IOC Report

loading gif

Files

File Path
Type
Category
Malicious
DOC_MDR0307_019.doc
Rich Text Format data, unknown version
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\plugmanzx[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
downloaded
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{6F85BCFE-F7E6-4D70-8C81-5E2AC6A32603}.tmp
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp41F1.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
Non-ISO extended-ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\ZdNnwVcb.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\plugmancdht5461.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{98065E3E-C6B7-49AF-9D9F-8AB4FD115355}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{EA9EF1E3-15A6-45BA-9A80-F6F38BA9CAD0}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\tmp9E5E.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA9E2.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\catalog.dat
data
dropped
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\settings.bin
data
dropped
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\storage.dat
data
dropped
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\task.dat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\DOC_MDR0307_019.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:57 2021, mtime=Mon Aug 30 20:08:57 2021, atime=Mon Jan 24 22:30:17 2022, length=445364, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FIY27LSZ1R4X92P268IK.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
dropped
C:\Users\user\Desktop\~$C_MDR0307_019.doc
data
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Users\user\AppData\Roaming\plugmancdht5461.exe
C:\Users\user\AppData\Roaming\plugmancdht5461.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZdNnwVcb.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZdNnwVcb" /XML "C:\Users\user\AppData\Local\Temp\tmp41F1.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe" /create /f /tn "SMTP Service" /xml "C:\Users\user\AppData\Local\Temp\tmpA9E2.tmp
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe" /create /f /tn "SMTP Service Task" /xml "C:\Users\user\AppData\Local\Temp\tmp9E5E.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe 0
malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
C:\Windows\System32\taskeng.exe
taskeng.exe {AC07D2CB-425B-43FA-983F-3B14071F638D} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
"C:\Program Files (x86)\SMTP Service\smtpsvc.exe" 0
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
"C:\Program Files (x86)\SMTP Service\smtpsvc.exe"
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://paxz.tk/plugmanzx.exe
2.58.149.41
malicious
4,0,419161966,0000000000099000,00000104,00000010,00020000,00000000,1,0
malicious
vijayikohli1.bounceme.net
malicious
127.0.0.1
malicious
http://google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
paxz.tk
2.58.149.41
malicious
vijayikohli1.bounceme.net
103.153.78.234
malicious

IPs

IP
Domain
Country
Malicious
103.153.78.234
vijayikohli1.bounceme.net
unknown
malicious
2.58.149.41
paxz.tk
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
*k,
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
?o,
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
5x,
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\2FB21
2FB21
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
@SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Agency FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aharoni
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Algerian
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Andalus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Angsana New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
AngsanaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Aparajita
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arabic Typesetting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Narrow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Rounded MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Arial Unicode MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Baskerville Old Face
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Batang
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BatangChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bauhaus 93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bell MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Berlin Sans FB Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bernard MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Blackadder ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bodoni MT Poster Compressed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Book Antiqua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookman Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bookshelf Symbol 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Bradley Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Britannic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Broadway
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Browallia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
BrowalliaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Brush Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calibri Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Californian FB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Calisto MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Candara
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Castellar
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Centaur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Century Schoolbook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Chiller
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Colonna MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Comic Sans MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Consolas
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Constantia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cooper Black
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Copperplate Gothic Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Corbel
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Cordia New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
CordiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Courier New
