Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Deadly Variants of Covid 19.doc
|
Rich Text Format data, unknown version
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\mgLD5CcdJx9YVKl[1].jpg
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
downloaded
|
||
C:\Users\user\AppData\Local\Temp\tmpA055.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\rLliXAh.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\Public\69577.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 59134 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\2Me6ei3[1].htm
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{8AD9C643-349E-46EF-BF24-C3A751787722}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9CA5B12C-492C-4E57-AE2D-0E7798ADDEF4}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{AB5F6AD7-3C7C-4823-93B4-8E22DB7DEE25}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Cab7021.tmp
|
Microsoft Cabinet archive data, 59134 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tar7022.tmp
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Deadly Variants of Covid 19.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15
2020, mtime=Wed Aug 26 14:08:15 2020, atime=Tue Feb 23 02:52:35 2021, length=833197, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\WBLPQVYT.txt
|
ASCII text
|
downloaded
|
||
C:\Users\user\Desktop\~$adly Variants of Covid 19.doc
|
data
|
dropped
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\Public\69577.exe
|
C:\Users\Public\69577.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rLliXAh' /XML 'C:\Users\user\AppData\Local\Temp\tmpA055.tmp'
|
||
C:\Users\Public\69577.exe
|
C:\Users\Public\69577.exe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://sgkmudder.org.tr/2d/mgLD5CcdJx9YVKl.jpg
|
93.89.224.134
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
http://bit.ly/2Me6ei3
|
67.199.248.10
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
http://servername/isapibackend.dll
|
unknown
|
||
https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
There are 5 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
greatestyear2021.ddns.net
|
79.134.225.49
|
||
bit.ly
|
67.199.248.10
|
||
sgkmudder.org.tr
|
93.89.224.134
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
79.134.225.49
|
unknown
|
Switzerland
|
unknown
|
||
93.89.224.134
|
unknown
|
Turkey
|
unknown
|
||
67.199.248.10
|
unknown
|
United States
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
`'7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
y(7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
a*7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EE0ED
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FA9C7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FA9C7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
SavedLegacySettings
|
||
C:\Users\Public\69577.exe
|
Blob
|
||
C:\Users\Public\69577.exe
|
Blob
|
||
C:\Users\Public\69577.exe
|
Blob
|
||
C:\Users\Public\69577.exe
|
Blob
|
||
C:\Users\Public\69577.exe
|
Blob
|
||
C:\Users\Public\69577.exe
|
Blob
|
There are 319 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
25C8000
|
unkown
|
page read and write
|
||
2481000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
5BAF000
|
unkown
|
page read and write
|
||
54CC000
|
stack
|
page read and write
|
||
640000
|
unkown
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
4DC0000
|
unkown
|
page readonly
|
||
4815000
|
unkown
|
page read and write
|
||
575E000
|
stack
|
page read and write
|
||
5A10000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
52A000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
2BA000
|
unkown
|
page read and write
|
||
CDF000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
5958000
|
unkown
|
page read and write
|
||
3B8000
|
heap private
|
page read and write
|
||
190000
|
unkown
|
page read and write
|
||
525000
|
unkown
|
page read and write
|
||
B3E000
|
unkown
|
page read and write | page guard
|
||
47F2000
|
unkown
|
page read and write
|
||
47CA000
|
unkown
|
page read and write
|
||
47F0000
|
unkown
|
page read and write
|
||
AF0000
|
heap private
|
page execute and read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
4780000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
47C6000
|
unkown
|
page read and write
|
||
4480000
|
unkown
|
page readonly
|
||
24F8000
|
unkown
|
page read and write
