Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
sample1.doc
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Author: User, Template: Normal.dotm,
Last Saved By: kirin, Revision Number: 7, Name of Creating Application: Microsoft Office Word, Total Editing Time: 20:00,
Create Time/Date: Sun May 10 01:31:00 2020, Last Saved Time/Date: Wed Oct 28 04:44:00 2020, Number of Pages: 2, Number of
Words: 89482, Number of Characters: 510049, Security: 0
|
initial sample
|
||
C:\Users\Public\Ksh1.pdf
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0001.doc
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0002.doc
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0003.doc
|
ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0005.doc
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0291.doc
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0416.doc
|
ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D50EB3E9-B04E-4308-B886-6463077025FE}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F52B8A12-B174-499E-B3BD-E7523F18DF93}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Ksh1.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu May 27 06:17:39
2021, mtime=Thu May 27 06:17:39 2021, atime=Thu May 27 06:17:41 2021, length=595972, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Public.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue
Jul 14 02:20:08 2009, mtime=Thu May 27 06:17:39 2021, atime=Thu May 27 06:17:39 2021, length=4096, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\sample1.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu May 27 06:16:25
2021, mtime=Thu May 27 06:16:25 2021, atime=Thu May 27 06:16:31 2021, length=856064, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$ample1.doc
|
data
|
dropped
|
||
C:\Users\Public\~$Ksh1.doc
|
data
|
dropped
|
||
C:\Users\Public\~$Ksh1.xls
|
data
|
dropped
|
||
C:\Users\Public\~WRD0000.tmp
|
ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\Public\~WRD0004.tmp
|
ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
There are 10 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\certutil.exe
|
Certutil -decode C:\Users\Public\Ksh1.xls C:\Users\Public\Ksh1.pdf
|
||
C:\Users\user\AppData\Local\Temp\tmp_e473b4.exe
|
C:\Users\user\AppData\Local\Temp/tmp_e473b4.exe
|
||
C:\Windows\SysWOW64\mfcm140\normaliz.exe
|
C:\Windows\SysWOW64\mfcm140\normaliz.exe
|
||
C:\Windows\SysWOW64\clip\mmcshext.exe
|
C:\Windows\SysWOW64\clip\mmcshext.exe
|
||
C:\Windows\SysWOW64\regedt32\ir50_qcx.exe
|
C:\Windows\SysWOW64\regedt32\ir50_qcx.exe
|
||
C:\Windows\SysWOW64\KBDNEPR\dhcpcmonitor.exe
|
C:\Windows\SysWOW64\KBDNEPR\dhcpcmonitor.exe
|
||
C:\Windows\SysWOW64\api-ms-win-core-interlocked-l1-1-0\adsmsext.exe
|
C:\Windows\SysWOW64\api-ms-win-core-interlocked-l1-1-0\adsmsext.exe
|
||
C:\Windows\SysWOW64\oleaccrc\TSChannel.exe
|
C:\Windows\SysWOW64\oleaccrc\TSChannel.exe
|
||
C:\Windows\SysWOW64\iprtrmgr\qdvd.exe
|
C:\Windows\SysWOW64\iprtrmgr\qdvd.exe
|
||
C:\Windows\SysWOW64\whhelper\msvcp120_clr0400.exe
|
C:\Windows\SysWOW64\whhelper\msvcp120_clr0400.exe
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k WerSvcGroup
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://91.121.87.90:8080/KFDwQljVkxD3/OOFcmzcP5LKdqC/7kx60YXntHFlDt/5Rmtlx5Mir4E2nTGMFj/vs6RDbQfHrygTYrI/
|
91.121.87.90
|
||
http://177.130.51.198/43z7rPqPirmV4qB/AthcoPDmU/Q4ILc7kQKSHycUR/pIpU/8iSRPWx/wgrz9ygVvehFY9FxG0/
|
177.130.51.198
|
||
http://www.%s.comPA
|
unknown
|
||
https://pornthash.mobi/videos/tayna_tung
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
https://pornthash.mobi/videos/tayna_tung%temp%/tmp_e473b4.exex
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
126.126.139.26
|
unknown
|
Japan
|
||
203.153.216.178
|
unknown
|
Indonesia
|
||
104.131.144.215
|
unknown
|
United States
|
||
143.95.101.72
|
unknown
|
United States
|
||
162.144.145.58
|
unknown
|
United States
|
||
180.23.53.200
|
unknown
|
Japan
|
||
190.164.135.81
|
unknown
|
Chile
|
||
45.239.204.100
|
unknown
|
Brazil
|
||
37.187.100.220
|
unknown
|
France
|
||
190.85.46.52
|
unknown
|
Colombia
|
||
88.247.58.26
|
unknown
|
Turkey
|
||
190.194.12.132
|
unknown
|
Argentina
|
||
103.80.51.61
|
unknown
|
Thailand
|
||
82.78.179.117
|
unknown
|
Romania
|
||
188.226.165.170
|
unknown
|
European Union
|
||
213.165.178.214
|
unknown
|
Malta
|
||
119.92.77.17
|
unknown
|
Philippines
|
||
46.105.131.68
|
unknown
|
France
|
||
47.154.85.229
|
unknown
|
United States
|
||
192.163.221.191
|
unknown
|
United States
|
||
190.117.101.56
|
unknown
|
Peru
|
||
190.192.39.136
|
unknown
