IOC Report
d0#U10dc.xls

loading gif

Files

File Path
Type
Category
Malicious
d0#U10dc.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Sun Mar 19 16:31:33 2023, Security: 0
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\mcwfy.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\sqlite3.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Cache\data_1
data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old~RF41d356.TMP (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3024000, file counter 15, database pages 15, cookie 0x5, schema 4, UTF-8, version-valid-for 15
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheRdr65536.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\sqlite-dll-win32-x86-3170000[1].zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1A5CF463.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\29F24F69.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3DC2DB08.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4F49BF6A.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5001E027.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5607C5D.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 965x543, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6E32DE56.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\76C63CD.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\86F058AC.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\93918E5F.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A58FA7F1.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B336EBFC.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BBE8D3E.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DB46BBB0.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~$RD0003.docx
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~$RD0005.docx
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~$RD3923.docx
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~$RO0000.doc
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0001.tmp
Microsoft Word 2007+
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0003.docx (copy)
Microsoft Word 2007+
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0004.tmp
Microsoft Word 2007+
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0005.docx (copy)
Microsoft Word 2007+
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD2913.tmp
Microsoft Word 2007+
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD3923.docx (copy)
Microsoft Word 2007+
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD3923.tmp
Microsoft Word 2007+
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRL0002.tmp (copy)
Microsoft Word 2007+
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRO0000.doc
Microsoft Word 2007+
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4596E15B-44F2-46EC-B7F0-548B7E499F6A}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{8A733322-1ED0-47A6-9275-656451DAAFBA}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\333 (2).emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Temp\333 (2).emf:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\333 (3).emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Temp\333 (3).emf:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\87F4.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\HI4NJ046K
SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 4, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\README (2).txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\README (2).txt:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\README (3).txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\README (3).txt:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsl9C8E.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\o0whqph.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\ortnkgsjk.g
data
dropped
C:\Users\user\AppData\Local\Temp\sqlite3.def
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ytljtt.f
data
dropped
C:\Users\user\AppData\Local\Temp\yy (2).txt
ASCII text, with very long lines (599), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\yy (2).txt:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\yy.txt
ASCII text, with very long lines (599), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\yy.txt:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\~DF105CE6962F655752.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DF2613BCA6826298A5.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DF3759C9448D2ED5D7.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DF4DCF212DAF54DAAA.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFAEEDEE6F10B6AFDD.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFCD0A74EBC3B8D0D3.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFCE59EB4D76CCBC89.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFF3DB96A6682A15C6.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFF43C2C98E1EF8FBE.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFF502807A3587CE89.TMP
data
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_store
data
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_storei
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
There are 65 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Users\Public\vbc.exe
"C:\Users\Public\vbc.exe"
malicious
C:\Users\user\AppData\Local\Temp\mcwfy.exe
"C:\Users\user\AppData\Local\Temp\mcwfy.exe" C:\Users\user\AppData\Local\Temp\ytljtt.f
malicious
C:\Users\user\AppData\Local\Temp\mcwfy.exe
C:\Users\user\AppData\Local\Temp\mcwfy.exe
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\wscript.exe
C:\Windows\SysWOW64\wscript.exe
malicious
C:\Program Files (x86)\Mozilla Firefox\firefox.exe
C:\Program Files (x86)\Mozilla Firefox\Firefox.exe
malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" -Embedding
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.gritslab.com/u2kb/www.gritslab.com
unknown
malicious
http://www.thedivinerudraksha.com/u2kb/
unknown
malicious
http://103.189.202.84/889r12/vbc.exe
103.189.202.84
malicious
http://www.white-hat.uk/u2kb/www.white-hat.uk
unknown
malicious
http://www.energyservicestation.com/u2kb/www.energyservicestation.com
unknown
malicious
http://www.un-object.com/u2kb/
unknown
malicious
http://www.bitservicesltd.com/u2kb/
161.97.163.8
malicious
http://www.fclaimrewardccpointq.shop/u2kb/www.fclaimrewardccpointq.shop
unknown
malicious
http://www.fclaimrewardccpointq.shop/u2kb/
unknown
malicious
http://www.gritslab.com/u2kb/
78.141.192.145
malicious
http://103.189.202.84/889r12/vbc.exehhC:
unknown
malicious
http://white-hat.uk/u2kb/?MX=PXfMycAZpTAipct8YcIlv
unknown
malicious
http://www.un-object.com/u2kb/www.un-object.com
unknown
malicious
http://www.avisrezervee.com/u2kb/
unknown
malicious
http://www.thedivinerudraksha.com/u2kb/www.thedivinerudraksha.com
unknown
malicious
http://www.ecomofietsen.com/u2kb/
unknown
malicious
http://www.shapshit.xyz/u2kb/
unknown
malicious
http://www.ecomofietsen.com/u2kb/www.ecomofietsen.com
unknown
malicious
http://www.bitservicesltd.com/u2kb/www.bitservicesltd.com
unknown
malicious
http://103.189.202.84/889r12/vbc.exer
unknown
malicious
http://www.avisrezervee.com/u2kb/www.avisrezervee.com
unknown
malicious
http://www.bitservicesltd.com/u2kb/?MX=rr+sOBvEXsBdGevUkpEFvjOGSuYjzi1YNHmXivr92FQhRIIYsedR2a+6GoV1WAKeGdj+MTdX512lJXnwfbSEi+kURcMlXNjU4ipRv+g=&uFI_=sroxa_9G7qh93
161.97.163.8
malicious
http://103.189.202.84/889r12/vbc.exej
unknown
malicious
http://www.white-hat.uk/u2kb/?MX=PXfMycAZpTAipct8YcIlv+jRzdgnyvgF2k7967nf/qU1A0mUqq9Jlnm9rK8XSf3D04yKTuePtKPnTC045fzMwSdM+ozxnu9rCO36QPo=&uFI_=sroxa_9G7qh93
94.176.104.86
malicious
http://www.gritslab.com/u2kb/?MX=ydCzFiH7iMWnz6xHMbeyIS2EYayY5efYQUsmgPEoYCSsyD6HgT3yOGCjssC2N8mKn+GjINYvhr7iKNK7QGdClLf278PMkWXjYWxIQds=&uFI_=sroxa_9G7qh93
78.141.192.145
malicious
http://www.ecomofietsen.com/u2kb/-wA
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.iis.fhg.de/audioPA
unknown
http://www.mozilla.com0
unknown
http://treyresearch.net
unknown
http://www.germanreps.com
unknown
http://www.fclaimrewardccpointq.shopReferer:
unknown
http://www.energyservicestation.comReferer:
unknown
http://www.white-hat.uk
unknown
http://www.mygloballojistik.online/u2kb/
unknown
http://www.avisrezervee.comReferer:
unknown
http://computername/printers/printername/.printer
unknown
http://www.autoitscript.com/autoit3
unknown
http://servername/isapibackend.dll
unknown
http://www.windows.com/pctv.
