Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
sample1.doc
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Author: User, Template: Normal.dotm,
Last Saved By: kirin, Revision Number: 7, Name of Creating Application: Microsoft Office Word, Total Editing Time: 20:00,
Create Time/Date: Sun May 10 01:31:00 2020, Last Saved Time/Date: Wed Oct 28 04:44:00 2020, Number of Pages: 2, Number of
Words: 89482, Number of Characters: 510049, Security: 0
|
initial sample
|
||
C:\Users\Public\Ksh1.pdf
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0001.doc
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0002.doc
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0003.doc
|
ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0005.doc
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD3150.doc
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD3271.doc
|
ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B65D8493-1CF8-4E74-AA78-05F4F57053A0}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E53D9D93-E64E-47DE-ADA9-74F7E4555893}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Ksh1.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Jan 14 10:26:51
2021, mtime=Thu Jan 14 10:26:51 2021, atime=Thu Jan 14 10:26:52 2021, length=595972, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Public.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue
Jul 14 02:20:08 2009, mtime=Thu Jan 14 10:26:51 2021, atime=Thu Jan 14 10:26:51 2021, length=4096, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\sample1.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Jan 14 10:25:30
2021, mtime=Thu Jan 14 10:25:30 2021, atime=Thu Jan 14 10:25:32 2021, length=856064, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$ample1.doc
|
data
|
dropped
|
||
C:\Users\Public\~$Ksh1.doc
|
data
|
dropped
|
||
C:\Users\Public\~$Ksh1.xls
|
data
|
dropped
|
||
C:\Users\Public\~WRD0000.tmp
|
ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\Public\~WRD0004.tmp
|
ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
There are 10 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\certutil.exe
|
Certutil -decode C:\Users\Public\Ksh1.xls C:\Users\Public\Ksh1.pdf
|
||
C:\Users\user\AppData\Local\Temp\tmp_e473b4.exe
|
C:\Users\user\AppData\Local\Temp/tmp_e473b4.exe
|
||
C:\Windows\SysWOW64\NlsData0018\WPDShextAutoplay.exe
|
C:\Windows\SysWOW64\NlsData0018\WPDShextAutoplay.exe
|
||
C:\Windows\SysWOW64\DevicePairingHandler\shellstyle.exe
|
C:\Windows\SysWOW64\DevicePairingHandler\shellstyle.exe
|
||
C:\Windows\SysWOW64\shsvcs\NlsLexicons0416.exe
|
C:\Windows\SysWOW64\shsvcs\NlsLexicons0416.exe
|
||
C:\Windows\SysWOW64\mfc110fra\mobsync.exe
|
C:\Windows\SysWOW64\mfc110fra\mobsync.exe
|
||
C:\Windows\SysWOW64\capisp\jsproxy.exe
|
C:\Windows\SysWOW64\capisp\jsproxy.exe
|
||
C:\Windows\SysWOW64\riched20\dllhost.exe
|
C:\Windows\SysWOW64\riched20\dllhost.exe
|
||
C:\Windows\SysWOW64\KBDMLT47\apds.exe
|
C:\Windows\SysWOW64\KBDMLT47\apds.exe
|
||
C:\Windows\SysWOW64\api-ms-win-core-namedpipe-l1-1-0\upnp.exe
|
C:\Windows\SysWOW64\api-ms-win-core-namedpipe-l1-1-0\upnp.exe
|
||
C:\Windows\SysWOW64\osk\rasadhlp.exe
|
C:\Windows\SysWOW64\osk\rasadhlp.exe
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k WerSvcGroup
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://188.226.165.170:8080/U7j2Ca9v8QUvcqf/fA93hWSHl2n7EAFUn8S/
|
188.226.165.170
|
||
http://91.121.87.90:8080/bLyKQv7N53vEg8HnqG/AS5OEx79Hso/vmXj5PDqWcWGmmH57b/xq6PHaeNWW7/NgA8M5zv6E4oe8nfV/
|
91.121.87.90
|
||
http://www.%s.comPA
|
unknown
|
||
https://pornthash.mobi/videos/tayna_tung
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
https://pornthash.mobi/videos/tayna_tung%temp%/tmp_e473b4.exex
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
104.131.144.215
|
unknown
|
United States
|
unknown
|
||
177.130.51.198
|
unknown
|
Brazil
|
unknown
|
||
91.121.87.90
|
unknown
|
France
|
unknown
|
||
188.226.165.170
|
unknown
|
European Union
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
`w2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
9x2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ry2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EBEFB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F3237
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 21
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 21
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FF0F4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 21
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 22
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 21
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 22
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FF42E
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F3237
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FF0F4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\SysWOW64\osk\rasadhlp.exe
|
SavedLegacySettings
|
There are 408 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7A1000
|
unkown
|
page execute read
|
||
534000
|
heap default
|
page read and write
|
||
358000
|
unkown
|
page read and write
|
||
5E6000
|
heap default
|
page read and write
|
||
536000
|
heap default
|
page read and write
|
||
2C1000
|
unkown
|
page execute read
|
||
356000
|
heap default
|
page read and write
|
||
3E1000
|
unkown
|
page execute read
|
||
481000
|
unkown
|
page execute read
|
||
906000
|
heap default
|
page read and write
|
||
908000
|
unkown
|
page read and write
|
||
311000
|
unkown
|
page execute read
|
||
2A1000
|
unkown
|
page execute read
|
||
578000
|
unkown
|
page read and write
|
||
3E1000
|
unkown
|
page execute read
|
||
538000
|
unkown
|
page read and write
|
||
5D6000
|
heap default
|
page read and write
|
||
648000
|
unkown
|
page read and write
|
||
321000
|
unkown
|
page execute read
|
||
538000
|
unkown
|
page read and write
|
||
338000
|
unkown
|
page read and write
|
||
2F4000
|