|
Argentina
|
||
157.7.164.178
|
unknown
|
Japan
|
||
115.79.59.157
|
unknown
|
Viet Nam
|
||
192.241.220.183
|
unknown
|
United States
|
||
113.203.238.130
|
unknown
|
Pakistan
|
||
78.186.65.230
|
unknown
|
Turkey
|
||
46.32.229.152
|
unknown
|
United Kingdom
|
||
172.193.79.237
|
unknown
|
Australia
|
||
51.38.50.144
|
unknown
|
France
|
||
190.55.186.229
|
unknown
|
Argentina
|
||
60.125.114.64
|
unknown
|
Japan
|
||
94.212.52.40
|
unknown
|
Netherlands
|
||
58.27.215.3
|
unknown
|
Pakistan
|
||
41.185.29.128
|
unknown
|
South Africa
|
||
91.75.75.46
|
unknown
|
United Arab Emirates
|
||
95.76.142.243
|
unknown
|
Romania
|
||
27.83.209.210
|
unknown
|
Japan
|
||
2.58.16.86
|
unknown
|
Latvia
|
||
221.147.142.214
|
unknown
|
Korea Republic of
|
||
188.166.220.180
|
unknown
|
Netherlands
|
||
115.79.195.246
|
unknown
|
Viet Nam
|
||
118.33.121.37
|
unknown
|
Korea Republic of
|
||
188.40.170.197
|
unknown
|
Germany
|
||
179.5.118.12
|
unknown
|
El Salvador
|
||
36.91.44.183
|
unknown
|
Indonesia
|
||
192.210.217.94
|
unknown
|
United States
|
||
85.75.49.113
|
unknown
|
Greece
|
||
223.17.215.76
|
unknown
|
Hong Kong
|
||
185.208.226.142
|
unknown
|
Hungary
|
||
41.76.213.144
|
unknown
|
South Africa
|
||
75.127.14.170
|
unknown
|
United States
|
||
172.96.190.154
|
unknown
|
Canada
|
||
91.121.87.90
|
unknown
|
France
|
||
109.206.139.119
|
unknown
|
Russian Federation
|
||
103.229.73.17
|
unknown
|
Indonesia
|
||
178.33.167.120
|
unknown
|
France
|
||
43.255.175.197
|
unknown
|
Malaysia
|
||
5.79.70.250
|
unknown
|
Netherlands
|
||
120.51.34.254
|
unknown
|
Japan
|
||
125.200.20.233
|
unknown
|
Japan
|
||
103.93.220.182
|
unknown
|
Philippines
|
||
37.205.9.252
|
unknown
|
Czech Republic
|
||
118.243.83.70
|
unknown
|
Japan
|
||
172.105.78.244
|
unknown
|
United States
|
||
123.216.134.52
|
unknown
|
Japan
|
||
91.213.106.100
|
unknown
|
Latvia
|
||
37.46.129.215
|
unknown
|
Russian Federation
|
||
121.117.147.153
|
unknown
|
Japan
|
||
110.37.224.243
|
unknown
|
Pakistan
|
||
180.148.4.130
|
unknown
|
Viet Nam
|
||
113.161.148.81
|
unknown
|
Viet Nam
|
||
116.202.10.123
|
unknown
|
Germany
|
||
177.130.51.198
|
unknown
|
Brazil
|
||
153.229.219.1
|
unknown
|
Japan
|
||
203.56.191.129
|
unknown
|
Australia
|
||
180.21.3.52
|
unknown
|
Japan
|
||
54.38.143.245
|
unknown
|
France
|
||
77.74.78.80
|
unknown
|
Russian Federation
|
||
8.4.9.137
|
unknown
|
United States
|
||
79.133.6.236
|
unknown
|
Finland
|
||
202.29.237.113
|
unknown
|
Thailand
|
||
185.80.172.199
|
unknown
|
Azerbaijan
|
||
74.208.173.91
|
unknown
|
United States
|
||
116.91.240.96
|
unknown
|
Japan
|
||
139.59.61.215
|
unknown
|
Singapore
|
||
212.198.71.39
|
unknown
|
France
|
||
175.103.38.146
|
unknown
|
Indonesia
|
||
50.116.78.109
|
unknown
|
United States
|
||
109.13.179.195
|
unknown
|
France
|
||
42.200.96.63
|
unknown
|
Hong Kong
|
||
73.100.19.104
|
unknown
|
United States
|
||
24.231.51.190
|
unknown
|
Bahamas
|
||
190.151.5.131
|
unknown
|
Chile
|
||
113.193.239.51
|
unknown
|
India
|
||
185.142.236.163
|
unknown
|
Netherlands
|
||
198.20.228.9
|
unknown
|
United States
|
||
139.59.12.63
|
unknown
|
Singapore
|
||
73.55.128.120
|
unknown
|
United States
|
||
91.83.93.103
|
unknown
|
Hungary
|
There are 90 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
l;8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
%<8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
==8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EBB44
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F2EFC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 21
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 21
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FC458
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 21
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 22
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 21
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 22
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FC7A3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F2EFC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FC458
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\SysWOW64\whhelper\msvcp120_clr0400.exe
|
SavedLegacySettings
|
There are 408 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
688000
|
unkown
|
page read and write
|
||
5B8000
|
unkown
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
5B6000
|
heap default
|
page read and write
|
||
4F1000
|
unkown
|
page execute read
|
||
2B4000
|
heap default
|
page read and write
|
||
3F1000
|
unkown
|
page execute read