unknown
http://www.222ambking.orgReferer:
unknown
http://www.younrock.com
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
unknown
http://www.thedivinerudraksha.comReferer:
unknown
http://www.mygloballojistik.online/u2kb/www.mygloballojistik.online
unknown
https://www.google.com/favicon.ico
unknown
http://java.sun.com
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
http://www.employerseervices.com
unknown
http://www.222ambking.org/u2kb/
unknown
http://www.white-hat.ukReferer:
unknown
http://www.un-object.comReferer:
unknown
http://www.msnbc.com/news/ticker.txt
unknown
http://www.bitservicesltd.comReferer:
unknown
http://localizability/practices/XML.asp
unknown
http://www.piriform.com/ccleanerq
unknown
http://www.thewildphotographer.co.uk/u2kb/www.thewildphotographer.co.uk
unknown
http://www.mygloballojistik.online
unknown
http://www.mygloballojistik.onlineReferer:
unknown
http://www.shapshit.xyz
unknown
http://www.thewildphotographer.co.uk/u2kb/t
unknown
http://www.ecomofietsen.com
unknown
http://www.thedivinerudraksha.com
unknown
http://www.sqlite.org/2017/sqlite-dll-win32-x86-3170000.zip
45.33.6.223
http://www.icra.org/vocabulary/.
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://www.employerseervices.com/u2kb/www.employerseervices.com
unknown
http://www.germanreps.com/u2kb/5fQ
unknown
http://www.energyservicestation.com/u2kb/
unknown
http://investor.msn.com/
unknown
http://www.avisrezervee.com
unknown
http://www.bitservicesltd.com
unknown
http://www.thewildphotographer.co.uk/u2kb/
unknown
http://www.white-hat.uk/u2kb/
unknown
http://www.younrock.comReferer:
unknown
http://www.%s.comPA
unknown
http://www.piriform.com/ccleanerv
unknown
http://www.germanreps.comReferer:
unknown
http://www.gritslab.com
unknown
http://www.thewildphotographer.co.uk
unknown
http://www.sqlite.org/copyright.html.
unknown
http://www.222ambking.org/u2kb/www.222ambking.org
unknown
http://www.shapshit.xyzReferer:
unknown
http://investor.msn.com
unknown
http://www.energyservicestation.com
unknown
http://www.gritslab.comReferer:
unknown
http://wellformedweb.org/CommentAPI/
unknown
https://crash-reports.mozilla.com/submit?id=
unknown
http://www.employerseervices.com/u2kb/
unknown
http://www.employerseervices.com/u2kb/EJ
unknown
http://ocsp.thawte.com0
unknown
http://www.piriform.com/ccleaner1SPS0
unknown
http://www.222ambking.org/u2kb/l
unknown
http://localizability/practices/XMLConfiguration.asp
unknown
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
unknown
http://www.hotmail.com/oe
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.bitservicesltd.com
161.97.163.8
malicious
white-hat.uk
94.176.104.86
malicious
gritslab.com
78.141.192.145
malicious
www.white-hat.uk
unknown
malicious
www.gritslab.com
unknown
malicious
www.222ambking.org
91.195.240.94
www.sqlite.org
45.33.6.223

IPs

IP
Domain
Country
Malicious
78.141.192.145
gritslab.com
France
malicious
161.97.163.8
www.bitservicesltd.com
United States
malicious
103.189.202.84
unknown
unknown
malicious
94.176.104.86
white-hat.uk
Romania
malicious
45.33.6.223
www.sqlite.org
United States
192.168.2.255
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
ro*
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\681CD
681CD
HKEY_CURRENT_USER\Software\Microsoft\GDIPlus
FontCachePath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
w}*
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\7BC1E
7BC1E
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\7C9C5
7C9C5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithList
a
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithList
MRUList
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithList
a
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithList
MRUList
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\CSGORezDavjaYRIZLiITdSGgGfJseGKAlVwCWbmswhdKQhiDCcBvzlkJWQiezHBrnNS\MspPVOtWkTkZdLZukIFpvuztbKhPw.rkr
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@C:\Windows\System32\display.dll,-4
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@C:\Program Files\Windows Sidebar\sidebar.exe,-11100
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@C:\Windows\system32\themecpl.dll,-10
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\Nqbor\Npebong Ernqre QP\Ernqre\NpebEq32.rkr
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{6Q809377-6NS0-444O-8957-N3773S02200R}\Zvpebfbsg Bssvpr\Bssvpr14\RKPRY.RKR
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\Nqbor\Npebong Ernqre QP\Ernqre\NpebEq32.rkr
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{6Q809377-6NS0-444O-8957-N3773S02200R}\Zvpebfbsg Bssvpr\Bssvpr14\RKPRY.RKR
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\Nqbor\Npebong Ernqre QP\Ernqre\NpebEq32.rkr
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{6Q809377-6NS0-444O-8957-N3773S02200R}\Zvpebfbsg Bssvpr\Bssvpr14\RKPRY.RKR
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
r83
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
t:3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
)?3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\Recover
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WrdPrfctDos
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Word\Text Converters\Import\WordPerfect6x
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.0\2057
Options Version
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.0\2057\Option Set 0
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.0\2057\Option Set 0
Data
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.0\2057\Option Set 1
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.0\2057\Option Set 1
Data
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\78AD2
78AD2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP5FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
TCWP6FilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
There are 414 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
E0000
system
page execute and read and write
malicious
230000
system
page execute and read and write
malicious
3B0000
unclassified section
page execute and read and write
malicious
260000
unclassified section
page execute and read and write
malicious
2B0000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
2E0000
trusted library allocation
page read and write
malicious
40A000
unkown
page write copy
250000
unkown
page read and write
380000
trusted library allocation
page execute and read and write
860B000
unkown
page read and write
237000
stack
page read and write
437000
unkown
page read and write
B5F000
stack
page read and write
2D0000
unkown
page readonly
52F000
stack
page read and write
8371000
unkown
page read and write
2CA2000
unkown
page read and write
24DC000
