Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.doc
|
Rich Text Format data, unknown version
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\HOMqO[1].txt
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
downloaded
|
||
C:\Users\user\AppData\Local\Temp\tmpA738.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\Public\69577.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
modified
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 59134 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\3kijui1[1].htm
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7621A4C2-B642-4F8D-8632-93AA6D767CE8}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B5F6BABB-61BE-41BF-89DB-AF92964D1C77}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F060F5F7-4AFC-467A-BEBB-A714D3C0AD58}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Cab36BA.tmp
|
Microsoft Cabinet archive data, 59134 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tar36BB.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13
2020, mtime=Wed Aug 26 14:08:13 2020, atime=Wed Feb 24 19:53:30 2021, length=1380809, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\ZEL5A6R0.txt
|
ASCII text
|
downloaded
|
||
C:\Users\user\Desktop\~$L88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.doc
|
data
|
dropped
|
There are 11 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\Public\69577.exe
|
C:\Users\Public\69577.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmpA738.tmp'
|
||
C:\Users\Public\69577.exe
|
{path}
|
||
C:\Users\Public\69577.exe
|
{path}
|
||
C:\Users\Public\69577.exe
|
{path}
|
||
C:\Users\Public\69577.exe
|
{path}
|
||
C:\Users\Public\69577.exe
|
{path}
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://u.teknik.io/HOMqO.txt
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://bit.ly/3kijui1
|
67.199.248.11
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bit.ly
|
67.199.248.11
|
||
teknik.io
|
5.79.72.163
|
||
u.teknik.io
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
67.199.248.11
|
unknown
|
United States
|
unknown
|
||
5.79.72.163
|
unknown
|
Netherlands
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
y 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
6b7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
wg7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ED356
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FBEAE
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FBEAE
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
SavedLegacySettings
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Users\Public\69577.exe
|
FontCachePath
|
There are 320 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3259000
|
unkown
|
page read and write
|
||
6512000
|
unkown
|
page read and write
|
||
684E000
|
unkown
|
page read and write
|
||
6A5B000
|
unkown
|
page read and write
|
||
60A1000
|
unkown
|
page read and write
|
||
65F0000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
6797000
|
unkown
|
page read and write
|
||
308000
|
unkown
|
page read and write
|
||
147000
|
unkown
|
page execute and read and write
|
||
64FC000
|
unkown
|
page read and write
|
||
658A000
|
unkown
|
page read and write
|
||
6669000
|
unkown
|
page read and write
|
||
753B000
|
unkown
|
page read and write
|
||
65AB000
|
unkown
|
page read and write
|
||
ACC000
|
unkown
|
page read and write
|
||
510C000
|
heap private
|
page read and write
|
||
8ED000
|
unkown
|
page read and write
|
||
6808000
|
unkown
|
page read and write
|
||
7536000
|
unkown
|
page read and write
|
||
6395000
|
unkown
|
page read and write
|
||
663C000
|
unkown
|
page read and write
|
||
5AB0000
|
unkown
|
page read and write
|
||
6EE0000
|
unkown
|
page read and write
|
||
435D000
|
stack
|
page read and write
|
||
6630000
|
unkown
|
page read and write
|
||
6420000
|
unkown
|
page read and write
|
||
6349000
|
unkown
|
page read and write
|
||
6A50000
|
unkown
|
page read and write
|
||
69B000
|
unkown
|
page read and write
|
||
618E000
|
unkown
|
page read and write
|
||
7FBE000
|
stack
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
4C0000
|
unkown
|
page read and write
|
||
49E000
|
unkown image
|
page readonly
|
||
65D6000
|
unkown
|
page read and write
|
||
4910000
|
heap private
|
page read and write
|
||
67C5000
|
unkown
|
page read and write
|
||
636B000
|
unkown
|
page read and write
|
||
6A67000
|
unkown
|
page read and write
|
||
8D9000
|
unkown
|
page read and write
|
||
72E000
|
unkown
|
page read and write
|
||
727E000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
5D3E000
|
stack
|
page read and write
|
||
69E2000
|
unkown
|
page read and write
|
||
5F7E000
|
stack
|
page read and write
|
||
20A0000
|
unkown
|
page read and write