|
||
574000
|
heap default
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
3F1000
|
unkown
|
page execute read
|
||
504000
|
heap default
|
page read and write
|
||
2F8000
|
unkown
|
page read and write
|
||
2F6000
|
heap default
|
page read and write
|
||
548000
|
unkown
|
page read and write
|
||
686000
|
heap default
|
page read and write
|
||
2B8000
|
unkown
|
page read and write
|
||
5B8000
|
unkown
|
page read and write
|
||
641000
|
unkown
|
page execute read
|
||
274000
|
heap default
|
page read and write
|
||
1C61000
|
unkown
|
page execute read
|
||
658000
|
unkown
|
page read and write
|
||
926000
|
heap default
|
page read and write
|
||
614000
|
heap default
|
page read and write
|
||
2F8000
|
unkown
|
page read and write
|
||
291000
|
unkown
|
page execute read
|
||
3F1000
|
unkown
|
page execute read
|
||
928000
|
unkown
|
page read and write
|
||
18F000
|
unkown
|
page read and write
|
||
349F000
|
unkown
|
page read and write
|
||
2380000
|
unkown
|
page readonly
|
||
422000
|
unkown image
|
page execute and read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
937000
|
unkown
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
2ADF000
|
unkown
|
page read and write
|
||
3980000
|
unkown
|
page write copy
|
||
25E2000
|
heap private
|
page read and write
|
||
7EFD7000
|
unkown
|
page read and write
|
||
574000
|
heap default
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
3D7000
|
heap default
|
page read and write
|
||
2E2A000
|
unkown
|
page read and write
|
||
266000
|
heap private
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
2A3E000
|
unkown
|
page read and write
|
||
40D000
|
heap default
|
page read and write
|
||
639000
|
unkown
|
page read and write
|
||
3FD000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
401000
|
unkown image
|
page execute read
|
||
2C0000
|
heap private
|
page read and write
|
||
2E86000
|
unkown
|
page read and write
|
||
1E10000
|
unkown
|
page read and write
|
||
281F000
|
unkown
|
page read and write
|
||
2EDC000
|
unkown
|
page read and write
|
||
18A000
|
unkown
|
page read and write
|
||
697000
|
unkown
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
960000
|
unkown
|
page readonly
|
||
460000
|
unkown
|
page execute and read and write
|
||
2B4D000
|
unkown
|
page read and write
|
||
1B80000
|
unkown
|
page read and write
|
||
8E6000
|
heap private
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
8B0000
|
unkown
|
page readonly
|
||
650000
|
heap default
|
page read and write
|
||
2E80000
|
unkown
|
page readonly
|
||
382B000
|
unkown
|
page read and write
|
||
3050000
|
unkown
|
page readonly
|
||
2CAF000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page readonly
|
||
2CEF000
|
unkown
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
3BEF000
|
unkown
|
page read and write
|
||
26000
|
heap private
|
page read and write
|
||
2E01000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
390000
|
unkown
|
page readonly
|
||
23F9000
|
heap private
|
page read and write
|
||
1E2000
|
heap private
|
page read and write
|
||
371F000
|
unkown
|
page read and write
|
||
2820000
|
heap private
|
page read and write
|
||
38D0000
|
unkown
|
page readonly
|
||
37B3000
|
unkown
|
page read and write
|
||
51F000
|
unkown
|
page read and write
|
||
340000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2E50000
|
unkown
|
page readonly
|
||
37A0000
|
unkown
|
page read and write
|
||
297000
|
heap default
|
page read and write
|
||
33D000
|
unkown
|
page read and write
|
||
21FE000
|
unkown
|
page read and write
|
||
2CB0000
|
unkown
|
page read and write
|
||
7EFD7000
|
unkown
|
page read and write
|
||
18A000
|
unkown
|
page read and write
|
||
320000
|
unkown
|
page execute and read and write
|
||
58B000
|
unkown
|
page read and write
|
||
2EF0000
|
unkown
|
page readonly
|
||
250000
|
unkown
|
page readonly
|
||
1CC0000
|
unkown
|
page read and write
|
||
2580000
|
unkown
|
page read and write
|
||
2A0000
|
heap default
|
page read and write
|
||
4E0000
|
heap default
|
page read and write
|
||
2702000
|
heap private
|
page read and write
|
||
42A000
|
unkown image
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
550000
|
heap default
|
page read and write
|
||
3DF000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
18F000
|
unkown
|
page read and write
|
||
1DB0000
|
unkown
|
page read and write
|
||
2520000
|
heap private
|
page read and write
|
||
2B3E000
|
unkown
|
page read and write
|
||
1E0000
|
heap default
|
page read and write
|
||
2ED9000
|
unkown
|
page read and write