stack
page read and write
1C30000
unkown
page readonly
41E0000
unkown
page read and write
46D0000
unkown
page readonly
150000
heap
page read and write
1A610000
direct allocation
page read and write
B7A0000
unkown
page read and write
2BFE000
stack
page read and write
42E000
unkown
page read and write
1D13000
unkown
page read and write
6DDE000
stack
page read and write
6B9000
heap
page read and write
8337000
unkown
page read and write
240000
heap
page read and write
1A610000
direct allocation
page read and write
2F1B000
stack
page read and write
72C0000
heap
page read and write
401000
unkown
page execute read
6544000
heap
page read and write
28F2000
unclassified section
page read and write
5D0000
heap
page read and write
1A4B0000
direct allocation
page read and write
105C000
system
page read and write
87F9000
unkown
page read and write
5C9D000
heap
page read and write
256000
unkown
page read and write
2F1B000
stack
page read and write
1D55000
heap
page read and write
7540000
heap
page read and write
256000
unkown
page read and write
885F000
unkown
page read and write
2F9E000
stack
page read and write
3FB5000
stack
page read and write
885F000
unkown
page read and write
3FE0000
unkown
page read and write
720000
heap
page read and write
8D000
stack
page read and write
45A0000
unkown
page readonly
2CB3000
unkown
page read and write
2C4B000
heap
page read and write
766B000
stack
page read and write
B864000
unkown
page read and write
10000
heap
page read and write
280000
direct allocation
page read and write
85AC000
unkown
page read and write
7660000
stack
page read and write
510000
unkown
page readonly
D0000
unkown
page readonly
6549000
heap
page read and write
4080000
unkown
page read and write
2A0000
heap
page read and write
1A590000
direct allocation
page read and write
4550000
unkown
page readonly
6E7000
heap
page read and write
21E4000
heap
page read and write
3FD000
heap
page read and write
317000
heap
page read and write
449F000
unkown
page read and write
1A590000
direct allocation
page read and write
24F1000
direct allocation
page execute and read and write
448F000
unkown
page read and write
323000
heap
page read and write
5D06000
heap
page read and write
4EED000
stack
page read and write
6532000
heap
page read and write
4620000
unkown
page read and write
6B9F000
stack
page read and write
2FC9000
heap
page read and write
1F90000
heap
page read and write
39E0000
heap
page read and write
418000
unkown
page write copy
400000
unkown
page readonly
7F90000
trusted library allocation
page read and write
295F000
stack
page read and write
53D0000
trusted library allocation
page read and write
1A4B0000
direct allocation
page read and write
71A000
heap
page read and write
7953000
heap
page read and write
8A0000
heap
page read and write
6FC0000
heap
page read and write
2B0000
heap
page read and write
7A00000
heap
page read and write
4466000
unkown
page read and write
7133000
heap
page read and write
54E000
heap
page read and write
4130000
unkown
page read and write
2FCE000
heap
page read and write
B5BE000
unkown
page read and write
350000
trusted library allocation
page execute and read and write
1FF0000
trusted library section
page readonly
699000
heap
page read and write
4520000
unkown
page readonly
7BE0000
heap
page read and write
2890000
trusted library allocation
page read and write
8575000
unkown
page read and write
110000
unkown
page read and write
8691000
unkown
page read and write
2B50000
unkown
page readonly
869E000
unkown
page read and write
1A42A000
direct allocation
page read and write
4530000
unkown
page readonly
27F000
stack
page read and write
2570000
direct allocation
page execute and read and write
3A6000
heap
page read and write
4560000
unkown
page readonly
220000
unkown
page read and write
8575000
unkown
page read and write
44E0000
unkown
page read and write
223F000
stack
page read and write
1A5B0000
direct allocation
page read and write
674000
heap
page read and write
8926000
unkown
page read and write
4510000
unkown
page execute and read and write
2CF000
unkown
page read and write
8802000
unkown
page read and write
8667000
unkown
page read and write
5CE7000
heap
page read and write
6520000
heap
page read and write
72B000
heap
page read and write
6C79000
stack
page read and write
82FD000
unkown
page read and write
2890000
trusted library allocation
page read and write
649000
heap
page read and write
223F000
stack
page read and write
4FD000
heap
page read and write
1DD0000
unkown
page readonly
2AF000
unkown
page read and write
1A5A7000
direct allocation
page read and write
88F5000
unkown
page read and write
1A4B0000
direct allocation
page read and write
1A5B0000
direct allocation
page read and write
7930000
heap
page read and write
3B10000
unkown
page readonly
4B2E000
system
page execute and read and write
4168000
unkown
page read and write
24F4000
direct allocation
page execute and read and write
851A000
unkown
page read and write
1A610000
direct allocation
page read and write
ABFA000
stack
page read and write
260000
direct allocation
page execute and read and write
21E7000
heap
page read and write
20000
heap
page read and write
6BE8000
stack
page read and write
3FE0000
unkown
page read and write
8605000
unkown
page read and write
2CF000
unkown
page read and write
6730000
trusted library allocation
page read and write
4220000
unkown
page readonly
856B000
unkown
page read and write
4520000
unkown
page readonly
4CDD000
stack
page read and write
2643000
unkown
page read and write
2898000
stack
page read and write
564000
heap
page read and write
4338000
unkown
page read and write
2B7000
heap
page read and write
886D000
unkown
page read and write
71A0000
heap
page read and write
7E40000
heap
page read and write
43B000
unkown
page readonly
71DD000
stack
page read and write
A4C2000
stack
page read and write
110000
unkown
page read and write
87E3000
unkown
page read and write
278F000
stack
page read and write
830000
unkown
page readonly
2B20000
unkown
page read and write
4C10000
heap
page read and write
24E0000
direct allocation
page execute and read and write
4210000
unkown
page read and write
1A4B0000
direct allocation
page read and write
1A350000
direct allocation
page read and write
62C000
heap
page read and write
7A0000
heap
page read and write
1A590000
direct allocation
page read and write
4302000
unkown
page read and write
401000
unkown
page execute read
26C6000
unkown
page read and write
2F0F000
stack
page read and write
2B0000
unkown
page read and write
340000
heap
page read and write
6730000
trusted library allocation
page read and write
79F0000
heap
page read and write
44E0000
unkown
page read and write
5370000
trusted library allocation
page read and write
2B0000
unkown
