trusted library allocation
page execute and read and write
5CC000
heap
page read and write
2E670000
trusted library allocation
page read and write
240000
heap
page read and write
5C4000
heap
page read and write
2257000
heap
page read and write
8B6000
heap
page read and write
20D0000
heap
page read and write
458000
unkown
page read and write
7DD50000
trusted library allocation
page read and write
547000
heap
page read and write
2E962000
trusted library allocation
page read and write
31B4000
direct allocation
page read and write
2D48000
heap
page read and write
330C000
direct allocation
page read and write
26FF000
stack
page read and write
714000
heap
page read and write
15022000
heap
page read and write
31AC000
direct allocation
page read and write
1464D000
trusted library allocation
page read and write
8FE0000
trusted library allocation
page read and write
88000
stack
page read and write
20C0000
heap
page read and write
2CC8F000
stack
page read and write
158A4000
trusted library allocation
page execute and read and write
3084000
direct allocation
page read and write
295000
heap
page read and write
1518E000
stack
page read and write
5A8000
heap
page read and write
294000
heap
page read and write
14638000
trusted library allocation
page read and write
335C000
direct allocation
page read and write
1BDF000
heap
page read and write
23C000
heap
page read and write
15881000
trusted library allocation
page execute and read and write
15820000
trusted library allocation
page read and write
14B72000
heap
page read and write
1EF0000
heap
page read and write
2F30000
direct allocation
page read and write
157A4000
trusted library allocation
page execute and read and write
14694000
trusted library allocation
page read and write
3310000
direct allocation
page read and write
1460F000
trusted library allocation
page read and write
2B2000
heap
page read and write
2E0C4000
unkown
page read and write
458000
unkown
page read and write
158E9000
trusted library allocation
page execute and read and write
15C000
stack
page read and write
15720000
trusted library allocation
page read and write
2EBF000
direct allocation
page read and write
7E03F000
trusted library allocation
page read and write
2D10000
direct allocation
page read and write
2F68000
direct allocation
page read and write
30F0000
direct allocation
page read and write
21A8000
heap
page read and write
230000
heap
page read and write
220000
direct allocation
page execute and read and write
7DA80000
trusted library allocation
page read and write
88000
stack
page read and write
3391000
direct allocation
page read and write
1D0000
heap
page read and write
430000
heap
page read and write
148F0000
heap
page read and write
154F0000
trusted library allocation
page read and write
20A0000
remote allocation
page read and write
5A0000
heap
page read and write
7E03F000
trusted library allocation
page read and write
2034000
heap
page read and write
31AC000
direct allocation
page read and write
56D000
unkown
page read and write
3084000
direct allocation
page read and write
7BE000
heap
page read and write
18D000
stack
page read and write
21FA000
heap
page read and write
1511D000
stack
page read and write
21F3000
direct allocation
page read and write
14480000
trusted library allocation
page read and write
319000
heap
page read and write
2FBC000
direct allocation
page read and write
7DF80000
trusted library allocation
page read and write
7E240000
trusted library allocation
page read and write
2D77F000
stack
page read and write
2F0000
heap
page read and write
2ED0000
direct allocation
page read and write
2E853000
trusted library allocation
page read and write
3232000
direct allocation
page read and write
158E7000
trusted library allocation
page execute and read and write
14CC1000
trusted library allocation
page execute and read and write
654000
heap
page read and write
14D29000
trusted library allocation
page execute and read and write
2BB000
heap
page read and write
587000
heap
page read and write
31C0000
direct allocation
page read and write
153CF000
stack
page read and write
300000
heap
page read and write
15720000
unkown
page read and write
32D000
heap
page read and write
2E0E5000
trusted library allocation
page read and write
1488E000
stack
page read and write
335B000
direct allocation
page read and write
2BBD000
stack
page read and write
2BD0000
heap
page read and write
31B4000
direct allocation
page read and write
2EB4000
direct allocation
page read and write
1DC0000
direct allocation
page read and write
254000
heap
page read and write
53F000
heap
page read and write
2F6C000
direct allocation
page read and write
There are 1458 hidden memdumps, click here to show them.