|
||
2C50000
|
unkown
|
page read and write
|
||
2814000
|
heap private
|
page read and write
|
||
3827000
|
unkown
|
page read and write
|
||
2560000
|
heap private
|
page read and write
|
||
3860000
|
unkown
|
page readonly
|
||
2EB1000
|
unkown
|
page read and write
|
||
353F000
|
unkown
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
2C7000
|
heap default
|
page read and write
|
||
396F000
|
unkown
|
page read and write
|
||
2EF0000
|
unkown
|
page readonly
|
||
422000
|
unkown image
|
page execute and read and write
|
||
27FC000
|
unkown
|
page read and write
|
||
399D000
|
unkown
|
page read and write
|
||
257000
|
heap default
|
page read and write
|
||
220000
|
unkown
|
page execute read
|
||
28E0000
|
heap private
|
page read and write
|
||
2EB7000
|
unkown
|
page read and write
|
||
39DF000
|
unkown
|
page read and write
|
||
34DF000
|
unkown
|
page read and write
|
||
557000
|
heap default
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
2DEB000
|
unkown
|
page read and write
|
||
3F0000
|
heap private
|
page read and write
|
||
2E8000
|
unkown
|
page read and write
|
||
42A000
|
unkown image
|
page read and write
|
||
42A000
|
unkown image
|
page read and write
|
||
8C7000
|
heap default
|
page read and write
|
||
2F05000
|
unkown
|
page read and write
|
||
1F20000
|
heap private
|
page read and write
|
||
2D3D000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
24D000
|
unkown
|
page read and write
|
||
2EB1000
|
unkown
|
page read and write
|
||
2A50000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
363E000
|
unkown
|
page read and write
|
||
361E000
|
unkown
|
page read and write
|
||
66F000
|
heap default
|
page read and write
|
||
1E80000
|
unkown
|
page readonly
|
||
620000
|
unkown
|
page execute and read and write
|
||
34EE000
|
unkown
|
page read and write
|
||
557000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
2910000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page read and write
|
||
33BE000
|
unkown
|
page read and write
|
||
3C9F000
|
unkown
|
page read and write
|
||
2569000
|
heap private
|
page read and write
|
||
345F000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
2ED9000
|
unkown
|
page read and write
|
||
3A0000
|
heap private
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
25AE000
|
unkown
|
page read and write
|
||
384F000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
4F0000
|
unkown
|
page read and write
|
||
2679000
|
heap private
|
page read and write
|
||
360000
|
unkown
|
page execute and read and write
|
||
880000
|
unkown
|
page read and write
|
||
3819000
|
unkown
|
page read and write
|
||
76E000
|
unkown
|
page read and write
|
||
8D7000
|
heap private
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
909000
|
unkown
|
page read and write
|
||
1C6F000
|
unkown
|
page readonly
|
||
2F50000
|
heap private
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
2E96000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
BDF000
|
unkown
|
page read and write
|
||
2DF8000
|
unkown
|
page read and write
|
||
55F000
|
heap default
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
33DD000
|
unkown
|
page read and write
|
||
27E0000
|
heap private
|
page read and write
|
||
300000
|
unkown
|
page write copy
|
||
29BD000
|
unkown
|
page read and write
|
||
3ADF000
|
unkown
|
page read and write
|
||
2A10000
|
heap private
|
page read and write
|
||
2464000
|
heap private
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
2CBF000
|
unkown
|
page read and write
|
||
35DF000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
2170000
|
unkown
|
page readonly
|
||
376D000
|
unkown
|
page read and write
|
||
2860000
|
heap private
|
page read and write
|
||
21B0000
|
unkown
|
page readonly
|
||
18B000
|
unkown
|
page read and write
|
||
3410000
|
unkown
|
page write copy
|
||
401000
|
unkown image
|
page execute read
|
||
290000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
7EFD7000
|
unkown
|
page read and write
|
||
250000
|
heap default
|
page read and write
|
||
375E000
|
unkown
|
page read and write
|
||
34DD000
|
unkown
|
page read and write
|
||
355D000
|
unkown
|
page read and write
|
||
1FF0000
|
heap private
|
page read and write
|
||
824000
|
heap private
|
page read and write
|
||
396F000
|
unkown
|
page read and write
|
||
529000
|
unkown
|
page read and write
|
||
2E37000
|
unkown
|
page read and write
|
||
22BC000
|
unkown
|
page read and write
|
||
2DAB000
|
unkown
|
page read and write
|
||
2614000
|
heap private
|
page read and write
|
||
2650000
|
unkown
|
page read and write