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Curlz MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DaunPenh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
David
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DFKai-SB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DilleniaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DokChampa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Dotum
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
DotumChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ebrima
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Edwardian Script ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Elephant
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Engravers MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Bold ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Demi ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Light ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Eras Medium ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Estrangelo Edessa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
EucrosiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Euphemia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FangSong
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Felix Titling
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Footlight MT Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Forte
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Book
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Demi Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Heavy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Franklin Gothic Medium Cond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FrankRuehl
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
FreesiaUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Freestyle Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
French Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gabriola
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Garamond
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gautami
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Georgia
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gigi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans MT Ext Condensed Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gill Sans Ultra Bold Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gisha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gloucester MT Extra Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Old Style
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Goudy Stout
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gulim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GulimChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Gungsuh
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
GungsuhChe
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Haettenschweiler
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harlow Solid Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Harrington
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
High Tower Text
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Impact
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Imprint MT Shadow
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Informal Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
IrisUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Iskoola Pota
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
JasmineUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Jokerman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Juice ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KaiTi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kalinga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kartika
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Khmer UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
KodchiangUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kokila
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kristen ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Kunstler Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lao UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Latha
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Leelawadee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Levenim MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
LilyUPC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Bright
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Calligraphy
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Console
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Fax
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Handwriting
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Typewriter
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Lucida Sans Unicode
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Magneto
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Maiandra GD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Malgun Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mangal
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Marlett
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Matura MT Script Capitals
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Meiryo UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Himalaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft JhengHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft New Tai Lue
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft PhagsPa
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Tai Le
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Uighur
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft YaHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Microsoft Yi Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU_HKSCS-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Miriam Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mistral
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Modern No. 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Mongolian Baiti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Monotype Corsiva
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MoolBoran
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Mincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Outlook
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PGothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS PMincho