page read and write
4000000
unkown
page read and write
C2F000
stack
page read and write
79F0000
heap
page read and write
7EC0000
unkown
page read and write
1A5B0000
direct allocation
page read and write
7660000
stack
page read and write
3FD0000
unkown
page read and write
4570000
unkown
page readonly
C10000
direct allocation
page execute and read and write
80000
direct allocation
page read and write
448C000
unkown
page read and write
B920000
unkown
page read and write
61E9D000
unkown
page read and write
21E1000
heap
page read and write
2600000
unkown
page readonly
A27000
direct allocation
page execute and read and write
A4C7000
stack
page read and write
5D25000
heap
page read and write
1A5A7000
direct allocation
page read and write
B8A3000
unkown
page read and write
4A00000
trusted library allocation
page read and write
550000
heap
page read and write
448F000
unkown
page read and write
288F000
stack
page read and write
2A0A000
unkown
page execute and read and write
B9B3000
system
page read and write
6548000
heap
page read and write
4E0000
heap
page read and write
1A5A1000
direct allocation
page read and write
2B30000
unkown
page readonly
8667000
unkown
page read and write
26F0000
unkown
page read and write
310000
heap
page read and write
22C000
stack
page read and write
7B4F000
stack
page read and write
6750000
unkown
page read and write
8867000
unkown
page read and write
427000
unkown
page read and write
B5C8000
unkown
page read and write
42D0000
unkown
page read and write
879E000
unkown
page read and write
2F0F000
stack
page read and write
4466000
unkown
page read and write
2400000
direct allocation
page execute and read and write
BA4000
direct allocation
page execute and read and write
8900000
unkown
page read and write
1D50000
heap
page read and write
41C0000
unkown
page readonly
8664000
unkown
page read and write
8506000
unkown
page read and write
88FA000
unkown
page read and write
1A5A4000
direct allocation
page read and write
87E3000
unkown
page read and write
323000
heap
page read and write
8867000
unkown
page read and write
88BD000
unkown
page read and write
7133000
heap
page read and write
A20000
direct allocation
page execute and read and write
2D85000
unkown
page read and write
61EA8000
unkown
page readonly
1A4A0000
direct allocation
page read and write
1A350000
direct allocation
page read and write
206A000
heap
page read and write
766B000
stack
page read and write
27F0000
unkown
page read and write
6552000
heap
page read and write
4457000
unkown
page read and write
74BE000
stack
page read and write
410B000
stack
page read and write
10000
heap
page read and write
7F90000
trusted library allocation
page read and write
55B2000
heap
page read and write
290000
trusted library allocation
page read and write
5594000
heap
page read and write
64E000
heap
page read and write
44F0000
unkown
page readonly
640F000
stack
page read and write
5CBE000
heap
page read and write
690000
unkown
page readonly
73F000
stack
page read and write
4030000
unkown
page execute read
2C0000
unkown
page read and write
2CBC000
unkown
page read and write
75AF000
stack
page read and write
6730000
trusted library allocation
page read and write
3FF0000
unkown
page read and write
69C000
heap
page read and write
6562000
heap
page read and write
317000
heap
page read and write
85FA000
unkown
page read and write
5B1E000
stack
page read and write
42E000
unkown
page read and write
77AD000
stack
page read and write
41E0000
unkown
page read and write
44D000
unkown
page read and write
4050000
unkown
page read and write
60E0000
heap
page read and write
30000
heap
page read and write
26C6000
unkown
page read and write
7060000
heap
page read and write
6BE8000
stack
page read and write
7300000
heap
page read and write
28B0000
unkown
page readonly
4168000
unkown
page read and write
2CA5000
unkown
page read and write
2CBF000
unkown
page read and write
6730000
trusted library allocation
page read and write
1A590000
direct allocation
page read and write
8558000
unkown
page read and write
1FB2000
heap
page read and write
41D0000
unkown
page readonly
18D000
stack
page read and write
1A5B0000
direct allocation
page read and write
4560000
unkown
page readonly
1A5A4000
direct allocation
page read and write
883B000
unkown
page read and write
87BB000
unkown
page read and write
87FC000
unkown
page read and write
B864000
unkown
page read and write
400000
unkown
page readonly
6EC0000
heap
page read and write
A640000
heap
page read and write
10000
heap
page read and write
B90000
direct allocation
page execute and read and write
8820000
unkown
page read and write
10000
heap
page read and write
4D5E000
stack
page read and write
720F000
heap
page read and write
A4C0000
stack
page read and write
74BE000
stack
page read and write
410000
unkown
page read and write
53D0000
trusted library allocation
page read and write
4385000
unkown
page read and write
564000
heap
page read and write
2C40000
heap
page read and write
5D1F000
heap
page read and write
8512000
unkown
page read and write
3AF0000
unkown
page read and write
3B10000
unkown
page readonly
8849000
unkown
page read and write
1A350000
direct allocation
page read and write
866C000
unkown
page read and write
2550000
heap
page read and write
B820000
unkown
page read and write
23E0000
direct allocation
page execute and read and write
2280000
direct allocation
page execute and read and write
6D49000
stack
page read and write
84D2000
unkown
page read and write
8371000
unkown
page read and write
841B000
unkown
page read and write
B8A3000
unkown
page read and write
EA2000
system
page read and write
2A0000
unkown
page read and write
1A5A1000
direct allocation
page read and write
4DD0000
stack
page read and write
25F0000
unkown
page readonly
5EDF000
stack
page read and write
61E01000
unkown
page execute read
2903000
unclassified section
page read and write
632000
heap
page read and write
735E000
stack
page read and write
856B000
unkown
page read and write
8B000
stack
page read and write
4F60000
heap
page read and write
8675000
unkown
page read and write
4DD8000
stack
page read and write
8608000
unkown
page read and write
BBB6000
system
page read and write
8807000
unkown
page read and write
85FA000
unkown
page read and write
310000
heap
page read and write
4188000
unkown
page read and write
8903000
unkown
page read and write
2FC0000
heap
page read and write
18A000
stack
page read and write
1A350000
direct allocation
page read and write
1A5B0000
direct allocation
page read and write
BD76000
system
page read and write
4220000
unkown
page readonly
1A42A000
direct allocation
page read and write
A4C2000
stack
page read and write
26BA000
unkown
page read and write
8602000
unkown
page read and write
62C000
heap
page read and write