|
||
6675000
|
unkown
|
page read and write
|
||
27C6000
|
unkown
|
page read and write
|
||
50F0000
|
unkown
|
page read and write
|
||
6E8A000
|
unkown
|
page read and write
|
||
68E1000
|
unkown
|
page read and write
|
||
62BF000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
124000
|
unkown
|
page read and write
|
||
6252000
|
unkown
|
page read and write
|
||
62AB000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
4E0000
|
unkown
|
page read and write
|
||
644D000
|
unkown
|
page read and write
|
||
6682000
|
unkown
|
page read and write
|
||
630E000
|
unkown
|
page read and write
|
||
63C4000
|
unkown
|
page read and write
|
||
6AD1000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
64B6000
|
unkown
|
page read and write
|
||
64BC000
|
unkown
|
page read and write
|
||
6123000
|
unkown
|
page read and write
|
||
6365000
|
unkown
|
page read and write
|
||
4E02000
|
unkown
|
page read and write
|
||
49E000
|
unkown image
|
page readonly
|
||
4DF3000
|
unkown
|
page read and write
|
||
5BC000
|
unkown
|
page read and write
|
||
64DF000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
6C6A000
|
unkown
|
page read and write
|
||
6A8D000
|
unkown
|
page read and write
|
||
4718000
|
unkown
|
page read and write
|
||
49E000
|
unkown image
|
page readonly
|
||
63A1000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
528C000
|
unkown
|
page read and write
|
||
6E64000
|
unkown
|
page read and write
|
||
55C000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
642A000
|
unkown
|
page read and write
|
||
4720000
|
unkown
|
page read and write
|
||
62A0000
|
unkown
|
page read and write
|
||
830000
|
heap default
|
page read and write
|
||
224E000
|
unkown
|
page read and write | page guard
|
||
6A8A000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
667B000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
64A4000
|
unkown
|
page read and write
|
||
56BF000
|
stack
|
page read and write
|
||
4DB8000
|
unkown
|
page read and write
|
||
61F0000
|
unkown
|
page read and write
|
||
6862000
|
unkown
|
page read and write
|
||
49E000
|
unkown image
|
page readonly
|
||
4F00000
|
heap private
|
page execute and read and write
|
||
142000
|
unkown
|
page read and write
|
||
27C4000
|
unkown
|
page read and write
|
||
5211000
|
unkown
|
page read and write
|
||
65A9000
|
unkown
|
page read and write
|
||
4DD9000
|
unkown
|
page read and write
|
||
662E000
|
unkown
|
page read and write
|
||
5B5E000
|
unkown
|
page read and write
|
||
5110000
|
unkown
|
page read and write
|
||
53D0000
|
unkown
|
page readonly
|
||
6AC9000
|
unkown
|
page read and write
|
||
642D000
|
unkown
|
page read and write
|
||
56C0000
|
unkown
|
page readonly
|
||
6282000
|
unkown
|
page read and write
|
||
638C000
|
unkown
|
page read and write
|
||
615E000
|
unkown
|
page read and write
|
||
500000
|
heap private
|
page read and write
|
||
4932000
|
heap private
|
page read and write
|
||
49E000
|
unkown image
|
page readonly
|
||
5D8E000
|
unkown
|
page read and write
|
||
65F5000
|
unkown
|
page read and write
|
||
4E46000
|
unkown
|
page read and write
|
||
681C000
|
unkown
|
page read and write
|
||
60F7000
|
unkown
|
page read and write
|
||
69E4000
|
unkown
|
page read and write
|
||
6BC9000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
49E000
|
unkown image
|
page readonly
|
||
503E000
|
stack
|
page read and write
|
||
661C000
|
unkown
|
page read and write
|
||
AD0000
|
heap private
|
page execute and read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
675B000
|
unkown
|
page read and write
|
||
49E000
|
unkown image
|
page readonly
|
||
6618000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
65AE000
|
unkown
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
60A0000
|
unkown
|
page read and write
|
||
558E000
|
unkown
|
page read and write
|
||
6A9D000
|
unkown
|
page read and write
|
||
2140000
|
unkown
|
page readonly
|
||
6450000
|
unkown
|
page read and write
|
||
814000
|
heap default
|
page read and write
|
||
812E000
|
unkown
|
page read and write | page guard
|
||
13D000
|
unkown
|
page execute and read and write
|
||
6A95000
|
unkown
|
page read and write
|
||
6171000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page read and write
|
||
61EE000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
4C0000
|
unkown
|
page read and write
|
||
6C05000
|
unkown
|
page read and write
|
||
6455000
|
unkown
|
page read and write
|
||
4E32000
|
unkown
|
page read and write
|
||
4A70000
|
unkown
|
page readonly
|
||
63EF000
|
unkown
|
page read and write
|
||
68A9000
|
unkown
|
page read and write
|
||
8E9000
|
unkown
|
page read and write
|
||
A70000
|
unkown
|
page readonly
|
||
553D000
|
unkown
|
page read and write