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Sans Serif
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS Reference Specialty
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MS UI Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MT Extra
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
MV Boli
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Narkisim
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Engraved
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Niagara Solid
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
NSimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Nyala
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
OCR A Extended
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Old English Text MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Onyx
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palace Script MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Palatino Linotype
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Papyrus
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Parchment
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Perpetua Titling MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Plantagenet Cherokee
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Playbill
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
PMingLiU-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Poor Richard
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Pristina
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Raavi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rage Italic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Ravie
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rockwell Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Rod
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sakkal Majalla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Script MT Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Print
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Light
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Semibold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Segoe UI Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shonar Bangla
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Showcard Gothic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Shruti
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimHei
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Simplified Arabic Fixed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
SimSun-ExtB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Snap ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Stencil
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Sylfaen
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Symbol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tahoma
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tempus Sans ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Times New Roman
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Traditional Arabic
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Trebuchet MS
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tunga
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Tw Cen MT Condensed Extra Bold
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Utsaah
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vani
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Verdana
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vijaya
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Viner Hand ITC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vivaldi
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vladimir Script
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Vrinda
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Webdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wide Latin
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Wingdings 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\3A1BB
3A1BB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100A0C00100000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F100C0400100000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10090400100000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\3A1BB
3A1BB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Options
ZoomApp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTA
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run
SMTP Service
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Handshake\{AC07D2CB-425B-43FA-983F-3B14071F638D}
data
There are 315 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5A0000
trusted library section
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
36A9000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
24B4000
trusted library allocation
page read and write
malicious
2441000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3649000
trusted library allocation
page read and write
malicious
5E1D000
trusted library allocation
page read and write
644E000
stack
page read and write
570000
trusted library allocation
page read and write
8B0000
trusted library section
page read and write
270000
heap
page read and write
4930000
trusted library allocation
page read and write
150000
heap
page read and write
4EEE000
stack
page read and write
4930000
trusted library allocation
page read and write
FC0000
unkown
page readonly
570000
trusted library allocation
page read and write
580000
trusted library allocation
page read and write
521A000
trusted library allocation
page read and write
2772000
trusted library allocation
page read and write
507000
heap
page read and write
FD000
trusted library allocation
page execute and read and write
4770000
trusted library allocation
page read and write
5EAE000
stack
page read and write
4930000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
3629000
trusted library allocation
page read and write
3B6000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
5F0000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
10000
heap
page read and write
4920000
trusted library allocation
page execute and read and write
6DD000
heap
page read and write
317000
trusted library allocation
page execute and read and write
AB0000
trusted library allocation
page read and write
139A000
unkown
page readonly
578000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
6E9C000
stack
page read and write
10000
heap
page read and write