|
||
717000
|
heap private
|
page read and write
|
||
270000
|
unkown
|
page write copy
|
||
2B00000
|
unkown
|
page write copy
|
||
1F24000
|
heap private
|
page read and write
|
||
64D000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
78E000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
299000
|
unkown
|
page read and write
|
||
371F000
|
unkown
|
page read and write
|
||
18F000
|
unkown
|
page read and write
|
||
370000
|
heap default
|
page read and write
|
||
2B1C000
|
unkown
|
page read and write
|
||
386E000
|
unkown
|
page read and write
|
||
39A0000
|
unkown
|
page readonly
|
||
2DCB000
|
unkown
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
2C6000
|
unkown
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
2320000
|
unkown
|
page readonly
|
||
38D0000
|
unkown
|
page readonly
|
||
33A0000
|
unkown
|
page readonly
|
||
3190000
|
heap private
|
page read and write
|
||
23CE000
|
unkown
|
page read and write
|
||
2EFC000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
3A6000
|
heap private
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
3D0000
|
heap private
|
page read and write
|
||
3910000
|
unkown
|
page write copy
|
||
296E000
|
unkown
|
page read and write
|
||
363D000
|
unkown
|
page read and write
|
||
28AD000
|
unkown
|
page read and write
|
||
2930000
|
heap private
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
1C1F000
|
unkown
|
page read and write
|
||
330000
|
unkown
|
page read and write
|
||
2DF8000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
70000
|
unkown
|
page read and write
|
||
1B40000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
14C000
|
unkown
|
page read and write
|
||
2ADC000
|
unkown
|
page read and write
|
||
42A000
|
unkown image
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
289E000
|
unkown
|
page read and write
|
||
2EB1000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
3870000
|
unkown
|
page readonly
|
||
25BE000
|
unkown
|
page read and write
|
||
658000
|
heap default
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
307000
|
heap default
|
page read and write
|
||
5F7000
|
heap default
|
page read and write
|
||
18F000
|
unkown
|
page read and write
|
||
25AF000
|
unkown
|
page read and write
|
||
2E86000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
30F000
|
heap default
|
page read and write
|
||
47D000
|
unkown
|
page read and write
|
||
2CF0000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
1C0000
|
heap default
|
page read and write
|
||
2B4000
|
heap default
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
5DA000
|
heap default
|
page read and write
|
||
3FD000
|
unkown
|
page read and write
|
||
2EC0000
|
unkown
|
page read and write
|
||
298E000
|
unkown
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
7E0000
|
unkown
|
page readonly
|
||
2EAE000
|
unkown
|
page read and write
|
||
3980000
|
unkown image
|
page readonly
|
||
42D000
|
unkown image
|
page readonly
|
||
401000
|
unkown image
|
page execute read
|
||
2950000
|
heap private
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
38A0000
|
unkown
|
page readonly
|
||
1FF5000
|
heap private
|
page read and write
|
||
64F000
|
unkown
|
page readonly
|
||
29DD000
|
unkown
|
page read and write
|
||
365F000
|
unkown
|
page read and write
|
||
26AD000
|
unkown
|
page read and write
|
||
1C29000
|
heap private
|
page read and write
|
||
307000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page readonly
|
||
379F000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
2C7000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
215E000
|
unkown
|
page read and write
|
||
5C7000
|
unkown
|
page read and write
|
||
386F000
|
unkown
|
page read and write
|
||
61D000
|
heap default
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page read and write
|
||
3940000
|
unkown
|
page write copy
|
||
1B0000
|
unkown
|
page readonly
|
||
25E0000
|
unkown
|
page read and write
|
||
3819000
|
unkown
|
page read and write
|
||
3A6F000
|
unkown
|
page read and write
|
||
8D0000
|
heap private
|
page read and write
|
||
360000
|
heap private
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
160000
|
unkown
|
page readonly
|
||
697000
|
heap default
|
page read and write
|
||
39A0000
|
unkown image
|
page readonly
|
||
2C80000
|
unkown
|
page read and write
|
||
288F000
|
unkown
|
page read and write
|
||
362E000
|
unkown
|
page read and write
|
||
2697000
|
heap private
|
page read and write
|
||
2B30000
|
unkown
|
page read and write
|
||
3220000
|
heap private
|
page read and write
|
||
25C0000