516C000
stack
page read and write
418000
unkown
page read and write
AB0000
direct allocation
page execute and read and write
434F000
unkown
page read and write
2C6F000
unkown
page read and write
4110000
unkown
page read and write
1D30000
unkown
page read and write
1A4A0000
direct allocation
page read and write
2ED000
heap
page read and write
49A0000
trusted library allocation
page read and write
6560000
heap
page read and write
2CB0000
unkown
page read and write
1F0000
unkown
page readonly
4E69000
stack
page read and write
657000
heap
page read and write
85D2000
unkown
page read and write
2B30000
unkown
page readonly
4423000
unkown
page read and write
3FB7000
stack
page read and write
10000
heap
page read and write
42D0000
unkown
page read and write
53D0000
heap
page read and write
4130000
unkown
page read and write
44B8000
unkown
page read and write
4040000
unkown
page readonly
4385000
unkown
page read and write
2CB9000
unkown
page read and write
2CC6000
unclassified section
page read and write
4570000
unkown
page readonly
1E00000
heap
page read and write
408000
unkown
page readonly
574000
heap
page read and write
1FA0000
direct allocation
page read and write
740000
unclassified section
page execute and read and write
7300000
heap
page read and write
6730000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
8669000
unkown
page read and write
82C0000
unkown
page read and write
2C48000
heap
page read and write
8512000
unkown
page read and write
3E0000
heap
page read and write
2CA0000
unkown
page read and write
1A5A7000
direct allocation
page read and write
418000
unkown
page write copy
6E5A000
stack
page read and write
20000
heap
page read and write
6730000
trusted library allocation
page read and write
3CF7000
unkown
page readonly
41D0000
unkown
page readonly
4120000
unkown
page read and write
557000
heap
page read and write
2CAE000
unkown
page read and write
450000
unkown
page read and write
6D0000
heap
page read and write
880000
heap
page read and write
8605000
unkown
page read and write
2C1F000
stack
page read and write
D0000
unkown
page readonly
100000
unkown
page read and write
860E000
unkown
page read and write
2360000
direct allocation
page execute and read and write
44B6000
unkown
page read and write
2CA5000
unkown
page read and write
7230000
heap
page read and write
7083000
heap
page read and write
6FC4000
heap
page read and write
7D1C000
stack
page read and write
4030000
unkown
page execute read
270F000
stack
page read and write
6730000
trusted library allocation
page read and write
3FB5000
stack
page read and write
300000
unkown
page read and write
2572000
heap
page read and write
43F0000
unkown
page read and write
88C0000
unkown
page read and write
204E000
stack
page read and write
5030000
heap
page read and write
4B31000
system
page execute and read and write
7110000
heap
page read and write
2CA0000
unkown
page read and write
4D7000
heap
page read and write
6730000
trusted library allocation
page read and write
329000
heap
page read and write
657000
heap
page read and write
24F7000
direct allocation
page execute and read and write
25B0000
heap
page read and write
640000
heap
page read and write
5A1D000
stack
page read and write
1F94000
heap
page read and write
23F0000
direct allocation
page execute and read and write
2FB000
heap
page read and write
2FC5000
heap
page read and write
37F000
stack
page read and write
4302000
unkown
page read and write
37B000
heap
page read and write
8691000
unkown
page read and write
6730000
trusted library allocation
page read and write
B963000
unkown
page read and write
1F0F000
stack
page read and write
380000
heap
page read and write
A90000
direct allocation
page execute and read and write
87FF000
unkown
page read and write
2BF000
unkown
page read and write
4464000
unkown
page read and write
6EC0000
heap
page read and write
D8F000
stack
page read and write
4160000
unkown
page read and write
4CDD000
stack
page read and write
8582000
unkown
page read and write
8844000
unkown
page read and write
3FD0000
unkown
page read and write
1A5A7000
direct allocation
page read and write
7083000
heap
page read and write
6730000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
441F000
unkown
page read and write
7567000
heap
page read and write
2A7000
heap
page read and write
25F000
stack
page read and write
4F4000
heap
page read and write
7064000
heap
page read and write
886A000
unkown
page read and write
4317000
unkown
page read and write
26BA000
unkown
page read and write
6730000
trusted library allocation
page read and write
1A9000
stack
page read and write
2160000
heap
page read and write
83E2000
unkown
page read and write
628F000
stack
page read and write
655D000
heap
page read and write
608F000
stack
page read and write
841F000
unkown
page read and write
292C000
unkown
page read and write
8802000
unkown
page read and write
4D0000
heap
page read and write
83A7000
unkown
page read and write
2B0000
trusted library allocation
page read and write
3B00000
unkown
page read and write
4C0000
heap
page read and write
87FF000
unkown
page read and write
6F3F000
stack
page read and write
920000
direct allocation
page execute and read and write
2CB6000
unkown
page read and write
7930000
heap
page read and write
7549000
heap
page read and write
400000
unkown
page readonly
1A350000
direct allocation
page read and write
449F000
unkown
page read and write
2C0000
unkown
page read and write
72C0000
heap
page read and write
441F000
unkown
page read and write
4D5E000
stack
page read and write
2374000
direct allocation
page execute and read and write
2AF000
unkown
page read and write
2600000
unkown
page readonly
B920000
unkown
page read and write
3A4000
heap
page read and write
48A4000
heap
page read and write
78EF000
stack
page read and write
48A7000
heap
page read and write
10B6000
system
page read and write
6F5000
heap
page read and write
1C30000
unkown
page readonly
4160000
unkown
page read and write
850D000
unkown
page read and write
2FC9000
heap
page read and write
36E000
stack
page read and write
607000
heap
page read and write
449B000
unkown
page read and write
3CE000
stack
page read and write
46D0000
unkown
page readonly
6F3F000
stack
page read and write
546E000
stack
page read and write
20E0000
heap
page read and write
210000
unkown
page readonly
6FE3000
heap
page read and write
411000
unkown
page readonly
4070000
unkown
page read and write
86C9000
unkown
page read and write
E4D000
system
page execute and read and write
BB5C000
system
page read and write
4AB0000
system
page execute and read and write
335000
heap
page read and write
1FF4000
trusted library section
page readonly
726000
heap
page read and write
522000
heap
page read and write
79EF000
stack