5E29000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
E52000
heap
page read and write
4920000
trusted library allocation
page read and write
F7E000
stack
page read and write
3AC2000
trusted library allocation
page read and write
48BF000
stack
page read and write
2601000
trusted library allocation
page read and write
524000
heap
page read and write
AB6000
trusted library allocation
page read and write
51DC000
trusted library allocation
page read and write
D8E000
stack
page read and write
51D9000
trusted library allocation
page read and write
6D0000
heap
page read and write
5E29000
trusted library allocation
page read and write
580000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
B2C000
stack
page read and write
E04000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
36A1000
trusted library allocation
page read and write
4770000
trusted library allocation
page read and write
2668000
trusted library allocation
page read and write
51FF000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
57D000
heap
page read and write
517E000
stack
page read and write | page guard
3979000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
22D000
heap
page read and write
3B0000
trusted library allocation
page read and write
4C0000
heap
page read and write
390000
trusted library allocation
page read and write
3E81000
trusted library allocation
page read and write
4DFE000
stack
page read and write
4930000
trusted library allocation
page read and write
3691000
trusted library allocation
page read and write
208000
stack
page read and write
9EE000
stack
page read and write
500000
trusted library allocation
page read and write
266B000
trusted library allocation
page read and write
FC2000
unkown
page execute read
5A0000
trusted library allocation
page read and write
237000
heap
page read and write
5E27000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
4FE0000
heap
page read and write
5C0000
trusted library allocation
page read and write
50000
unkown
page readonly
5E29000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1B7000
trusted library allocation
page execute and read and write
60000
unkown
page readonly
BBE000
stack
page read and write
5E27000
trusted library allocation
page read and write
416000
heap
page read and write
3F2000
heap
page read and write
5C0000
trusted library allocation
page read and write
22B000
stack
page read and write
4930000
trusted library allocation
page read and write
11BE000
stack
page read and write
CA000
stack
page read and write
4DDC000
stack
page read and write
50000
unkown
page readonly
F1E000
stack
page read and write | page guard
284000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
4710000
trusted library allocation
page read and write
49C0000
trusted library allocation
page read and write
880000
heap
page execute and read and write
51D9000
trusted library allocation
page read and write
298C000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
60000
unkown
page readonly
5F40000
heap
page read and write
E26000
trusted library allocation
page read and write
5D1C000
stack
page read and write
491B000
trusted library allocation
page read and write
344C000
trusted library allocation
page read and write
3B2000
trusted library allocation
page read and write
53EC000
stack
page read and write
17B000
stack
page read and write
570000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
590000
trusted library allocation
page read and write
51F5000
trusted library allocation
page read and write
200000
heap
page read and write
400000
remote allocation
page execute and read and write
1390000
unkown
page readonly
F6E000
stack
page read and write
5E29000
trusted library allocation
page read and write
3C2000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
4A20000
heap
page execute and read and write
5E29000
trusted library allocation
page read and write
3701000
trusted library allocation
page read and write
FC2000
unkown
page execute read
49D0000
trusted library allocation
page read and write
F0000
trusted library allocation
page read and write
3D0000
heap
page read and write
5E18000
trusted library allocation
page read and write
210000
trusted library allocation
page read and write
490000
heap
page read and write
5E2F000
stack
page read and write
108000
heap
page read and write
21D000
trusted library allocation
page execute and read and write
5F0000
trusted library allocation
page read and write
22EE000
stack
page read and write
219F000
stack
page read and write
830000
heap
page read and write
3AF2000
trusted library allocation
page read and write
10000
heap
page read and write
1182000
unkown
page execute read
472E000
stack
page read and write
4ABE000
stack
page read and write
5E40000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
5E1D000
trusted library allocation
page read and write
60000
unkown
page readonly
3DD000
heap
page read and write
527000
heap
page read and write
C0000
trusted library allocation
page read and write
6C4E000
stack
page read and write
5C6000
trusted library allocation
page read and write
2FD000
heap
page read and write
5E40000
trusted library allocation
page read and write
22D000
heap
page read and write
1182000
unkown
page execute read
314000
heap
page read and write
CBE000
stack
page read and write
7ECD000
stack
page read and write
529D000
stack
page read and write
480000
heap
page execute and read and write
723000
heap
page read and write
4920000
trusted library allocation
page read and write
183000
trusted library allocation
page execute and read and write
2591000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
68BE000
stack
page read and write
3591000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
612E000
stack
page read and write
AB0000
trusted library section
page read and write
400000
remote allocation
page execute and read and write
290000
heap
page read and write
620000
trusted library allocation
page read and write
206000
stack
page read and write
5E29000
trusted library allocation
page read and write
430000
heap
page read and write
5E27000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2B2000
heap
page read and write
5C6000
trusted library allocation
page read and write
B70000
trusted library section
page read and write
5E06000
trusted library allocation
page read and write
5E80000
trusted library allocation
page read and write
4926000
trusted library allocation
page read and write
8C0000
heap
page read and write
530000
trusted library allocation