|
||
4D94000
|
unkown
|
page read and write
|
||
4DB8000
|
unkown
|
page read and write
|
||
50F0000
|
unkown
|
page read and write
|
||
4DD7000
|
unkown
|
page read and write
|
||
49E000
|
unkown image
|
page readonly
|
||
63ED000
|
unkown
|
page read and write
|
||
20F3000
|
unkown
|
page read and write
|
||
8D0000
|
heap default
|
page read and write
|
||
7F7000
|
heap default
|
page read and write
|
||
8D9000
|
unkown
|
page read and write
|
||
50E0000
|
unkown
|
page read and write
|
||
4D6D000
|
unkown
|
page read and write
|
||
6202000
|
unkown
|
page read and write
|
||
A83000
|
unkown
|
page read and write
|
||
6B7C000
|
unkown
|
page read and write
|
||
50F0000
|
unkown
|
page read and write
|
||
49E000
|
unkown image
|
page readonly
|
||
6EF1000
|
unkown
|
page read and write
|
||
6596000
|
unkown
|
page read and write
|
||
6AD3000
|
unkown
|
page read and write
|
||
8DC000
|
unkown
|
page read and write
|
||
6EA0000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
5460000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
8D2000
|
heap default
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
4C0000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
4E16000
|
unkown
|
page read and write
|
||
63F3000
|
unkown
|
page read and write
|
||
1CB000
|
unkown
|
page read and write
|
||
5100000
|
heap private
|
page read and write
|
||
65D1000
|
unkown
|
page read and write
|
||
60BB000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
53A0000
|
unkown
|
page readonly
|
||
3E2000
|
unkown image
|
page execute read
|
||
4950000
|
unkown
|
page read and write
|
||
69CB000
|
unkown
|
page read and write
|
||
665B000
|
unkown
|
page read and write
|
||
123000
|
unkown
|
page execute and read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
658F000
|
unkown
|
page read and write
|
||
4E32000
|
unkown
|
page read and write
|
||
66A0000
|
unkown
|
page read and write
|
||
2135000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
6EB5000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
4DBD000
|
unkown
|
page read and write
|
||
6A24000
|
unkown
|
page read and write
|
||
6616000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
67D8000
|
unkown
|
page read and write
|
||
2A97000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page execute and read and write
|
||
6A10000
|
unkown
|
page read and write
|
||
5440000
|
unkown
|
page read and write
|
||
734A000
|
unkown
|
page read and write
|
||
6240000
|
unkown
|
page read and write
|
||
6624000
|
unkown
|
page read and write
|
||
66CA000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
8EC000
|
unkown
|
page read and write
|
||
5287000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
812F000
|
unkown
|
page read and write
|
||
4960000
|
unkown
|
page read and write
|
||
665F000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
65A1000
|
unkown
|
page read and write
|
||
152000
|
unkown
|
page read and write
|
||
63F5000
|
unkown
|
page read and write
|
||
4E16000
|
unkown
|
page read and write
|
||
63BA000
|
unkown
|
page read and write
|
||
49E000
|
unkown image
|
page readonly
|
||
822E000
|
stack
|
page read and write
|
||
4630000
|
unkown
|
page readonly
|
||
4F0000
|
unkown
|
page read and write
|
||
64FE000
|
unkown
|
page read and write
|
||
512D000
|
unkown
|
page read and write
|
||
62FA000
|
unkown
|
page read and write
|
||
6994000
|
unkown
|
page read and write
|
||
3251000
|
unkown
|
page read and write
|
||
60A000
|
heap private
|
page read and write
|
||
4830000
|
unkown
|
page read and write
|
||
64AF000
|
unkown
|
page read and write
|
||
12D000
|
unkown
|
page execute and read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
6AA8000
|
unkown
|
page read and write
|
||
6635000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
5298000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
6ACB000
|
unkown
|
page read and write
|
||
4DBC000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
69C3000
|
unkown
|
page read and write
|
||
6DB6000
|
unkown
|
page read and write
|
||
65A7000
|
unkown
|
page read and write
|
||
180000
|
heap private
|
page read and write
|
||
83C000
|
heap default
|
page read and write
|
||
65DA000
|
unkown
|
page read and write
|
||
65E7000
|
unkown
|
page read and write
|
||
14A000
|
unkown
|
page execute and read and write
|
||
6A18000
|
unkown
|
page read and write
|
||
5C1E000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
6667000
|
unkown
|
page read and write
|
||
4DBC000
|
unkown
|
page read and write
|
||
6509000
|
unkown
|
page read and write
|
||
5040000
|
unkown
|
page read and write
|
||
65EE000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
2F8000
|
stack
|
page read and write
|
||
53A0000