page read and write
83A7000
unkown
page read and write
2910000
unkown
page readonly
B963000
unkown
page read and write
540D000
heap
page read and write
5D30000
heap
page read and write
4120000
unkown
page read and write
19F000
stack
page read and write
1D20000
unkown
page read and write
20000
unkown
page readonly
28C0000
unkown
page read and write
8864000
unkown
page read and write
2510000
heap
page read and write
87FC000
unkown
page read and write
6DDE000
stack
page read and write
244000
heap
page read and write
7230000
heap
page read and write
1A42A000
direct allocation
page read and write
214D000
stack
page read and write
1D50000
heap
page read and write
2CAB000
unkown
page read and write
1D73000
heap
page read and write
5CD1000
heap
page read and write
2509000
trusted library section
page readonly
6D49000
stack
page read and write
87F9000
unkown
page read and write
2898000
stack
page read and write
43F0000
unkown
page read and write
841F000
unkown
page read and write
85F7000
unkown
page read and write
1A5A1000
direct allocation
page read and write
1A42D000
direct allocation
page read and write
6554000
heap
page read and write
335000
heap
page read and write
4540000
unkown
page readonly
1A9000
stack
page read and write
520000
heap
page read and write
8608000
unkown
page read and write
2560000
direct allocation
page execute and read and write
4B0A000
system
page execute and read and write
B5A0000
unkown
page read and write
1A42D000
direct allocation
page read and write
1A590000
direct allocation
page read and write
A4CA000
stack
page read and write
400000
unkown
page readonly
2B06000
unclassified section
page read and write
B595000
heap
page read and write
7953000
heap
page read and write
21D0000
heap
page read and write
290000
unkown
page readonly
6730000
trusted library allocation
page read and write
1A5A4000
direct allocation
page read and write
3FB7000
stack
page read and write
6D20000
heap
page read and write
672D000
stack
page read and write
82D1000
unkown
page read and write
48A0000
heap
page read and write
44F0000
unkown
page readonly
1A5A1000
direct allocation
page read and write
8807000
unkown
page read and write
68E000
heap
page read and write
4080000
unkown
page read and write
1EE0000
heap
page read and write
C20000
direct allocation
page execute and read and write
1A610000
direct allocation
page read and write
401000
unkown
page execute read
244000
heap
page read and write
6450000
unkown
page readonly
347000
heap
page read and write
1A4A0000
direct allocation
page read and write
61E9E000
unkown
page readonly
DD000
stack
page read and write
6730000
trusted library allocation
page read and write
233000
stack
page read and write
2CB9000
unkown
page read and write
4530000
unkown
page readonly
8521000
unkown
page read and write
4110000
unkown
page read and write
85F4000
unkown
page read and write
1A590000
direct allocation
page read and write
3A6000
heap
page read and write
8636000
unkown
page read and write
7E40000
heap
page read and write
2F9E000
stack
page read and write
886D000
unkown
page read and write
7934000
heap
page read and write
290000
trusted library allocation
page read and write
31B0000
heap
page read and write
2B20000
unkown
page read and write
2CBF000
unkown
page read and write
4B06000
system
page execute and read and write
2CB0000
unkown
page read and write
506000
unkown
page read and write
6FC4000
heap
page read and write
71FD000
heap
page read and write
210000
unkown
page readonly
4E69000
stack
page read and write
425000
unkown
page read and write
88F5000
unkown
page read and write
777B000
unkown
page read and write
84EE000
unkown
page read and write
637000
heap
page read and write
7110000
heap
page read and write
400000
unkown
page readonly
2050000
trusted library allocation
page execute and read and write
3FC0000
unkown
page read and write
4BBF000
stack
page read and write
B7E3000
unkown
page read and write
5C80000
heap
page read and write
6D50000
heap
page read and write
84C0000
unkown
page read and write
2FC5000
heap
page read and write
725000
heap
page read and write
2500000
direct allocation
page execute and read and write
7115000
heap
page read and write
61E8C000
unkown
page read and write
8611000
unkown
page read and write
560000
heap
page read and write
1A4B0000
direct allocation
page read and write
54F000
heap
page read and write
85F2000
unkown
page read and write
1A610000
direct allocation
page read and write
7FA000
unclassified section
page execute and read and write
44B8000
unkown
page read and write
B5C0000
unkown
page read and write
7E19000
stack
page read and write
A4C7000
stack
page read and write
40A000
unkown
page read and write
3F2000
heap
page read and write
1A5A4000
direct allocation
page read and write
411000
unkown
page readonly
39E0000
heap
page read and write
85F2000
unkown
page read and write
879E000
unkown
page read and write
4060000
unkown
page read and write
7470000
heap
page read and write
2377000
direct allocation
page execute and read and write
82D1000
unkown
page read and write
19F000
stack
page read and write
6730000
trusted library allocation
page read and write
7064000
heap
page read and write
2AAC000
unclassified section
page read and write
BF08000
system
page read and write
4000000
unkown
page read and write
1F90000
heap
page read and write
71E0000
heap
page read and write
78B0000
heap
page read and write
700000
heap
page read and write
401000
unkown
page execute read
88FD000
unkown
page read and write
28B0000
unkown
page readonly
4C10000
heap
page read and write
249F000
stack
page read and write
61E00000
unkown
page readonly
540000
heap
page read and write
6730000
trusted library allocation
page read and write
1D55000
heap
page read and write
450000
unkown
page read and write
ABFA000
stack
page read and write
6558000
heap
page read and write
1276000
system
page read and write
EB3000
system
page read and write
20000
unkown
page readonly
4317000
unkown
page read and write
7A0000
heap
page read and write
7549000
heap
page read and write
2CA2000
unkown
page read and write
79FA000
heap
page read and write
6730000
trusted library allocation
page read and write
5590000
heap
page read and write
2554000
heap
page read and write
310000
trusted library allocation
page read and write
54EE000
stack
page read and write
2890000
trusted library allocation
page read and write
27A000
unkown
page read and write
8582000
unkown
page read and write
558E000
stack
page read and write
440D000
unkown
page read and write
1A4A0000
direct allocation
page read and write
E10000
system
page execute and read and write
869E000
unkown
page read and write
82CC000
unkown
page read and write
BB0000
direct allocation
page execute and read and write
82D5000
unkown