page read and write
7D7E000
stack
page read and write
50000
unkown
page readonly
5E29000
trusted library allocation
page read and write
34B000
heap
page read and write
5E29000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
3999000
trusted library allocation
page read and write
5DEB000
trusted library allocation
page read and write
647F000
stack
page read and write
F80000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
253E000
stack
page read and write
5E29000
trusted library allocation
page read and write
5D6D000
stack
page read and write
5C5000
trusted library allocation
page read and write
697000
heap
page read and write
39B000
heap
page read and write
5D0000
heap
page read and write
4BFE000
stack
page read and write
7110000
trusted library allocation
page read and write
78DE000
stack
page read and write
569E000
stack
page read and write
5E27000
trusted library allocation
page read and write
10000
heap
page read and write
625D000
stack
page read and write
1BB000
trusted library allocation
page execute and read and write
590000
trusted library allocation
page read and write
660000
trusted library allocation
page read and write
CDE000
stack
page read and write | page guard
568C000
stack
page read and write
51F8000
trusted library allocation
page read and write
290000
heap
page read and write
1180000
unkown
page readonly
5E29000
trusted library allocation
page read and write
54AF000
stack
page read and write
3601000
trusted library allocation
page read and write
2E0000
heap
page read and write
510000
trusted library allocation
page read and write
100000
heap
page read and write
49E000
stack
page read and write
5E38000
trusted library allocation
page read and write
4927000
trusted library allocation
page read and write
2D4000
heap
page read and write
3B4000
heap
page read and write
690000
heap
page read and write
5E29000
trusted library allocation
page read and write
51B6000
trusted library allocation
page read and write
5A5000
trusted library allocation
page read and write
118A000
unkown
page readonly
4930000
trusted library allocation
page read and write
206F000
stack
page read and write
5DCC000
stack
page read and write
570000
trusted library allocation
page read and write
55E000
stack
page read and write
580000
trusted library allocation
page read and write
53E000
stack
page read and write
5E27000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
60000
unkown
page readonly
4925000
trusted library allocation
page read and write
39B6000
trusted library allocation
page read and write
2AD000
trusted library allocation
page execute and read and write
243000
heap
page read and write
51E000
stack
page read and write
1390000
unkown
page readonly
627E000
stack
page read and write
5E27000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
4B0000
heap
page execute and read and write
630000
heap
page read and write
5F0000
trusted library allocation
page read and write
230000
heap
page read and write
A90000
trusted library allocation
page read and write
670000
trusted library allocation
page read and write
545000
heap
page read and write
B00000
trusted library allocation
page read and write
537000
heap
page read and write
60000
unkown
page readonly
54DD000
stack
page read and write
8C9000
heap
page read and write
570000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
5500000
heap
page read and write
5E27000
trusted library allocation
page read and write
740000
heap
page read and write
390000
heap
page read and write
5E27000
trusted library allocation
page read and write
20000
heap
page read and write
4940000
trusted library allocation
page read and write
4EAE000
stack
page read and write
5C0000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
609C000
stack
page read and write
48B4000
heap
page read and write
424000
heap
page read and write
5F66000
heap
page read and write
930000
heap
page read and write
5B60000
trusted library allocation
page read and write
40F000
stack
page read and write
5F2000
trusted library allocation
page read and write
5EF0000
heap
page read and write
3B32000
trusted library allocation
page read and write
20000
heap
page read and write
5F5000
trusted library allocation
page read and write
435000
heap
page read and write
450000
trusted library allocation
page read and write
590000
trusted library allocation
page read and write
3B0000
trusted library allocation
page execute and read and write
5D8000
heap
page read and write
4F5E000
stack
page read and write
2A0000
trusted library allocation
page read and write
51A0000
heap
page read and write
805E000
stack
page read and write
3750000
trusted library allocation
page read and write
6B4000
heap
page read and write
5DED000
trusted library allocation
page read and write
230000
heap
page read and write
E34000
heap
page read and write
86ED000
stack
page read and write
1E0000
heap
page read and write
5E27000
trusted library allocation
page read and write
397000
heap
page read and write
590000
trusted library allocation
page read and write
241000
heap
page read and write
580000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
595000
trusted library allocation
page read and write
4600000
trusted library section
page read and write
65AC000
stack
page read and write
4E5000
trusted library allocation
page read and write
28A000
trusted library allocation
page execute and read and write
FC000
stack
page read and write
5DF0000
trusted library allocation
page read and write
28A2000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
27C000
stack
page read and write
48B0000
heap
page read and write
CDF000
stack
page read and write
5E29000
trusted library allocation
page read and write
5C8000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
380000
trusted library allocation
page read and write
7EF40000
trusted library allocation
page execute and read and write
595000
trusted library allocation
page read and write
27A1000
trusted library allocation
page read and write
3E0000
heap
page read and write
5E0000
trusted library allocation
page read and write
510000
trusted library allocation
page read and write
80000
heap
page read and write
5E29000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
29A0000
heap
page read and write
450000
trusted library allocation
page read and write
5B0000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
F3000
trusted library allocation
page execute and read and write
154000
heap
page read and write
19D000
trusted library allocation