|
heap private
|
page read and write
|
||
4B0000
|
heap private
|
page read and write
|
||
2529000
|
heap private
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
36EF000
|
unkown
|
page read and write
|
||
2660000
|
heap private
|
page read and write
|
||
2DDA000
|
unkown
|
page read and write
|
||
26000
|
heap private
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
42D000
|
unkown image
|
page readonly
|
||
26E4000
|
heap private
|
page read and write
|
||
2FA0000
|
unkown
|
page readonly
|
||
7D0000
|
heap private
|
page read and write
|
||
2D57000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
2E95000
|
unkown
|
page read and write
|
||
26BE000
|
unkown
|
page read and write
|
||
4B6000
|
heap private
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
2959000
|
heap private
|
page read and write
|
||
1C80000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
42A000
|
unkown image
|
page read and write
|
||
317000
|
heap private
|
page read and write
|
||
1D90000
|
unkown
|
page readonly
|
||
5CF000
|
unkown
|
page read and write
|
||
2E8000
|
unkown
|
page read and write
|
||
290000
|
unkown
|
page read and write
|
||
640000
|
unkown
|
page read and write
|
||
18A000
|
unkown
|
page read and write
|
||
2F2F000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
870000
|
unkown
|
page readonly
|
||
2659000
|
heap private
|
page read and write
|
||
3890000
|
unkown
|
page readonly
|
||
401000
|
unkown image
|
page execute read
|
||
260000
|
unkown
|
page write copy
|
||
29CE000
|
unkown
|
page read and write
|
||
5AF000
|
unkown
|
page read and write
|
||
3970000
|
unkown
|
page readonly
|
||
2E40000
|
unkown
|
page read and write
|
||
2D0D000
|
unkown
|
page read and write
|
||
2510000
|
heap private
|
page read and write
|
||
2750000
|
unkown
|
page readonly
|
||
340000
|
unkown
|
page write copy
|
||
28DE000
|
unkown
|
page read and write
|
||
2600000
|
unkown
|
page read and write
|
||
7EFD7000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
34AF000
|
unkown
|
page read and write
|
||
320000
|
unkown
|
page read and write
|
||
373F000
|
unkown
|
page read and write
|
||
2E9A000
|
unkown
|
page read and write
|
||
2522000
|
heap private
|
page read and write
|
||
D2000
|
unkown
|
page read and write
|
||
20B0000
|
heap private
|
page read and write
|
||
297000
|
heap default
|
page read and write
|
||
DC000
|
unkown
|
page read and write
|
||
39B0000
|
unkown image
|
page readonly
|
||
8E0000
|
heap private
|
page read and write
|
||
7EFD7000
|
unkown
|
page read and write
|
||
2E1F000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
18F000
|
unkown
|
page read and write
|
||
34FE000
|
unkown
|
page read and write
|
||
29D0000
|
unkown
|
page readonly
|
||
2A90000
|
unkown
|
page readonly
|
||
644000
|
heap default
|
page read and write
|
||
261F000
|
unkown
|
page read and write
|
||
376E000
|
unkown
|
page read and write
|
||
262F000
|
unkown
|
page read and write
|
||
2EB9000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
2F0000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
2D9C000
|
unkown
|
page read and write
|
||
2490000
|
unkown
|
page readonly
|
||
2D9000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
2B70000
|
heap private
|
page read and write
|
||
2B82000
|
heap private
|
page read and write
|
||
1D70000
|
unkown
|
page read and write
|
||
369F000
|
unkown
|
page read and write
|
||
2E7E000
|
unkown
|
page read and write
|
||
26FE000
|
unkown
|
page read and write
|
||
7EFD7000
|
unkown
|
page read and write
|
||
219E000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page execute read
|
||
5C8000
|
heap default
|
page read and write
|
||
678000
|
unkown
|
page read and write
|
||
5A8000
|
unkown
|
page read and write
|
||
2D2F000
|
unkown
|
page read and write
|
||
770000
|
heap private
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
320000
|
unkown
|
page readonly
|
||
4E7000
|
heap default
|
page read and write
|
||
220000
|
unkown
|
page readonly
|
||
1C60000
|
unkown
|
page read and write
|
||
2D30000
|
unkown
|
page read and write
|
||
604000
|
heap default
|
page read and write
|
||
2600000
|
unkown
|
page readonly
|
||
1E60000
|
unkown
|
page readonly
|
||
6D0000
|
unkown
|
page read and write
|
||
64F000
|
unkown
|
page read and write
|
||
27AE000
|
unkown
|
page read and write
|
||
2FB0000
|
unkown
|
page readonly
|
||
1CB0000
|
heap private
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
2EE3000
|
unkown
|
page read and write
|
||
2FAD000
|
unkown
|
page read and write
|
||
3970000
|
unkown
|
page readonly