heap default
|
page read and write
|
||
4F4000
|
heap default
|
page read and write
|
||
5E8000
|
unkown
|
page read and write
|
||
608000
|
unkown
|
page read and write
|
||
646000
|
heap default
|
page read and write
|
||
5C4000
|
heap default
|
page read and write
|
||
3D1000
|
unkown
|
page execute read
|
||
2A1000
|
unkown
|
page execute read
|
||
5D8000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
307E000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
362F000
|
stack
|
page read and write
|
||
1E10000
|
heap private
|
page read and write
|
||
567000
|
heap default
|
page read and write
|
||
25B9000
|
heap private
|
page read and write
|
||
6A6000
|
heap private
|
page read and write
|
||
5C9000
|
unkown
|
page read and write
|
||
2FD0000
|
unkown
|
page readonly
|
||
24F0000
|
unkown
|
page readonly
|
||
276C000
|
unkown
|
page read and write
|
||
32D000
|
unkown
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
24D0000
|
unkown
|
page readonly
|
||
2E0000
|
unkown
|
page write copy
|
||
130000
|
heap default
|
page read and write
|
||
358E000
|
unkown
|
page read and write
|
||
8C4000
|
heap default
|
page read and write
|
||
2E32000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
2ECF000
|
unkown
|
page read and write
|
||
5EF000
|
unkown
|
page read and write
|
||
8A7000
|
heap default
|
page read and write
|
||
18F000
|
unkown
|
page read and write
|
||
354E000
|
unkown
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
35FF000
|
stack
|
page read and write
|
||
4F4000
|
heap default
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
BC000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
5F8000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
3DD000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
400000
|
unkown image
|
page readonly
|
||
32AE000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page readonly
|
||
3795000
|
unkown
|
page read and write
|
||
42A000
|
unkown image
|
page read and write
|
||
2E72000
|
unkown
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
6A0000
|
unkown
|
page readonly
|
||
1FF4000
|
heap private
|
page read and write
|
||
1D1E000
|
unkown
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
1DB0000
|
heap private
|
page read and write
|
||
220000
|
unkown
|
page execute read
|
||
347000
|
heap default
|
page read and write
|
||
28F0000
|
unkown
|
page readonly
|
||
2E10000
|
unkown
|
page read and write
|
||
34F000
|
heap default
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
604000
|
heap default
|
page read and write
|
||
3480000
|
unkown
|
page readonly
|
||
314000
|
heap private
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
27F000
|
stack
|
page read and write
|
||
1EC0000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
42D000
|
unkown image
|
page readonly
|
||
2400000
|
unkown
|
page read and write
|
||
2E50000
|
unkown
|
page read and write
|
||
200000
|
heap default
|
page read and write
|
||
2F0000
|
unkown
|
page write copy
|
||
2694000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
339000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
3E0000
|
unkown
|
page readonly
|
||
2EB9000
|
unkown
|
page read and write
|
||
20B0000
|
heap private
|
page read and write
|
||
280000
|
unkown
|
page readonly
|
||
8B000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
2967000
|
heap private
|
page read and write
|
||
32BF000
|
unkown
|
page read and write
|
||
2410000
|
unkown
|
page readonly
|
||
310000
|
heap private
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
3B0000
|
heap private
|
page read and write
|
||
2F80000
|
unkown
|
page readonly
|
||
21B0000
|
unkown
|
page readonly
|
||
3B0000
|
unkown
|
page execute read
|
||
24B2000
|
heap private
|
page read and write
|
||
3791000
|
unkown
|
page read and write
|
||
3781000
|
unkown
|
page read and write
|
||
2C0000
|
unkown
|
page readonly
|
||
3B0000
|
unkown
|
page write copy
|
||
20000
|
unkown
|
page readonly
|
||
2E45000
|
unkown
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
41D000
|
heap default
|
page read and write
|
||
2CFA000
|
unkown
|
page read and write
|
||
2E74000
|
unkown
|
page read and write
|
||
36F000
|
heap default
|
page read and write
|
||
2E50000
|
unkown
|
page read and write
|
||
2567000
|
heap private
|
page read and write
|
||
29BE000
|
unkown
|
page read and write
|
||
2DA0000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
2F0000
|
heap default
|
page read and write
|
||
2D23000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
1DE2000
|
heap private
|
page read and write
|
||
3C0000
|
heap private
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
400000
|
unkown image
|
page readonly
|
||
1E60000
|
unkown
|
page readonly
|
||
37CE000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
20D000
|
unkown
|
page read and write
|
||
676000
|
heap default
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
246000
|
unkown
|
page read and write
|
||
2290000
|
unkown
|
page readonly
|
||
2C4E000
|
stack
|
page read and write
|
||
2590000
|
unkown
|
page readonly
|
||
3580000
|
heap private
|
page read and write
|
||
220000
|
unkown
|
page execute read
|
||
2DC1000
|
unkown
|
page read and write
|
||
340000
|
unkown
|
page read and write
|
||
265C000
|
unkown
|
page read and write
|
||
28FC000
|
stack
|
page read and write
|
||
18A000
|
stack
|
page read and write
|
||
4010000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
401000
|
unkown image
|
page execute read
|
||
358F000
|
stack
|
page read and write
|
||
1E90000
|
unkown
|
page read and write
|
||
657000
|
heap default
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
1E40000
|
unkown
|
page readonly
|
||
559000
|
unkown
|
page read and write
|
||
2A90000
|
heap private
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
38BE000
|
unkown
|
page read and write
|
||
2B04000
|
unkown
|
page read and write
|
||
2ED8000
|
unkown