page execute and read and write
360000
heap
page read and write
41F000
heap
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
6E0000
heap
page read and write
2D0000
heap
page read and write
3721000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
71D000
stack
page read and write
5E29000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
5B0000
trusted library allocation
page read and write
D2D000
stack
page read and write
5E29000
trusted library allocation
page read and write
1B8000
stack
page read and write
B50000
trusted library section
page read and write
36C1000
trusted library allocation
page read and write
261000
heap
page read and write
5BA0000
trusted library allocation
page read and write
69FE000
stack
page read and write
B80000
trusted library section
page read and write
510000
trusted library allocation
page read and write
231000
heap
page read and write
590000
trusted library allocation
page read and write
207000
heap
page read and write
49B0000
heap
page read and write
50000
unkown
page readonly
3D4000
heap
page read and write
48DF000
stack
page read and write
E30000
heap
page read and write
23E000
heap
page read and write
C7E000
stack
page read and write
779D000
stack
page read and write
25B000
stack
page read and write
4920000
trusted library allocation
page read and write
4930000
trusted library allocation
page read and write
B8E000
stack
page read and write
2BFE000
trusted library allocation
page read and write
4940000
trusted library allocation
page read and write
560000
heap
page read and write
ED000
trusted library allocation
page execute and read and write
3AC3000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
60000
unkown
page readonly
60000
unkown
page readonly
2F0000
trusted library allocation
page execute and read and write
F1F000
stack
page read and write
769E000
stack
page read and write
662D000
stack
page read and write
12C000
stack
page read and write
7A0D000
stack
page read and write
5E29000
trusted library allocation
page read and write
2BEA000
trusted library allocation
page read and write
113F000
stack
page read and write
3959000
trusted library allocation
page read and write
1392000
unkown
page execute read
DD000
trusted library allocation
page execute and read and write
5E40000
trusted library allocation
page read and write
4EB0000
trusted library section
page read and write
4F00000
heap
page execute and read and write
5E2F000
trusted library allocation
page read and write
3929000
trusted library allocation
page read and write
450000
heap
page read and write
476F000
stack
page read and write
5E27000
trusted library allocation
page read and write
5E4F000
trusted library allocation
page read and write
128F000
stack
page read and write
570000
heap
page read and write
5E9F000
trusted library allocation
page read and write
47BC000
stack
page read and write
580000
trusted library allocation
page read and write
3CB000
trusted library allocation
page execute and read and write
570000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
10000
heap
page read and write
BCE000
stack
page read and write
5E27000
trusted library allocation
page read and write
312000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
6FBE000
stack
page read and write
6ED000
heap
page read and write
24B2000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
3909000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
50000
unkown
page readonly
370000
trusted library allocation
page read and write
C8F000
stack
page read and write
5C0000
trusted library section
page read and write
274D000
stack
page read and write
828E000
stack
page read and write
635E000
unkown
page read and write
AB0000
trusted library allocation
page read and write
5EFE000
stack
page read and write
5E27000
trusted library allocation
page read and write
617000
heap
page read and write
3B52000
trusted library allocation
page read and write
7EF58000
trusted library allocation
page execute and read and write
51DC000
trusted library allocation
page read and write
2BE8000
trusted library allocation
page read and write
CB000
stack
page read and write
475E000
stack
page read and write
5E29000
trusted library allocation
page read and write
4930000
trusted library allocation
page read and write
6A0000
heap
page read and write
37A1000
trusted library allocation
page read and write
F4000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
4950000
trusted library allocation
page read and write
260000
trusted library allocation
page execute and read and write
5E27000
trusted library allocation
page read and write
525D000
stack
page read and write
3A0000
heap
page execute and read and write
5E29000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
5A0000
trusted library allocation
page read and write
B64000
trusted library allocation
page read and write
48F0000
trusted library section
page read and write
5B0D000
stack
page read and write
48DD000
trusted library allocation
page read and write
50000
unkown
page readonly
43E000
stack
page read and write
29DB000
heap
page read and write
18D000
trusted library allocation
page execute and read and write
4E0000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
4C10000
heap
page execute and read and write
590000
trusted library allocation
page read and write
272000
heap
page read and write
5E29000
trusted library allocation
page read and write
1E0000
trusted library allocation
page execute and read and write
D90000
trusted library section
page read and write
5E29000
trusted library allocation
page read and write
5462000
heap
page read and write
282B000
trusted library allocation
page read and write
5B60000
trusted library allocation
page read and write
2BB000
trusted library allocation
page execute and read and write
440000
trusted library allocation
page execute and read and write
B30000
trusted library allocation
page read and write
E0000
trusted library allocation
page read and write
D7F000
stack
page read and write
511E000
stack
page read and write
4D0000
trusted library allocation
page read and write
841E000
stack
page read and write
20000
heap
page read and write
517F000
stack
page read and write
AD0000
trusted library allocation
page read and write
60000
unkown
page readonly
4760000
trusted library allocation
page read and write
29A5000
heap
page read and write
118A000
unkown
page readonly
A90000
trusted library allocation
page read and write
3770000
trusted library allocation
page read and write