|
||
1CF0000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
2634000
|
unkown
|
page read and write
|
||
294F000
|
unkown
|
page read and write
|
||
310000
|
heap default
|
page read and write
|
||
2E46000
|
unkown
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
2500000
|
unkown
|
page readonly
|
||
1C30000
|
unkown
|
page readonly
|
||
4A0000
|
unkown
|
page readonly
|
||
8B000
|
unkown
|
page read and write
|
||
8FB000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
72E000
|
unkown
|
page read and write
|
||
2EA6000
|
unkown
|
page read and write
|
||
2637000
|
heap private
|
page read and write
|
||
18A000
|
unkown
|
page read and write
|
||
890000
|
heap private
|
page read and write
|
||
26CD000
|
unkown
|
page read and write
|
||
2E06000
|
unkown
|
page read and write
|
||
2ED9000
|
unkown
|
page read and write
|
||
220000
|
heap private
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
3F0000
|
unkown
|
page read and write
|
||
2CF0000
|
unkown
|
page read and write
|
||
361E000
|
unkown
|
page read and write
|
||
414000
|
heap private
|
page read and write
|
||
2D12000
|
unkown
|
page read and write
|
||
2B6F000
|
unkown
|
page read and write
|
||
2D9F000
|
unkown
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
3980000
|
unkown image
|
page readonly
|
||
520000
|
unkown
|
page readonly
|
||
316E000
|
unkown
|
page read and write
|
||
339E000
|
unkown
|
page read and write
|
||
65B000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page execute read
|
||
3D0000
|
heap default
|
page read and write
|
||
263E000
|
unkown
|
page read and write
|
||
7EFAF000
|
unkown
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
3910000
|
unkown
|
page readonly
|
||
20000
|
heap private
|
page read and write
|
||
1BC0000
|
unkown
|
page readonly
|
||
640000
|
unkown
|
page readonly
|
||
627000
|
heap default
|
page read and write
|
||
3940000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
7EFAF000
|
unkown
|
page read and write
|
||
3AAF000
|
unkown
|
page read and write
|
||
3B60000
|
heap private
|
page read and write
|
||
383F000
|
unkown
|
page read and write
|
||
2417000
|
heap private
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
263C000
|
unkown
|
page read and write
|
||
3AEE000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
2B5F000
|
unkown
|
page read and write
|
||
2587000
|
heap private
|
page read and write
|
||
820000
|
heap private
|
page read and write
|
||
3A10000
|
unkown image
|
page readonly
|
||
18F000
|
unkown
|
page read and write
|
||
5A9000
|
unkown
|
page read and write
|
||
382F000
|
unkown
|
page read and write
|
||
2DEE000
|
unkown
|
page read and write
|
||
2560000
|
heap private
|
page read and write
|
||
3FF000
|
unkown
|
page readonly
|
||
2A6D000
|
unkown
|
page read and write
|
||
1EA0000
|
unkown
|
page read and write
|
||
2DF0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
410000
|
heap private
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
557000
|
heap default
|
page read and write
|
||
260D000
|
unkown
|
page read and write
|
||
330000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page write copy
|
||
5CF000
|
heap default
|
page read and write
|
||
207000
|
heap default
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
3C0000
|
unkown
|
page readonly
|
||
274E000
|
unkown
|
page read and write
|
||
599000
|
unkown
|
page read and write
|
||
290000
|
heap default
|
page read and write
|
||
283E000
|
unkown
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
202B000
|
heap private
|
page read and write
|
||
2F9000
|
heap private
|
page read and write
|
||
351E000
|
unkown
|
page read and write
|
||
230000
|
unkown
|
page execute read
|
||
1D30000
|
heap private
|
page read and write
|
||
2D59000
|
unkown
|
page read and write
|
||
2A40000
|
heap private
|
page read and write
|
||
2760000
|
unkown
|
page readonly
|
||
18A000
|
unkown
|
page read and write
|
||
3FF000
|
unkown
|
page readonly
|
||
37C4000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page readonly
|
||
270000
|
unkown
|
page read and write
|
||
197000
|
heap default
|
page read and write
|
||
2D9000
|
unkown
|
page read and write
|
||
2670000
|
heap private
|
page read and write
|
||
2130000
|
unkown
|
page readonly
|
||
2632000
|
heap private
|
page read and write
|
||
2510000
|
unkown
|
page readonly
|
||
1C00000
|
unkown
|
page read and write
|
||
5E7000
|
heap default
|
page read and write
|
||
2640000
|
heap private
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
35FF000
|
unkown
|
page read and write