|
||
50A000
|
unkown
|
page read and write
|
||
B4000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
960000
|
heap private
|
page execute and read and write
|
||
52A000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
62BD000
|
unkown
|
page read and write
|
||
73CE000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
60BA000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
60B9000
|
unkown
|
page read and write
|
||
D6C000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
5945000
|
unkown
|
page read and write
|
||
F00000
|
unkown
|
page read and write
|
||
21B000
|
unkown
|
page execute and read and write
|
||
3B0000
|
heap private
|
page read and write
|
||
250A000
|
unkown
|
page read and write
|
||
47C000
|
heap default
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
6CAD000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
49A0000
|
unkown
|
page read and write
|
||
B45000
|
heap private
|
page read and write
|
||
777000
|
heap private
|
page read and write
|
||
56FE000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
329000
|
unkown
|
page read and write
|
||
5EDE000
|
stack
|
page read and write
|
||
DD0000
|
unkown
|
page read and write
|
||
4B0000
|
heap private
|
page execute and read and write
|
||
670000
|
unkown
|
page read and write
|
||
647D000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
5D6E000
|
unkown
|
page read and write | page guard
|
||
5A0000
|
heap private
|
page execute and read and write
|
||
6118000
|
unkown
|
page read and write
|
||
59AE000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
5963000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page execute and read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
95E000
|
unkown
|
page read and write
|
||
1A4000
|
unkown
|
page read and write
|
||
47F0000
|
unkown
|
page read and write
|
||
51A000
|
unkown
|
page read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
31B000
|
unkown
|
page execute and read and write
|
||
4815000
|
unkown
|
page read and write
|
||
660000
|
heap private
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
24EA000
|
unkown
|
page read and write
|
||
51B000
|
unkown
|
page read and write
|
||
1A3000
|
unkown
|
page execute and read and write
|
||
BD0000
|
unkown
|
page read and write
|
||
B8E000
|
unkown
|
page read and write
|
||
47F3000
|
unkown
|
page read and write
|
||
24EE000
|
unkown
|
page read and write
|
||
580000
|
unkown
|
page read and write
|
||
52A000
|
unkown
|
page read and write
|
||
594E000
|
unkown
|
page read and write | page guard
|
||
A70000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
430000
|
heap default
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
6095000
|
unkown
|
page read and write
|
||
483E000
|
unkown
|
page read and write
|
||
4812000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
F60000
|
unkown image
|
page readonly
|
||
6070000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
5920000
|
unkown
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
302000
|
unkown
|
page read and write
|
||
312000
|
unkown
|
page read and write
|
||
24CC000
|
unkown
|
page read and write
|
||
4C90000
|
heap private
|
page execute and read and write
|
||
2518000
|
unkown
|
page read and write
|
||
4A10000
|
heap private
|
page read and write
|
||
580000
|
unkown
|
page read and write
|
||
454000
|
heap default
|
page read and write
|
||
5480000
|
unkown
|
page write copy
|
||
BCC000
|
unkown
|
page read and write
|
||
607C000
|
unkown
|
page read and write
|
||
D20000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
24CA000
|
unkown
|
page read and write
|
||
51B000
|
unkown
|
page read and write
|
||
5640000
|
heap private
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
F60000
|
unkown image
|
page readonly
|
||
4815000
|
unkown
|
page read and write
|
||
910000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
47E7000
|
unkown
|
page read and write
|
||
52A000
|
unkown
|
page read and write
|
||
5AEE000
|
unkown
|
page read and write
|
||
1AD000
|
unkown
|
page execute and read and write
|
||
10C000
|
unkown
|
page read and write
|
||
5F2D000
|
unkown
|
page read and write
|
||
5B0000
|
heap private
|
page read and write
|
||
4821000
|
unkown
|
page read and write
|
||
5A10000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
B62000
|
heap private
|
page read and write