|
unkown
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
3E0000
|
unkown image
|
page readonly
|
||
4F0000
|
unkown
|
page read and write
|
||
63C0000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
50E0000
|
unkown
|
page read and write
|
||
6593000
|
unkown
|
page read and write
|
||
5AB0000
|
unkown
|
page read and write
|
||
69CE000
|
unkown
|
page read and write
|
||
4E16000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
8F0000
|
unkown
|
page readonly
|
||
110000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page readonly
|
||
63C7000
|
unkown
|
page read and write
|
||
4DF4000
|
unkown
|
page read and write
|
||
661E000
|
unkown
|
page read and write
|
||
7553000
|
unkown
|
page read and write
|
||
2140000
|
unkown
|
page read and write
|
||
7A0000
|
heap private
|
page execute and read and write
|
||
224F000
|
unkown
|
page read and write
|
||
6A87000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
6398000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
4E50000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
130000
|
unkown
|
page read and write
|
||
671E000
|
unkown
|
page read and write
|
||
6637000
|
unkown
|
page read and write
|
||
5AB0000
|
unkown
|
page read and write
|
||
693B000
|
unkown
|
page read and write
|
||
6A26000
|
unkown
|
page read and write
|
||
4E46000
|
unkown
|
page read and write
|
||
611E000
|
unkown
|
page read and write
|
||
54E000
|
unkown
|
page read and write
|
||
6662000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
4E02000
|
unkown
|
page read and write
|
||
5210000
|
unkown
|
page read and write
|
||
66D9000
|
unkown
|
page read and write
|
||
65DD000
|
unkown
|
page read and write
|
||
6A48000
|
unkown
|
page read and write
|
||
4950000
|
unkown
|
page readonly
|
||
674C000
|
unkown
|
page read and write
|
||
4DD7000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
5450000
|
unkown
|
page read and write
|
||
623E000
|
unkown
|
page read and write
|
||
4914000
|
heap private
|
page read and write
|
||
49E000
|
unkown image
|
page readonly
|
||
6A05000
|
unkown
|
page read and write
|
||
610F000
|
unkown
|
page read and write
|
||
6510000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
6614000
|
unkown
|
page read and write
|
||
6F5F000
|
unkown
|
page read and write
|
||
7541000
|
unkown
|
page read and write
|
||
4DF3000
|
unkown
|
page read and write
|
||
4D50000
|
unkown
|
page read and write
|
||
2130000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page read and write
|
||
7557000
|
unkown
|
page read and write
|
||
2251000
|
unkown
|
page read and write
|
||
6C45000
|
unkown
|
page read and write
|
||
6621000
|
unkown
|
page read and write
|
||
50F0000
|
unkown
|
page read and write
|
||
4E32000
|
unkown
|
page read and write
|
||
600000
|
heap private
|
page read and write
|
||
528F000
|
unkown
|
page read and write
|
||
7F0000
|
heap default
|
page read and write
|
||
6AE6000
|
unkown
|
page read and write
|
||
6788000
|
unkown
|
page read and write
|
||
6EA7000
|
unkown
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
50E0000
|
unkown
|
page read and write
|
||
4E46000
|
unkown
|
page read and write
|
||
4A6E000
|
stack
|
page read and write
|
||
6A53000
|
unkown
|
page read and write
|
||
15B000
|
unkown
|
page execute and read and write
|
||
6517000
|
unkown
|
page read and write
|
||
6391000
|
unkown
|
page read and write
|
||
20ED000
|
unkown
|
page read and write
|
||
49E000
|
unkown image
|
page readonly
|
||
54CE000
|
unkown
|
page read and write
|
||
3727000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
157000
|
unkown
|
page execute and read and write
|
||
4250000
|
unkown
|
page read and write
|
||
6ADB000
|
unkown
|
page read and write
|
||
610000
|
heap default
|
page read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
4E0000
|
unkown
|
page read and write
|
||
74AC000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
6710000
|
unkown
|
page read and write
|
||
4E02000
|
unkown
|
page read and write
|
||
5310000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
667F000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
6426000
|
unkown
|
page read and write
|
||
8A9000
|
heap default
|
page read and write
|
||
5C0000
|
heap private
|
page read and write
|
||
20A0000
|
unkown
|
page readonly
|
||
6A0E000
|
unkown
|
page read and write
|
||
6A92000
|
unkown
|
page read and write
|
||
69D5000
|
unkown
|
page read and write
|
||
638A000
|
unkown
|
page read and write
|
||
4710000
|
unkown
|
page read and write
|
||
8E7000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
50E0000
|
unkown
|
page read and write
|
||
4D0000
|
unkown
|
page read and write
|
There are 394 hidden memdumps, click here to show them.