600E000
stack
page read and write
60000
unkown
page readonly
243000
heap
page read and write
521A000
trusted library allocation
page read and write
20000
heap
page read and write
253000
heap
page read and write
5A0000
trusted library allocation
page read and write
D5F000
stack
page read and write
11EE000
stack
page read and write
2922000
trusted library allocation
page read and write
510000
trusted library allocation
page read and write
728D000
stack
page read and write
5E27000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
4C7000
trusted library allocation
page read and write
6B1D000
stack
page read and write
2F0000
heap
page read and write
4F0000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
5E29000
trusted library allocation
page read and write
5CE000
stack
page read and write
570000
trusted library allocation
page read and write
590000
trusted library section
page read and write
AB8000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
4930000
trusted library allocation
page read and write
60000
unkown
page readonly
AD0000
trusted library allocation
page read and write
10000
heap
page read and write
45E000
stack
page read and write
24BF000
stack
page read and write
220000
heap
page read and write
576000
trusted library allocation
page read and write
FC0000
unkown
page readonly
4938000
trusted library allocation
page read and write
5CDE000
stack
page read and write
350000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
4E1D000
stack
page read and write
3A0000
trusted library allocation
page read and write
14B000
stack
page read and write
5E27000
trusted library allocation
page read and write
564D000
stack
page read and write
4A0000
trusted library allocation
page read and write
634000
heap
page read and write
5E27000
trusted library allocation
page read and write
51FA000
trusted library allocation
page read and write
5B8000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
4930000
trusted library allocation
page read and write
398000
heap
page read and write
6A0000
heap
page execute and read and write
5E77000
trusted library allocation
page read and write
5C7000
trusted library allocation
page read and write
5DE3000
trusted library allocation
page read and write
5CDF000
stack
page read and write
5E29000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
51F3000
trusted library allocation
page read and write
3449000
trusted library allocation
page read and write
34E000
heap
page read and write
610000
heap
page read and write
5E27000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
4B0000
trusted library allocation
page execute and read and write
576000
trusted library allocation
page read and write
3D0000
heap
page read and write
254000
heap
page read and write
570000
trusted library allocation
page read and write
5A0000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
AFE000
stack
page read and write
5FF000
trusted library allocation
page read and write
1036000
unkown
page readonly
E0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5F48000
heap
page read and write
51ED000
stack
page read and write
39B000
heap
page read and write
D80000
trusted library section
page read and write
213000
trusted library allocation
page execute and read and write
1BB000
trusted library allocation
page execute and read and write
5E27000
trusted library allocation
page read and write
50000
unkown
page readonly
A90000
trusted library section
page read and write
1392000
unkown
page execute read
5E27000
trusted library allocation
page read and write
368000
stack
page read and write
287000
trusted library allocation
page execute and read and write
630000
heap
page execute and read and write
554000
heap
page read and write
50000
unkown
page readonly
3601000
trusted library allocation
page read and write
530000
heap
page read and write
5F0000
trusted library section
page read and write
49AC000
stack
page read and write
4920000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
20000
heap
page read and write
5F5000
trusted library allocation
page read and write
200000
trusted library allocation
page execute and read and write
10D000
trusted library allocation
page execute and read and write
492C000
trusted library allocation
page read and write
4FAC000
stack
page read and write
2830000
trusted library allocation
page read and write
4610000
trusted library section
page read and write
610000
heap
page execute and read and write
5E2000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
2E8000
stack
page read and write
5E27000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
4C0000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
650000
trusted library allocation
page read and write
4928000
trusted library allocation
page read and write
5DEF000
trusted library allocation
page read and write
74DF000
stack
page read and write
5E27000
trusted library allocation
page read and write
492C000
trusted library allocation
page read and write
5204000
trusted library allocation
page read and write
51AC000
stack
page read and write
AD0000
trusted library allocation
page read and write
3D4000
heap
page read and write
530000
trusted library allocation
page read and write
F9B000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
2482000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
7C6E000
stack
page read and write
3C0000
heap
page read and write
6A7000
heap
page read and write
CE0000
heap
page execute and read and write
51EA000
trusted library allocation
page read and write
4660000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
4980000
heap
page execute and read and write
231000
heap
page read and write
5E29000
trusted library allocation
page read and write
48A000
heap
page read and write
489F000
stack
page read and write
3BA000
trusted library allocation
page execute and read and write
5F0000
trusted library allocation
page read and write
B10000
heap
page execute and read and write
3B12000
trusted library allocation
page read and write
13B000
stack
page read and write
400000
remote allocation
page execute and read and write
9AD000
stack
page read and write
450000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
4930000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
23EE000
stack
page read and write
3D0000
heap
page read and write
710C000
stack
page read and write
570000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
5C0000
heap
page read and write
870000
heap
page read and write
283000