|
page read and write
|
||
2AC0000
|
unkown
|
page read and write
|
||
32B000
|
unkown
|
page read and write
|
||
27C2000
|
heap private
|
page read and write
|
||
2DA4000
|
unkown
|
page read and write
|
||
547000
|
unkown
|
page read and write
|
||
2130000
|
unkown
|
page readonly
|
||
2D03000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
377E000
|
unkown
|
page read and write
|
||
33BC000
|
unkown
|
page read and write
|
||
1E87000
|
unkown
|
page readonly
|
||
2AF000
|
unkown
|
page readonly
|
||
230000
|
heap private
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
2E83000
|
unkown
|
page read and write
|
||
4D7000
|
heap default
|
page read and write
|
||
2530000
|
unkown
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
3780000
|
unkown
|
page read and write
|
||
367000
|
heap default
|
page read and write
|
||
8C0000
|
heap private
|
page read and write
|
||
2415000
|
heap private
|
page read and write
|
||
8F8000
|
unkown
|
page read and write
|
||
1CA0000
|
unkown
|
page readonly
|
||
2A0000
|
unkown
|
page read and write
|
||
39C0000
|
unkown image
|
page readonly
|
||
3B10000
|
heap private
|
page read and write
|
||
34ED000
|
stack
|
page read and write
|
||
38B0000
|
unkown
|
page readonly
|
||
2D29000
|
unkown
|
page read and write
|
||
2949000
|
heap private
|
page read and write
|
||
170000
|
heap default
|
page read and write
|
||
317E000
|
unkown
|
page read and write
|
||
2310000
|
heap private
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
366F000
|
stack
|
page read and write
|
||
2140000
|
unkown
|
page readonly
|
||
2DD0000
|
heap private
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
8AF000
|
unkown
|
page read and write
|
||
313D000
|
unkown
|
page read and write
|
||
2734000
|
unkown
|
page read and write
|
||
2EA3000
|
unkown
|
page read and write
|
||
2F7000
|
heap default
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
2D6E000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
2AED000
|
unkown
|
page read and write
|
||
536000
|
heap private
|
page read and write
|
||
1FA0000
|
heap private
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
7E0000
|
heap private
|
page read and write
|
||
380E000
|
unkown
|
page read and write
|
||
2AEF000
|
unkown
|
page read and write
|
||
26FD000
|
unkown
|
page read and write
|
||
54F000
|
heap default
|
page read and write
|
||
2D0000
|
heap default
|
page read and write
|
||
7AF000
|
unkown
|
page readonly
|
||
2600000
|
unkown
|
page readonly
|
||
18A000
|
stack
|
page read and write
|
||
2494000
|
heap private
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
18A000
|
stack
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
42A000
|
unkown image
|
page read and write
|
||
6D8000
|
heap default
|
page read and write
|
||
2EFC000
|
unkown
|
page read and write
|
||
3920000
|
unkown
|
page write copy
|
||
2F0000
|
heap default
|
page read and write
|
||
213000
|
heap default
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
2EBF000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1CC7000
|
unkown
|
page readonly
|
||
3A60000
|
heap private
|
page read and write
|
||
917000
|
heap default
|
page read and write
|
||
61F000
|
heap default
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
520000
|
unkown
|
page readonly
|
||
1E0000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
2480000
|
unkown
|
page readonly
|
||
3950000
|
unkown
|
page write copy
|
||
42A000
|
unkown image
|
page read and write
|
||
51F000
|
unkown
|
page read and write
|
||
1D90000
|
unkown
|
page readonly
|
||
401000
|
unkown image
|
page execute read
|
||
2EB1000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page execute read
|
||
38E0000
|
unkown
|
page readonly
|
||
2D1E000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
354F000
|
stack
|
page read and write
|
||
2C0000
|
heap default
|
page read and write
|
||
530000
|
heap private
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
268D000
|
unkown
|
page read and write
|
||
290000
|
unkown
|
page execute and read and write
|
||
2E4000
|
heap private
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
28E0000
|
unkown
|
page readonly
|
||
280000
|
unkown
|
page read and write
|
||
4E0000
|
heap private
|
page read and write
|
||
38C0000
|
unkown
|
page readonly
|
||
352E000
|
unkown
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
27B0000
|
heap private
|
page read and write
|
||
2EE0000
|
unkown
|
page readonly
|
||
2ADD000
|
unkown
|
page read and write
|
||
3980000
|
unkown
|
page write copy
|
||
42A000
|
unkown image
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
4D0000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
5DB000
|
unkown
|
page read and write
|
||
38B0000
|
unkown
|
page readonly
|
||
426000
|
heap default
|
page read and write
|
||
1DA0000
|
unkown
|
page read and write
|
||
5E7000
|
heap default
|
page read and write
|
||
342000
|
heap private
|
page read and write
|
||
25A0000
|
unkown
|
page readonly
|
||
1DA0000
|
unkown
|
page readonly
|
||
917000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
350F000
|
stack
|
page read and write
|
||
26B0000
|
heap private
|
page read and write
|
||
517000
|
heap default
|
page read and write
|
||
2817000
|
heap private
|
page read and write
|
||
2900000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
3180000
|
heap private
|
page read and write
|
||
346D000
|
stack
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2D0000
|
heap default
|
page read and write
|
||
37BD000
|
unkown
|
page read and write
|
||
2AD000
|
unkown
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
18F000
|
unkown
|
page read and write
|
||
272F000
|
unkown
|
page read and write
|
||
2750000
|
heap private
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
2F7E000
|
stack
|
page read and write
|
||
2D80000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page readonly
|
||
2D40000