|
||
49FE000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
5EE0000
|
unkown
|
page readonly
|
||
501000
|
heap default
|
page read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
4A14000
|
heap private
|
page read and write
|
||
607C000
|
unkown
|
page read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
640000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
49B0000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
6B0000
|
unkown
|
page readonly
|
||
527000
|
unkown
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
24F0000
|
unkown
|
page read and write
|
||
705E000
|
stack
|
page read and write
|
||
24FA000
|
unkown
|
page read and write
|
||
2F3000
|
unkown
|
page read and write
|
||
230000
|
heap default
|
page read and write
|
||
580000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
4BAE000
|
unkown
|
page read and write
|
||
DDF000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
24E0000
|
unkown
|
page read and write
|
||
51C000
|
unkown
|
page read and write
|
||
580000
|
unkown
|
page read and write
|
||
594F000
|
unkown
|
page read and write
|
||
F62000
|
unkown image
|
page execute read
|
||
47E7000
|
unkown
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
3481000
|
unkown
|
page read and write
|
||
4A9000
|
unkown
|
page read and write
|
||
480000
|
unkown
|
page readonly
|
||
55EF000
|
stack
|
page read and write
|
||
640000
|
unkown
|
page read and write
|
||
3487000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
F60000
|
unkown image
|
page readonly
|
||
606F000
|
unkown
|
page read and write
|
||
680000
|
unkown
|
page read and write
|
||
5945000
|
unkown
|
page read and write
|
||
F60000
|
unkown image
|
page readonly
|
||
47E7000
|
unkown
|
page read and write
|
||
DBD000
|
unkown
|
page read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
214000
|
heap default
|
page read and write
|
||
457000
|
stack
|
page read and write
|
||
4A9000
|
unkown
|
page read and write
|
||
BD000
|
unkown
|
page execute and read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
680000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
64EE000
|
unkown
|
page read and write
|
||
1076000
|
unkown image
|
page readonly
|
||
5BB0000
|
unkown
|
page readonly
|
||
760000
|
unkown
|
page readonly
|
||
EFE000
|
stack
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
52A000
|
unkown
|
page read and write
|
||
4DB0000
|
heap private
|
page read and write
|
||
4890000
|
unkown
|
page readonly
|
||
1080000
|
unkown
|
page readonly
|
||
690E000
|
unkown
|
page read and write
|
||
4C7E000
|
unkown
|
page read and write
|
||
524E000
|
unkown
|
page read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
583E000
|
unkown
|
page read and write
|
||
770000
|
heap private
|
page read and write
|
||
5959000
|
unkown
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
5370000
|
heap private
|
page read and write
|
||
2E4000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
594B000
|
unkown
|
page read and write
|
||
470000
|
heap default
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
4C10000
|
heap private
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
350000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
24DA000
|
unkown
|
page read and write
|
||
353000
|
unkown
|
page read and write
|
||
4760000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
F62000
|
unkown image
|
page execute read
|
||
47E7000
|
unkown
|
page read and write
|
||
BD0000
|
unkown
|
page readonly
|
||
670000
|
unkown
|
page read and write
|
||
120000
|
heap default
|
page read and write
|
||
520E000
|
unkown
|
page read and write
|
||
1076000
|
unkown image
|
page readonly
|
||
52A000
|
unkown
|
page read and write
|
||
640000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
437000
|
heap default
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
F62000
|
unkown image
|
page execute read
|
||
52A000
|
unkown
|
page read and write
|
||
60EE000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
B40000
|
unkown
|
page read and write
|
||
212000
|
unkown
|
page read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
650000
|
unkown
|
page read and write
|
||
52AE000
|
unkown
|
page read and write
|
||
50A0000
|
unkown
|
page read and write
|
||
CDE000
|
unkown
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
1076000
|
unkown image
|