page read and write
25F0000
unkown
page readonly
4450000
unkown
page read and write
6E4E000
stack
page read and write
82CC000
unkown
page read and write
71D000
heap
page read and write
2CBC000
unkown
page read and write
731E000
stack
page read and write
8600000
unkown
page read and write
44C3000
unkown
page read and write
BA1000
direct allocation
page execute and read and write
410000
unkown
page read and write
2ED000
stack
page read and write
32D000
stack
page read and write
1F90000
heap
page read and write
4B08000
system
page execute and read and write
1A4B0000
direct allocation
page read and write
E0000
unkown
page read and write
B9A2000
system
page read and write
69E000
stack
page read and write
4510000
unkown
page execute and read and write
88FD000
unkown
page read and write
4B12000
system
page execute and read and write
8422000
unkown
page read and write
2CB6000
unkown
page read and write
536E000
stack
page read and write
89000
stack
page read and write
7BE0000
heap
page read and write
654F000
heap
page read and write
10000
heap
page read and write
1A42D000
direct allocation
page read and write
860000
unclassified section
page execute and read and write
8602000
unkown
page read and write
82D5000
unkown
page read and write
2FEA000
unclassified section
page read and write
2A0000
unkown
page read and write
713000
heap
page read and write
4A13000
trusted library allocation
page read and write
5CF1000
heap
page read and write
1A610000
direct allocation
page read and write
2801000
unkown
page read and write
8820000
unkown
page read and write
7224000
heap
page read and write
1D73000
heap
page read and write
897000
heap
page read and write
2950000
unkown
page execute and read and write
448C000
unkown
page read and write
7F90000
trusted library allocation
page read and write
4188000
unkown
page read and write
1A5A4000
direct allocation
page read and write
250000
heap
page read and write
44C3000
unkown
page read and write
85F4000
unkown
page read and write
6559000
heap
page read and write
1F0000
unkown
page readonly
8805000
unkown
page read and write
3FD000
heap
page read and write
2CA8000
unkown
page read and write
3F10000
unkown
page read and write
2F6000
heap
page read and write
2504000
trusted library section
page readonly
8861000
unkown
page read and write
20F0000
heap
page read and write
1A5B0000
direct allocation
page read and write
A850000
heap
page read and write
61EA4000
unkown
page readonly
2BF000
unkown
page read and write
28ED000
stack
page read and write
6F4A000
stack
page read and write
6E4E000
stack
page read and write
1DFE000
stack
page read and write
6521000
heap
page read and write
886A000
unkown
page read and write
206D000
heap
page read and write
8600000
unkown
page read and write
1A42D000
direct allocation
page read and write
44D0000
unkown
page readonly
A24000
direct allocation
page execute and read and write
40C000
unkown
page read and write
20000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
7E6C000
stack
page read and write
2E0000
unkown
page readonly
3CF7000
unkown
page readonly
6E7000
heap
page read and write
A4C0000
stack
page read and write
7F6C000
stack
page read and write
63D000
heap
page read and write
2250000
heap
page read and write
1A42A000
direct allocation
page read and write
1A42D000
direct allocation
page read and write
4060000
unkown
page read and write
2CA8000
unkown
page read and write
10000
heap
page read and write
7934000
heap
page read and write
84D2000
unkown
page read and write
6FE3000
heap
page read and write
AA0000
direct allocation
page execute and read and write
6CC000
heap
page read and write
850D000
unkown
page read and write
506000
unkown
page read and write
83E2000
unkown
page read and write
61EA0000
unkown
page read and write
860E000
unkown
page read and write
85D2000
unkown
page read and write
8675000
unkown
page read and write
4070000
unkown
page read and write
635000
heap
page read and write
1D13000
unkown
page read and write
82C5000
unkown
page read and write
2A5F000
stack
page read and write
8611000
unkown
page read and write
2FC0000
heap
page read and write
224E000
stack
page read and write
531000
heap
page read and write
885B000
unkown
page read and write
2E9F000
stack
page read and write
85AC000
unkown
page read and write
329000
heap
page read and write
40000
system
page execute and read and write
6750000
unkown
page read and write
79F0000
heap
page read and write
547000
heap
page read and write
71A0000
heap
page read and write
4F60000
heap
page read and write
46CC000
stack
page read and write
82C5000
unkown
page read and write
250F000
trusted library section
page readonly
45A0000
unkown
page readonly
53D0000
trusted library allocation
page read and write
35B0000
heap
page read and write
2B50000
unkown
page readonly
8521000
unkown
page read and write
A4CA000
stack
page read and write
8900000
unkown
page read and write
5380000
heap
page read and write
3FC0000
unkown
page read and write
B590000
heap
page read and write
21F0000
heap
page read and write
638000
heap
page read and write
46CC000
stack
page read and write
6730000
trusted library allocation
page read and write
85FD000
unkown
page read and write
830000
unkown
page readonly
6730000
trusted library allocation
page read and write
655D000
heap
page read and write
6DC000
heap
page read and write
434F000
unkown
page read and write
4050000
unkown
page read and write
A30000
direct allocation
page execute and read and write
6730000
trusted library allocation
page read and write
2D0000
unkown
page readonly
1A4B0000
direct allocation
page read and write
186000
heap
page read and write
260C000
stack
page read and write
37B000
heap
page read and write
292C000
unkown
page read and write
8664000
unkown
page read and write
1AC000
stack
page read and write
7D9E000
stack
page read and write
BA7000
direct allocation
page execute and read and write
449B000
unkown
page read and write
1A5A7000
direct allocation
page read and write
510000
unkown
page readonly
42AE000
stack
page read and write
290000
trusted library allocation
page read and write
26F0000
unkown
page read and write
2643000
unkown
page read and write
731000
heap
page read and write
2C21000
unkown
page read and write
4DD8000
stack
page read and write
866C000
unkown
page read and write
8558000
unkown
page read and write
894000
heap
page read and write
85F7000
unkown
page read and write
84EE000
unkown
page read and write
61EA3000
unkown
page write copy
B8E0000
unkown
page read and write
4484000
unkown
page read and write
2500000
trusted library section
page readonly
8926000
unkown
page read and write
6C79000
stack
page read and write
41C0000
unkown
page readonly
7EC0000
unkown
page read and write
655D000
heap
page read and write
340000