|
heap private
|
page read and write
|
||
379A000
|
unkown
|
page read and write
|
||
4F8000
|
heap default
|
page read and write
|
||
350000
|
heap private
|
page read and write
|
||
580000
|
heap default
|
page read and write
|
||
2569000
|
heap private
|
page read and write
|
||
2B0000
|
heap private
|
page read and write
|
||
2550000
|
unkown
|
page readonly
|
||
401000
|
unkown image
|
page execute read
|
||
3A0000
|
unkown
|
page readonly
|
||
27A4000
|
heap private
|
page read and write
|
||
55F000
|
unkown
|
page read and write
|
||
37AE000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
344D000
|
stack
|
page read and write
|
||
2D90000
|
unkown
|
page read and write
|
||
262E000
|
unkown
|
page read and write
|
||
289E000
|
unkown
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
2ECC000
|
unkown
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
290000
|
unkown
|
page read and write
|
||
7AD000
|
unkown
|
page read and write
|
||
2D70000
|
heap private
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
8A0000
|
heap default
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
2E17000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page execute read
|
||
1D30000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
5C8000
|
unkown
|
page read and write
|
||
1D57000
|
heap private
|
page read and write
|
||
BAF000
|
unkown
|
page read and write
|
||
1DA0000
|
unkown
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
360000
|
heap default
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
22FD000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
2620000
|
heap private
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
2D0E000
|
unkown
|
page read and write
|
||
1D40000
|
unkown
|
page read and write
|
||
2820000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2D72000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page readonly
|
||
487000
|
heap default
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
800000
|
unkown
|
page readonly
|
||
27A0000
|
unkown
|
page readonly
|
||
2A0000
|
unkown
|
page read and write
|
||
2E93000
|
unkown
|
page read and write
|
||
263C000
|
unkown
|
page read and write
|
||
8DB000
|
unkown
|
page read and write
|
||
3ED000
|
unkown
|
page read and write
|
||
50B000
|
unkown
|
page read and write
|
||
3940000
|
unkown
|
page write copy
|
||
401000
|
unkown image
|
page execute read
|
||
2E9B000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page readonly
|
||
37BE000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
2B0000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page readonly
|
||
2660000
|
heap private
|
page read and write
|
||
2640000
|
heap private
|
page read and write
|
||
530000
|
heap private
|
page read and write
|
||
2C0000
|
unkown
|
page execute and read and write
|
||
2570000
|
unkown
|
page readonly
|
||
1C60000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
920000
|
heap default
|
page read and write
|
||
39E0000
|
unkown image
|
page readonly
|
||
2D90000
|
heap private
|
page read and write
|
||
1FF0000
|
heap private
|
page read and write
|
||
2680000
|
heap private
|
page read and write
|
||
5F7000
|
unkown
|
page read and write
|
||
27A0000
|
heap private
|
page read and write
|
||
2C50000
|
unkown
|
page read and write
|
||
18F000
|
unkown
|
page read and write
|
||
268E000
|
unkown
|
page read and write
|
||
3B4000
|
heap private
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
20F0000
|
heap private
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
3980000
|
unkown
|
page write copy
|
||
300000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
2EB9000
|
unkown
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
42A000
|
unkown image
|
page read and write
|
||
2AFD000
|
stack
|
page read and write
|
||
2F90000
|
heap private
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
18A000
|
stack
|
page read and write
|
||
26F0000
|
unkown
|
page write copy
|
||
42D000
|
unkown image
|
page readonly
|
||
290000
|
unkown
|
page write copy
|
||
5D9000
|
unkown
|
page read and write
|
||
2EDD000
|
unkown
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
2D58000
|
unkown
|
page read and write
|
||
37AE000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
260000
|
heap default
|
page read and write
|
||
2410000
|
heap private
|
page read and write
|
||
2EA5000
|
unkown
|
page read and write
|
||
2BF0000
|
heap private
|
page read and write
|
||
31F000
|
unkown
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
260000
|
heap private
|
page read and write
|
||
320000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
568000
|
unkown
|
page read and write
|
||
26C0000
|
unkown
|
page read and write
|
||
49F000
|
unkown
|
page read and write
|
||
570000
|
heap default
|
page read and write
|
||
269E000
|
unkown
|
page read and write
|
||
27F9000
|
heap private
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
2E38000
|
unkown
|
page read and write
|
||
366E000
|
unkown
|
page read and write
|
||
349000
|
unkown
|
page read and write
|
||
290000
|
unkown
|
page execute and read and write
|
||
2EDE000
|
stack
|
page read and write
|
||
547000
|
heap default
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
DC000
|
unkown
|
page read and write
|
||
18F000
|
unkown
|
page read and write
|
||
1D90000
|
unkown
|
page readonly
|
||
38B0000
|
unkown
|
page readonly
|
||
3920000
|
unkown
|
page write copy
|
||
39A0000
|
unkown image
|
page readonly
|
||
54F000
|
heap default
|
page read and write
|
||
4E0000
|
unkown
|
page readonly
|
||
1EB0000
|
heap private
|
page read and write
|
||
39C0000
|
unkown image
|
page readonly
|
||
27000
|
heap private
|
page read and write
|
||
18A000
|
stack
|
page read and write
|
||
2540000
|
heap private
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
18B000
|
unkown
|
page read and write
|
||
630000
|
heap private
|
page read and write