page readonly
|
||
5968000
|
unkown
|
page read and write
|
||
528000
|
unkown
|
page read and write
|
||
BD0000
|
unkown
|
page read and write
|
||
F62000
|
unkown image
|
page execute read
|
||
3A0000
|
unkown
|
page read and write
|
||
40E000
|
unkown
|
page execute and read and write
|
||
2516000
|
unkown
|
page read and write
|
||
1F7000
|
heap default
|
page read and write
|
||
C9000
|
unkown
|
page read and write
|
||
24CE000
|
unkown
|
page read and write
|
||
640000
|
unkown
|
page read and write
|
||
28D000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
5910000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
565E000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
488F000
|
stack
|
page read and write
|
||
5C1E000
|
stack
|
page read and write
|
||
6ACE000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
24FE000
|
unkown
|
page read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
5A10000
|
unkown
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
513000
|
heap default
|
page read and write
|
||
DFE000
|
unkown
|
page read and write
|
||
4A32000
|
heap private
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
1076000
|
unkown image
|
page readonly
|
||
460000
|
unkown
|
page execute and read and write
|
||
112000
|
unkown
|
page read and write
|
||
251E000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
4815000
|
unkown
|
page read and write
|
||
2E4000
|
unkown
|
page read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
24D8000
|
unkown
|
page read and write
|
||
24C6000
|
unkown
|
page read and write
|
||
52E1000
|
heap private
|
page read and write
|
||
4CCD000
|
unkown
|
page read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
63BE000
|
unkown
|
page read and write
|
||
6071000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page execute and read and write
|
||
4AF2000
|
heap private
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
9A8000
|
unkown
|
page read and write
|
||
2CD000
|
unkown
|
page read and write
|
||
591B000
|
unkown
|
page read and write
|
||
F3D000
|
unkown
|
page read and write
|
||
670000
|
unkown
|
page read and write
|
||
F60000
|
unkown image
|
page readonly
|
||
536E000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
||
2481000
|
unkown
|
page read and write
|
||
24B3000
|
unkown
|
page read and write
|
||
4750000
|
unkown
|
page read and write
|
||
E1E000
|
unkown
|
page read and write
|
||
4A3000
|
unkown
|
page read and write
|
||
570000
|
heap private
|
page read and write
|
||
4970000
|
unkown
|
page readonly
|
||
2520000
|
unkown
|
page read and write
|
||
563000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
2CD000
|
unkown
|
page read and write
|
||
4750000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
58FF000
|
unkown
|
page read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
11A000
|
unkown
|
page execute and read and write
|
||
F4C000
|
unkown
|
page read and write
|
||
594F000
|
unkown
|
page read and write
|
||
340000
|
heap private
|
page read and write
|
||
4AD0000
|
heap private
|
page read and write
|
||
24B6000
|
unkown
|
page read and write
|
||
527000
|
unkown
|
page read and write
|
||
B80000
|
unkown
|
page read and write
|
||
694000
|
unkown
|
page read and write
|
||
650000
|
unkown
|
page read and write
|
||
117000
|
unkown
|
page execute and read and write
|
||
580000
|
unkown
|
page read and write
|
||
666E000
|
unkown
|
page read and write
|
||
47C7000
|
unkown
|
page read and write
|
||
D20000
|
unkown
|
page read and write
|
||
539D000
|
unkown
|
page read and write
|
||
52A000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
80000
|
heap default
|
page read and write
|
||
52A000
|
unkown
|
page read and write
|
||
1EA000
|
unkown
|
page read and write
|
||
4AD5000
|
heap private
|
page read and write
|
||
51C000
|
unkown
|
page read and write
|
||
52A000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
30A000
|
unkown
|
page execute and read and write
|
||
6118000
|
unkown
|
page read and write
|
||
4850000
|
unkown
|
page readonly
|
||
47E7000
|
unkown
|
page read and write
|
||
670000
|
unkown
|
page read and write
|
||
F50000
|
unkown
|
page readonly
|
||
DE0000
|
unkown
|
page read and write
|
||
580000
|
unkown
|
page read and write
|
||
23D000
|
heap default
|
page read and write
|
||
525000
|
unkown
|
page read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