heap
page read and write
1A5A1000
direct allocation
page read and write
6D4B000
stack
page read and write
2E0000
unkown
page readonly
10000
heap
page read and write
21A0000
heap
page read and write
61E8E000
unkown
page readonly
1A5A1000
direct allocation
page read and write
49A0000
trusted library allocation
page read and write
1A5A4000
direct allocation
page read and write
8858000
unkown
page read and write
2CAB000
unkown
page read and write
2B0000
trusted library allocation
page execute and read and write
C09A000
system
page read and write
79FA000
heap
page read and write
3A4000
heap
page read and write
410C000
stack
page read and write
2B3000
system
page execute and read and write
637000
heap
page read and write
88FA000
unkown
page read and write
18C000
stack
page read and write
7428000
stack
page read and write
8805000
unkown
page read and write
250000
unkown
page read and write
82C0000
unkown
page read and write
44D000
unkown
page read and write
2801000
unkown
page read and write
A10000
direct allocation
page execute and read and write
4B22000
system
page execute and read and write
8669000
unkown
page read and write
1A5A7000
direct allocation
page read and write
1A4A0000
direct allocation
page read and write
42AE000
stack
page read and write
3B00000
unkown
page read and write
851A000
unkown
page read and write
408000
unkown
page readonly
690000
unkown
page readonly
7428000
stack
page read and write
2891000
heap
page read and write
650000
heap
page read and write
1A42D000
direct allocation
page read and write
1D40000
unkown
page readonly
850F000
unkown
page read and write
860B000
unkown
page read and write
8506000
unkown
page read and write
43B000
unkown
page readonly
800000
trusted library allocation
page read and write
B8E0000
unkown
page read and write
8844000
unkown
page read and write
6D4B000
stack
page read and write
1B0000
unkown
page read and write
1A4A0000
direct allocation
page read and write
744F000
stack
page read and write
2CAE000
unkown
page read and write
526E000
stack
page read and write
2150000
trusted library allocation
page read and write
857F000
unkown
page read and write
288D000
stack
page read and write
4210000
unkown
page read and write
B7A0000
unkown
page read and write
63D000
heap
page read and write
1B0000
unkown
page read and write
54AE000
stack
page read and write
3FAF000
stack
page read and write
4A19000
trusted library allocation
page read and write
2E9F000
stack
page read and write
4620000
unkown
page read and write
220000
unkown
page read and write
B7E3000
unkown
page read and write
3F0000
heap
page read and write
6FC0000
heap
page read and write
2910000
unkown
page readonly
610000
heap
page read and write
6536000
heap
page read and write
3FF0000
unkown
page read and write
2C0000
heap
page read and write
2270000
direct allocation
page execute and read and write
288D000
stack
page read and write
1A350000
direct allocation
page read and write
8858000
unkown
page read and write
693C000
stack
page read and write
460000
heap
page read and write
2C44000
heap
page read and write
18C000
stack
page read and write
1D70000
heap
page read and write
240000
heap
page read and write
290000
unkown
page readonly
5030000
heap
page read and write
6E5A000
stack
page read and write
6F4A000
stack
page read and write
850F000
unkown
page read and write
704000
heap
page read and write
82FD000
unkown
page read and write
62E000
heap
page read and write
2C21000
unkown
page read and write
406000
heap
page read and write
400000
heap
page read and write
4EED000
stack
page read and write
8861000
unkown
page read and write
53D0000
trusted library allocation
page read and write
4550000
unkown
page readonly
886F000
unkown
page read and write
617000
heap
page read and write
2CB3000
unkown
page read and write
2370000
direct allocation
page execute and read and write
4457000
unkown
page read and write
697000
heap
page read and write
38E000
stack
page read and write
4423000
unkown
page read and write
53D0000
trusted library allocation
page read and write
6450000
unkown
page readonly
87BB000
unkown
page read and write
DB000
stack
page read and write
785E000
stack
page read and write
4450000
unkown
page read and write
3AF0000
unkown
page read and write
7115000
heap
page read and write
76AD000
stack
page read and write
5C7F000
stack
page read and write
2FCE000
heap
page read and write
4040000
unkown
page readonly
549000
heap
page read and write
1DD0000
unkown
page readonly
6559000
heap
page read and write
4540000
unkown
page readonly
1A42A000
direct allocation
page read and write
78AF000
stack
page read and write
721F000
heap
page read and write
27A000
unkown
page read and write
624000
heap
page read and write
785E000
stack
page read and write
1D30000
unkown
page read and write
930000
direct allocation
page execute and read and write
7540000
heap
page read and write
8903000
unkown
page read and write
883B000
unkown
page read and write
1A42A000
direct allocation
page read and write
1A350000
direct allocation
page read and write
2E58000
unclassified section
page read and write
2C6F000
unkown
page read and write
88C0000
unkown
page read and write
8D000
stack
page read and write
886F000
unkown
page read and write
2380000
direct allocation
page execute and read and write
10000
heap
page read and write
739C000
stack
page read and write
85FD000
unkown
page read and write
7060000
heap
page read and write
841B000
unkown
page read and write
857F000
unkown
page read and write
100000
unkown
page read and write
8636000
unkown
page read and write
790000
heap
page read and write
553C000
stack
page read and write
600000
heap
page read and write
2E0000
heap
page read and write
440D000
unkown
page read and write
1A4A0000
direct allocation
page read and write
4484000
unkown
page read and write
5CEC000
heap
page read and write
891000
heap
page read and write
88BD000
unkown
page read and write
8337000
unkown
page read and write
401000
unkown
page execute read
44B6000
unkown
page read and write
310000
trusted library allocation
page read and write
86C9000
unkown
page read and write
27F0000
unkown
page read and write
7567000
heap
page read and write
1D20000
unkown
page read and write
73D0000
heap
page read and write
3FAF000
stack
page read and write
84C0000
unkown
page read and write
E0000
unkown
page read and write
B820000
unkown
page read and write
411000
unkown
page readonly
4464000
unkown
page read and write
44D0000
unkown
page readonly
1A42A000
direct allocation
page read and write
1A42D000
direct allocation
page read and write
52F000
stack
page read and write
8864000
unkown
page read and write
4DD0000
stack
page read and write
3F10000
unkown
page read and write
There are 1117 hidden memdumps, click here to show them.