|
||
276000
|
heap private
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
2220000
|
unkown
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
2E4E000
|
stack
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
279F000
|
stack
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
240000
|
heap private
|
page read and write
|
||
1DA0000
|
heap private
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
50F000
|
unkown
|
page read and write
|
||
2670000
|
heap private
|
page read and write
|
||
2624000
|
heap private
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
26C0000
|
unkown
|
page readonly
|
||
519000
|
unkown
|
page read and write
|
||
26B0000
|
heap private
|
page read and write
|
||
2580000
|
unkown
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
234000
|
heap private
|
page read and write
|
||
5EF000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
2F20000
|
unkown
|
page read and write
|
||
251F000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
1D30000
|
heap private
|
page read and write
|
||
510000
|
unkown
|
page readonly
|
||
2DD7000
|
unkown
|
page read and write
|
||
37F7000
|
unkown
|
page read and write
|
||
42A000
|
unkown image
|
page read and write
|
||
308A000
|
heap private
|
page read and write
|
||
3960000
|
unkown
|
page write copy
|
||
319000
|
unkown
|
page read and write
|
||
25F0000
|
heap private
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
38F0000
|
unkown
|
page readonly
|
||
220000
|
unkown
|
page execute read
|
||
2CD000
|
unkown
|
page read and write
|
||
547000
|
unkown
|
page read and write
|
||
31D000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
2320000
|
unkown
|
page readonly
|
||
2770000
|
heap private
|
page read and write
|
||
26C7000
|
heap private
|
page read and write
|
||
2D00000
|
unkown
|
page read and write
|
||
519000
|
unkown
|
page read and write
|
||
2C30000
|
unkown
|
page read and write
|
||
3150000
|
unkown
|
page readonly
|
||
48D000
|
unkown
|
page read and write
|
||
2EAC000
|
unkown
|
page read and write
|
||
3799000
|
unkown
|
page read and write
|
||
3910000
|
unkown
|
page readonly
|
||
2FFE000
|
unkown
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
1E20000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
328000
|
unkown
|
page read and write
|
||
50B000
|
unkown
|
page read and write
|
||
34FE000
|
unkown
|
page read and write
|
||
39CD000
|
unkown
|
page read and write
|
||
2EDF000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
2E90000
|
unkown
|
page read and write
|
||
43E000
|
stack
|
page read and write
|
||
2F90000
|
unkown
|
page readonly
|
||
230000
|
unkown
|
page execute read
|
||
6E0000
|
unkown
|
page readonly
|
||
33BF000
|
unkown
|
page read and write
|
||
2D7000
|
heap default
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
650000
|
unkown
|
page readonly
|
||
2E65000
|
unkown
|
page read and write
|
||
2580000
|
unkown
|
page readonly
|
||
54B000
|
unkown
|
page read and write
|
||
26E0000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page readonly
|
||
3E0000
|
unkown
|
page read and write
|
||
25B0000
|
heap private
|
page read and write
|
||
2EB8000
|
unkown
|
page read and write
|
||
25FE000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page execute and read and write
|
||
5BB000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
377E000
|
unkown
|
page read and write
|
||
30B000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
36CE000
|
unkown
|
page read and write
|
||
261C000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
38CF000
|
stack
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
53A000
|
heap default
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
29D1000
|
heap private
|
page read and write
|
||
2DE0000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
2E40000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
460000
|
unkown
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
270000
|
heap private
|
page read and write
|
||
2C80000
|
unkown
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
42A000
|
unkown image
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page readonly
|
||
330000
|
heap default
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
2D6C000
|
unkown
|
page read and write
|
||
657000
|
unkown
|
page read and write
|
||
254D000
|
unkown
|
page read and write
|
||
2560000
|
unkown
|
page read and write
|
||
252C000
|
unkown
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
1DC0000
|
heap private
|
page read and write
|
||
2570000
|
unkown
|
page read and write
|
||
2850000
|
heap private
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
282E000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
3D6000
|
unkown
|
page read and write
|
||
27E0000
|
heap private
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
790000
|
unkown
|
page readonly
|
||
284C000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
2D7B000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2D74000
|
unkown
|
page read and write
|
||
320000
|
heap private
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
2D5E000
|
unkown
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
550000
|
heap private
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
18F000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
264D000
|
unkown
|
page read and write
|
||
1D80000
|
unkown
|
page readonly
|
||
3920000
|
unkown
|
page write copy
|
||
21C0000
|
unkown
|
page readonly
|
||
1B0000
|
unkown
|
page execute read
|
||
2F0000
|
unkown
|
page read and write
|
||
15B000
|
unkown
|
page read and write
|
||
25DE000
|
unkown
|
page read and write
|
||
594000
|
heap default
|
page read and write
|
||
2587000
|
heap private
|
page read and write
|
||
1AE000
|
heap default
|
page read and write
|
||
177000
|
heap default
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
230000
|
heap private