52A000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
2D1000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
B90000
|
unkown
|
page read and write
|
||
4A50000
|
unkown
|
page readonly
|
||
A0000
|
unkown
|
page read and write
|
||
4B6E000
|
unkown
|
page read and write
|
||
52A000
|
unkown
|
page read and write
|
||
317000
|
unkown
|
page execute and read and write
|
||
D70000
|
unkown
|
page read and write
|
||
5951000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
5340000
|
heap private
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
560E000
|
unkown
|
page read and write
|
||
2500000
|
unkown
|
page read and write
|
||
5D6F000
|
unkown
|
page read and write
|
||
2FD000
|
unkown
|
page execute and read and write
|
||
307000
|
unkown
|
page execute and read and write
|
||
2D1000
|
unkown
|
page read and write
|
||
679D000
|
unkown
|
page read and write
|
||
6D60000
|
unkown
|
page read and write
|
||
594B000
|
unkown
|
page read and write
|
||
3481000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
F60000
|
unkown image
|
page readonly
|
||
B30000
|
unkown
|
page read and write
|
||
4CB000
|
unkown
|
page read and write
|
||
B40000
|
heap private
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
680000
|
unkown
|
page read and write
|
||
47D3000
|
unkown
|
page read and write
|
||
4C8E000
|
unkown
|
page read and write
|
||
CDE000
|
unkown
|
page read and write | page guard
|
||
4CD0000
|
unkown
|
page readonly
|
||
500000
|
unkown
|
page read and write
|
||
3489000
|
unkown
|
page read and write
|
||
217000
|
unkown
|
page execute and read and write
|
||
670000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
595F000
|
unkown
|
page read and write
|
||
482C000
|
unkown
|
page read and write
|
||
51B000
|
unkown
|
page read and write
|
||
24DE000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
DC0000
|
unkown
|
page read and write
|
||
57D000
|
unkown
|
page read and write
|
||
52D0000
|
heap private
|
page read and write
|
||
426000
|
unkown
|
page read and write
|
||
B3F000
|
unkown
|
page read and write
|
||
62E000
|
unkown
|
page read and write
|
||
47F4000
|
unkown
|
page read and write
|
||
697D000
|
unkown
|
page read and write
|
||
519000
|
heap default
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
590E000
|
stack
|
page read and write
|
||
630000
|
unkown
|
page read and write
|
||
5966000
|
unkown
|
page read and write
|
||
4480000
|
unkown
|
page readonly
|
||
50BD000
|
unkown
|
page read and write
|
||
24DC000
|
unkown
|
page read and write
|
||
4A6000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
24B1000
|
unkown
|
page read and write
|
||
47F2000
|
unkown
|
page read and write
|
||
2508000
|
unkown
|
page read and write
|
||
B4A000
|
unkown
|
page read and write
|
||
2522000
|
unkown
|
page read and write
|
||
52A000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
DC9000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
F50000
|
unkown
|
page read and write
|
||
47F9000
|
unkown
|
page read and write
|
||
722E000
|
unkown
|
page read and write
|
||
C0000
|
unkown
|
page read and write
|
||
47E7000
|
unkown
|
page read and write
|
||
250C000
|
unkown
|
page read and write
|
||
24EC000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
6A0000
|
heap private
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
5380000
|
unkown
|
page read and write
|
||
47A000
|
heap default
|
page read and write
|
||
5920000
|
unkown
|
page read and write
|
||
4B6000
|
heap default
|
page read and write
|
||
B3000
|
unkown
|
page execute and read and write
|
||
DF0000
|
unkown
|
page read and write
|
||
482E000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
47F0000
|
unkown
|
page read and write
|
||
60B9000
|
unkown
|
page read and write
|
||
1F0000
|
heap default
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
||
6A9000
|
heap private
|
page read and write
|
||
52A000
|
unkown
|
page read and write
|
||
24B8000
|
unkown
|
page read and write
|
||
24C8000
|
unkown
|
page read and write
|
||
670000
|
unkown
|
page read and write
|
||
6118000
|
unkown
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
4CE0000
|
heap private
|
page execute and read and write
|
||
4751000
|
unkown
|
page read and write
|
||
4815000
|
unkown
|
page read and write
|
There are 510 hidden memdumps, click here to show them.