trusted library allocation
page execute and read and write
5E11000
trusted library allocation
page read and write
578000
trusted library allocation
page read and write
7B0E000
stack
page read and write
B60000
trusted library allocation
page read and write
7DF000
stack
page read and write
51E7000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
D7E000
stack
page read and write | page guard
590000
trusted library allocation
page read and write
4770000
trusted library allocation
page read and write
290000
trusted library allocation
page read and write
2C17000
trusted library allocation
page read and write
230000
trusted library allocation
page read and write
5440000
heap
page read and write
5F0000
trusted library allocation
page read and write
234F000
stack
page read and write
10000
heap
page read and write
2601000
trusted library allocation
page read and write
2B7000
trusted library allocation
page execute and read and write
4760000
heap
page execute and read and write
533E000
stack
page read and write
68FD000
stack
page read and write
5A0000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
9F8000
trusted library allocation
page read and write
36E1000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
5E21000
trusted library allocation
page read and write
4930000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
20000
heap
page read and write
490000
trusted library allocation
page execute and read and write
AB0000
trusted library allocation
page read and write
4850000
trusted library section
page read and write
5E29000
trusted library allocation
page read and write
1036000
unkown
page readonly
5E29000
trusted library allocation
page read and write
542E000
stack
page read and write
5E27000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
2B7000
heap
page read and write
3D0000
heap
page read and write
520000
heap
page read and write
B50000
trusted library allocation
page read and write
5EE000
trusted library allocation
page read and write
2B3000
heap
page read and write
48D2000
heap
page read and write
9A000
stack
page read and write
5B7C000
stack
page read and write
500000
heap
page read and write
B30000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
4E0000
heap
page read and write
100000
trusted library allocation
page read and write
50000
unkown
page readonly
3C7000
trusted library allocation
page execute and read and write
580000
trusted library allocation
page read and write
184000
trusted library allocation
page read and write
4936000
trusted library allocation
page read and write
10000
heap
page read and write
5E29000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
4930000
trusted library allocation
page read and write
3441000
trusted library allocation
page read and write
580000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
249A000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
1180000
unkown
page readonly
3AA2000
trusted library allocation
page read and write
5E38000
trusted library allocation
page read and write
63CE000
stack
page read and write
F90000
trusted library allocation
page read and write
60000
unkown
page readonly
5E29000
trusted library allocation
page read and write
29D000
trusted library allocation
page execute and read and write
E9E000
stack
page read and write
6DAE000
stack
page read and write
5E29000
trusted library allocation
page read and write
600000
trusted library allocation
page execute and read and write
540000
trusted library allocation
page read and write
5445000
heap
page read and write
48A0000
trusted library allocation
page read and write
253000
heap
page read and write
AB0000
trusted library allocation
page read and write
4A00000
trusted library allocation
page read and write
350000
heap
page read and write
5E29000
trusted library allocation
page read and write
D3000
trusted library allocation
page execute and read and write
110F000
stack
page read and write
283000
heap
page read and write
4920000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
139A000
unkown
page readonly
4920000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
6C4000
heap
page read and write
3AE2000
trusted library allocation
page read and write
D4000
trusted library allocation
page read and write
4B5E000
stack
page read and write
2B0000
heap
page read and write
5E38000
trusted library allocation
page read and write
50000
unkown
page readonly
172000
heap
page read and write
310000
heap
page read and write
D70000
trusted library allocation
page read and write
34D000
stack
page read and write
4E0000
trusted library allocation
page read and write
513E000
stack
page read and write
1B7000
trusted library allocation
page execute and read and write
10000
heap
page read and write
ABC000
trusted library allocation
page read and write
5E21000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
31B000
trusted library allocation
page execute and read and write
2C15000
trusted library allocation
page read and write
5B9D000
stack
page read and write
51EA000
trusted library allocation
page read and write
560000
heap
page execute and read and write
5B60000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
507000
trusted library allocation
page read and write
5DF7000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
253000
heap
page read and write
3A0000
heap
page read and write
465D000
stack
page read and write
4E0000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
3E0000
heap
page read and write
38E000
stack
page read and write
50000
unkown
page readonly
60000
unkown
page readonly
538E000
stack
page read and write
758D000
stack
page read and write
214000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
690000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
58E000
stack
page read and write
596000
trusted library allocation
page read and write
50000
unkown
page readonly
73DC000
stack
page read and write
5E0000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
500000
trusted library allocation
page read and write
1FB000
stack
page read and write
48C0000
trusted library allocation
page read and write
28D000
trusted library allocation
page execute and read and write
A90000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
294000
heap
page read and write
118E000
stack
page read and write
4E40000
trusted library allocation
page read and write
There are 849 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
4,0,419161966,0000000000099000,00000104,00000010,00020000,00000000,1,0