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
257E000
|
unkown
|
page read and write
|
||
39BD000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
580000
|
unkown
|
page readonly
|
||
930000
|
unkown
|
page readonly
|
||
2DAC000
|
unkown
|
page read and write
|
||
2B0000
|
heap private
|
page read and write
|
||
2DD0000
|
unkown
|
page read and write
|
||
314000
|
heap default
|
page read and write
|
||
1CC0000
|
heap private
|
page read and write
|
||
285F000
|
stack
|
page read and write
|
||
2490000
|
unkown
|
page readonly
|
||
18F000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
261E000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
1F0000
|
unkown
|
page write copy
|
||
270000
|
unkown
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
266E000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
25B0000
|
heap private
|
page read and write
|
||
2E86000
|
unkown
|
page read and write
|
||
2FA0000
|
unkown
|
page readonly
|
||
2DDE000
|
unkown
|
page read and write
|
||
2670000
|
unkown
|
page read and write
|
||
1EC6000
|
unkown
|
page read and write
|
||
2EB8000
|
unkown
|
page read and write
|
||
629000
|
unkown
|
page read and write
|
||
3E0000
|
heap private
|
page read and write
|
||
2EB1000
|
unkown
|
page read and write
|
||
2B9000
|
heap private
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
42A000
|
unkown image
|
page read and write
|
||
3E0000
|
heap default
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
2FBE000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1D39000
|
heap private
|
page read and write
|
||
257D000
|
unkown
|
page read and write
|
||
26CC000
|
unkown
|
page read and write
|
||
536000
|
heap private
|
page read and write
|
||
2BFE000
|
unkown
|
page read and write
|
||
320000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page write copy
|
||
400000
|
unkown image
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
270E000
|
unkown
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
2720000
|
heap private
|
page read and write
|
||
1F0000
|
unkown
|
page write copy
|
||
540000
|
unkown
|
page readonly
|
||
2E96000
|
unkown
|
page read and write
|
||
577000
|
heap default
|
page read and write
|
||
26CD000
|
unkown
|
page read and write
|
||
2E86000
|
unkown
|
page read and write
|
||
27F0000
|
heap private
|
page read and write
|
||
860000
|
unkown
|
page readonly
|
||
21A0000
|
unkown
|
page readonly
|
||
260E000
|
unkown
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
3C6000
|
heap default
|
page read and write
|
||
7A0000
|
heap private
|
page read and write
|
||
363E000
|
unkown
|
page read and write
|
||
252000
|
heap private
|
page read and write
|
||
3A0000
|
heap private
|
page read and write
|
||
2549000
|
heap private
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
376F000
|
stack
|
page read and write
|
||
61B000
|
unkown
|
page read and write
|
||
2A6000
|
unkown
|
page read and write
|
||
210000
|
heap default
|
page read and write
|
||
300000
|
unkown
|
page execute and read and write
|
||
26A9000
|
heap private
|
page read and write
|
||
3C6000
|
heap private
|
page read and write
|
||
18A000
|
stack
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
2940000
|
heap private
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
18A000
|
stack
|
page read and write
|
||
1DD2000
|
heap private
|
page read and write
|
||
34BF000
|
unkown
|
page read and write
|
||
2000000
|
unkown
|
page readonly
|
||
33EC000
|
unkown
|
page read and write
|
||
48F000
|
unkown
|
page readonly
|
||
2F00000
|
unkown
|
page readonly
|
||
1B0000
|
unkown
|
page readonly
|
||
1B0000
|
unkown
|
page readonly
|
||
2EAE000
|
unkown
|
page read and write
|
||
18F000
|
unkown
|
page read and write
|
||
2610000
|
heap private
|
page read and write
|
||
587000
|
unkown
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
7A6000
|
heap private
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
220000
|
heap default
|
page read and write
|
||
350000
|
unkown
|
page read and write
|
||
342000
|
heap private
|
page read and write
|
||
3F0000
|
heap private
|
page read and write
|
||
2ED5000
|
unkown
|
page read and write
|
||
4CF000
|
unkown
|
page read and write
|
||
368E000
|
unkown
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
422000
|
unkown image
|
page execute and read and write
|
||
400000
|
unkown image
|
page readonly
|
||
2DA2000
|
unkown
|
page read and write
|
||
303F000
|
unkown
|
page read and write
|
||
324000
|
heap private
|
page read and write
|
||
510000
|
heap default
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
1AE0000
|
unkown
|
page readonly
|
||
423000
|
unkown image
|
page execute read
|
||
700000
|
unkown
|
page readonly
|
||
368F000
|
stack
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
366E000
|
unkown
|
page read and write
|
||
2E5A000
|
unkown
|
page read and write
|
||
3DF000
|
unkown
|
page readonly
|
||
18F000
|
unkown
|
page read and write
|
||
2B60000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page read and write
|
||
390000
|
heap private
|
page read and write
|
||
29C0000
|
heap private
|
page read and write
|
||
2E83000
|
unkown
|
page read and write
|
||
2C60000
|
unkown
|
page readonly
|
||
2BB000
|
stack
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2490000
|
heap private
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
1DB4000
|
heap private
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
38BE000
|
unkown
|
page read and write
|
||
3980000
|
unkown image
|
page readonly
|
||
2E22000
|
unkown
|
page read and write
|
||
230000
|
heap private
|
page read and write
|
||
2E50000
|
unkown
|
page read and write
|
||
8E9000
|
unkown
|
page read and write
|
||
227F000
|
stack
|
page read and write
|
||
2F60000
|
unkown
|
page readonly
|
||
42D000
|
unkown image
|
page readonly
|
||
3792000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page write copy
|
||
5A7000
|
heap default
|
page read and write
|
||
1D90000
|
unkown
|
page read and write
|
||
327E000
|
unkown
|
page read and write
|
||
2E34000
|
unkown
|
page read and write
|
||
324000
|
heap private
|
page read and write
|
||
547000
|
heap default
|
page read and write
|
||
2E3E000
|
unkown
|
page read and write
|
||
4D7000
|
heap default
|
page read and write
|
||
39B0000
|
unkown
|
page read and write
|
||
1DB0000
|
unkown
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
190000
|
heap private
|
page read and write
|
||
26A0000
|
heap private
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
1D0000
|
unkown
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
367000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
1E0000
|
unkown
|
page read and write
|
||
2CBF000
|
unkown
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
290000
|
unkown
|
page read and write
|
||
244B000
|
heap private
|
page read and write
|
||
3980000
|
unkown image
|
page readonly
|
||
480000
|
unkown
|
page read and write
|
||
3EF000
|
unkown
|
page readonly
|
||
4A4000
|
heap default
|
page read and write
|
||
2E74000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page execute and read and write
|
||
401000
|
unkown image
|
page execute read
|
||
5E7000
|
heap default
|
page read and write
|
||
4B7000
|
heap default
|
page read and write
|
||
2E47000
|
unkown
|
page read and write
|
||
3ED000
|
unkown
|
page read and write
|
||
4E9000
|
heap private
|
page read and write
|
||
38D0000
|
unkown
|
page readonly
|
||
1D20000
|
unkown
|
page readonly
|
||
6C0000
|
unkown
|
page readonly
|
||
520000
|
unkown
|
page readonly
|
||
2D69000
|
unkown
|
page read and write
|
||
5A4000
|
heap default
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
2E92000
|
unkown
|
page read and write
|
||
270D000
|
unkown
|
page read and write
|
||
5F7000
|
heap default
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
2ED1000
|
unkown
|
page read and write
|
||
2630000
|
unkown
|
page read and write
|
||
379B000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page execute and read and write
|
||
820000
|
unkown
|
page readonly
|
||
820000
|
unkown
|
page read and write
|
||
2A00000
|
unkown image
|
page readonly
|
||
2EB0000
|
unkown
|
page read and write
|
||
2EB6000
|
unkown
|
page read and write
|
||
6A0000
|
heap private
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
2EA9000
|
unkown
|
page read and write
|
||
2BD0000
|
unkown
|
page readonly
|
||
422000
|
unkown image
|
page execute and read and write
|
||
2E2C000
|
unkown
|
page read and write
|
||
340E000
|
unkown
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
1E50000
|
unkown
|
page readonly
|
||
4BD000
|
heap default
|
page read and write
|
||
2D3D000
|
unkown
|
page read and write
|
||
2CBE000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
401000
|
unkown image
|
page execute read
|
||
460000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
347000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
2E4A000
|
unkown
|
page read and write
|
||
34BD000
|
stack
|
page read and write
|
||
620000
|
unkown
|
page execute and read and write
|
||
2260000
|
unkown
|
page readonly
|
||
2617000
|
heap private
|
page read and write
|
||
2AFF000
|
unkown
|
page read and write
|
||
2130000
|
unkown
|
page readonly
|
||
65F000
|
heap default
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
26BC000
|
unkown
|
page read and write
|
||
39FE000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
2EA4000
|
unkown
|
page read and write
|
||
21E000
|
unkown
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
1D70000
|
unkown
|
page readonly
|
||
26F0000
|
unkown
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
2A6D000
|
unkown
|
page read and write
|
||
220000
|
heap default
|
page read and write
|
||
2EA1000
|
unkown
|
page read and write
|
||
2642000
|
heap private
|
page read and write
|
||
2A50000
|
unkown
|
page read and write
|
||
2560000
|
heap private
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
2B7D000
|
unkown
|
page read and write
|
||
37AE000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
5B9000
|
unkown
|
page read and write
|
||
1DC4000
|
heap private
|
page read and write
|
||
4D0000
|
heap default
|
page read and write
|
||
2CC0000
|
unkown
|
page read and write
|
||
3805000
|
unkown
|
page read and write
|
||
2690000
|
heap private
|
page read and write
|
||
2E50000
|
unkown
|
page readonly
|
||
363E000
|
stack
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
38B0000
|
unkown
|
page readonly
|
||
507000
|
heap private
|
page read and write
|
||
2D03000
|
unkown
|
page read and write
|
||
303000
|
heap default
|
page read and write
|
||
42A000
|
unkown image
|
page read and write
|
||
1B0000
|
unkown
|
page execute read
|
||
422000
|
unkown image
|
page execute and read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
137000
|
heap default
|
page read and write
|
||
42A000
|
unkown image
|
page read and write
|
||
42D000
|
heap default
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
314D000
|
stack
|
page read and write
|
||
2A00000
|
unkown image
|
page readonly
|
||
1BC0000
|
unkown
|
page readonly
|
||
60000
|
unkown
|
page readonly
|
||
556000
|
heap private
|
page read and write
|
||
70930000
|
unkown image
|
page readonly
|
||
230000
|
unkown
|
page readonly
|
||
250000
|
unkown
|
page read and write
|
||
2490000
|
unkown
|
page readonly
|
||
250000
|
unkown
|
page readonly
|
||
281E000
|
unkown
|
page read and write
|
||
39E0000
|
unkown image
|
page readonly
|
||
4B0000
|
unkown
|
page readonly
|
||
110000
|
unkown
|
page write copy
|
||
310000
|
unkown
|
page read and write
|
||
289F000
|
stack
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
18F000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
32F000
|
unkown
|
page readonly
|
||
79E000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
3C0000
|
heap private
|
page read and write
|
||
3910000
|
unkown
|
page readonly
|
||
422000
|
unkown image
|
page execute and read and write
|
||
2DE8000
|
unkown
|
page read and write
|
||
2AD000
|
unkown
|
page read and write
|
||
1E80000
|
heap private
|
page read and write
|
||
33C0000
|
unkown
|
page write copy
|
||
2E0000
|
heap private
|
page read and write
|
||
34ED000
|
stack
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
2A0000
|
unkown
|
page execute read
|
||
2D0000
|
heap private
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
2584000
|
heap private
|
page read and write
|
||
638000
|
unkown
|
page read and write
|
||
252F000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
4D0000
|
unkown
|
page readonly
|
||
394000
|
heap private
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
2EB9000
|
unkown
|
page read and write
|
||
27C0000
|
unkown
|
page readonly
|
||
5D0000
|
unkown
|
page readonly
|
||
58F000
|
heap default
|
page read and write
|
||
528000
|
unkown
|
page read and write
|
||
268E000
|
unkown
|
page read and write
|
||
25C0000
|
unkown
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
2BBE000
|
stack
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
5E7000
|
unkown
|
page read and write
|
||
39A0000
|
unkown image
|
page readonly
|
||
2E39000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
2B1000
|
stack
|
page read and write
|
||
1E70000
|
heap private
|
page read and write
|
||
3980000
|
unkown image
|
page readonly
|
||
3E7000
|
heap default
|
page read and write
|
||
2D7000
|
heap private
|
page read and write
|
||
2E80000
|
unkown
|
page readonly
|
||
2D2F000
|
stack
|
page read and write
|
||
7A0000
|
unkown
|
page read and write
|
||
2D80000
|
heap private
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
16E000
|
heap default
|
page read and write
|
||
2710000
|
unkown
|
page readonly
|
||
2E52000
|
unkown
|
page read and write
|
||
1E3E000
|
unkown
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
2ECA000
|
unkown
|
page read and write
|
||
2590000
|
unkown
|
page readonly
|
||
18A000
|
stack
|
page read and write
|
||
310000
|
unkown
|
page execute and read and write
|
||
680000
|
unkown
|
page readonly
|
||
25D7000
|
heap private
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
617000
|
unkown
|
page read and write
|
||
28DE000
|
unkown
|
page read and write
|
||
2E83000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
587000
|
heap default
|
page read and write
|
||
2AD0000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
220000
|
unkown
|
page readonly
|
||
2A0000
|
unkown
|
page write copy
|
||
2E74000
|
unkown
|
page read and write
|
||
5AB000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
3080000
|
heap private
|
page read and write
|
||
587000
|
heap default
|
page read and write
|
||
521000
|
heap default
|
page read and write
|
||
2D60000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
5E9000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page readonly
|
||
1DC0000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
352E000
|
unkown
|
page read and write
|
||
5A0000
|
heap default
|
page read and write
|
||
31D000
|
stack
|
page read and write
|
||
2F25000
|
unkown
|
page read and write
|
||
264C000
|
unkown
|
page read and write
|
||
2EF000
|
unkown
|
page read and write
|
||
2E88000
|
unkown
|
page read and write
|
||
640000
|
heap default
|
page read and write
|
||
22C0000
|
unkown
|
page readonly
|
||
348D000
|
stack
|
page read and write
|
||
2910000
|
unkown
|
page readonly
|
||
3880000
|
unkown
|
page readonly
|
||
3EF000
|
unkown
|
page readonly
|
||
18A000
|
stack
|
page read and write
|
||
25A2000
|
heap private
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
296E000
|
unkown
|
page read and write
|
||
3A0000
|
heap private
|
page read and write
|
||
2190000
|
unkown
|
page readonly
|
||
2C0000
|
unkown
|
page read and write
|
||
480000
|
heap default
|
page read and write
|
||
3F6000
|
heap private
|
page read and write
|
||
2CF000
|
unkown
|
page readonly
|
||
2C0000
|
heap private
|
page read and write
|
||
2E0000
|
unkown
|
page read and write
|
||
26B2000
|
heap private
|
page read and write
|
||
529000
|
unkown
|
page read and write
|
||
380E000
|
unkown
|
page read and write
|
||
2AF000
|
unkown
|
page readonly
|
||
422000
|
unkown image
|
page execute and read and write
|
||
3E0000
|
unkown
|
page write copy
|
||
2580000
|
heap private
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
8C6000
|
heap private
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
18F000
|
unkown
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
2CDF000
|
stack
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
2BE0000
|
unkown
|
page readonly
|
||
5E0000
|
heap default
|
page read and write
|
||
617000
|
heap default
|
page read and write
|
||
302000
|
heap private
|
page read and write
|
||
380000
|
unkown
|
page readonly
|
||
2B0000
|
unkown
|
page execute and read and write
|
||
271F000
|
unkown
|
page read and write
|
||
33CD000
|
stack
|
page read and write
|
||
B0F000
|
unkown
|
page read and write
|
||
1E80000
|
unkown
|
page readonly
|
||
1E90000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page readonly
|
||
320000
|
heap private
|
page read and write
|
||
668000
|
heap default
|
page read and write
|
||
22BF000
|
stack
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
3C20000
|
unkown
|
page readonly
|
||
39F000
|
unkown
|
page read and write
|
||
5FF000
|
heap default
|
page read and write
|
||
380000
|
heap private
|
page read and write
|
||
347D000
|
stack
|
page read and write
|
||
1C40000
|
unkown
|
page read and write
|
||
A8F000
|
unkown
|
page read and write
|
||
34FC000
|
unkown
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
36CE000
|
unkown
|
page read and write
|
||
25F9000
|
heap private
|
page read and write
|
There are 1057 hidden memdumps, click here to show them.