|
||
304E000
|
unkown
|
page read and write
|
||
25FD000
|
unkown
|
page read and write
|
||
350000
|
unkown
|
page readonly
|
||
5E0000
|
unkown
|
page readonly
|
||
375E000
|
unkown
|
page read and write
|
||
2EA1000
|
unkown
|
page read and write
|
||
33E0000
|
unkown
|
page write copy
|
||
667000
|
unkown
|
page read and write
|
||
2640000
|
unkown
|
page readonly
|
||
2C4F000
|
unkown
|
page read and write
|
||
2720000
|
heap private
|
page read and write
|
||
5E0000
|
heap default
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
310000
|
unkown
|
page read and write
|
||
336000
|
unkown
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
389F000
|
unkown
|
page read and write
|
||
28CE000
|
unkown
|
page read and write
|
||
35EF000
|
unkown
|
page read and write
|
||
336D000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page readonly
|
||
2A0000
|
heap default
|
page read and write
|
||
2C7F000
|
unkown
|
page read and write
|
||
3FD000
|
unkown
|
page read and write
|
||
12C000
|
unkown
|
page read and write
|
||
37BA000
|
unkown
|
page read and write
|
||
669000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
2D70000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page execute read
|
||
1B0000
|
unkown
|
page execute read
|
||
34BF000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page execute and read and write
|
||
2EB6000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
34DF000
|
unkown
|
page read and write
|
||
890000
|
heap private
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
740000
|
heap private
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
4C0000
|
unkown
|
page readonly
|
||
27BE000
|
unkown
|
page read and write
|
||
1DA0000
|
heap private
|
page read and write
|
||
6F0000
|
heap private
|
page read and write
|
||
599000
|
unkown
|
page read and write
|
||
2E50000
|
unkown
|
page read and write
|
||
2610000
|
heap private
|
page read and write
|
||
250E000
|
unkown
|
page read and write
|
||
2990000
|
unkown
|
page read and write
|
||
290000
|
heap default
|
page read and write
|
||
2E4E000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
423000
|
unkown image
|
page execute read
|
||
7EFD7000
|
unkown
|
page read and write
|
||
365E000
|
unkown
|
page read and write
|
||
6FA000
|
heap private
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
42D000
|
unkown image
|
page readonly
|
||
8C0000
|
heap default
|
page read and write
|
||
385F000
|
unkown
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
3E0000
|
unkown
|
page execute and read and write
|
||
2750000
|
heap private
|
page read and write
|
||
270E000
|
unkown
|
page read and write
|
||
42A000
|
unkown image
|
page read and write
|
||
35DD000
|
unkown
|
page read and write
|
||
7EFAC000
|
unkown
|
page read and write
|
||
18F000
|
unkown
|
page read and write
|
||
259E000
|
unkown
|
page read and write
|
||
7EFAF000
|
unkown
|
page read and write
|
||
386F000
|
unkown
|
page read and write
|
||
2A68000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page readonly
|
||
2600000
|
unkown
|
page read and write
|
||
494000
|
heap private
|
page read and write
|
||
2550000
|
unkown
|
page readonly
|
||
600000
|
unkown
|
page write copy
|
||
22A0000
|
unkown
|
page readonly
|
||
38C0000
|
unkown
|
page readonly
|
||
2EBE000
|
unkown
|
page read and write
|
||
2DEE000
|
unkown
|
page read and write
|
||
617000
|
heap default
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
2480000
|
unkown
|
page readonly
|
||
42D000
|
unkown image
|
page readonly
|
||
2EC1000
|
unkown
|
page read and write
|
||
1CAF000
|
unkown
|
page read and write
|
||
2524000
|
heap private
|
page read and write
|
||
27EE000
|
unkown
|
page read and write
|
||
164000
|
heap private
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
3890000
|
unkown
|
page readonly
|
||
610000
|
unkown
|
page readonly
|
||
42D000
|
unkown image
|
page readonly
|
||
460000
|
unkown
|
page read and write
|
||
1E70000
|
unkown
|
page readonly
|
||
23B000
|
unkown
|
page read and write
|
||
6C7000
|
heap default
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
1CE000
|
heap default
|
page read and write
|
||
29F000
|
unkown
|
page readonly
|
||
4FD000
|
unkown
|
page read and write
|
||
2810000
|
heap private
|
page read and write
|
||
4FF000
|
unkown
|
page readonly
|
||
5F0000
|
heap default
|
page read and write
|
||
2D0000
|
unkown
|
page readonly
|
||
3B20000
|
heap private
|
page read and write
|
||
536000
|
heap private
|
page read and write
|
||
24A0000
|
unkown
|
page readonly
|
||
918000
|
unkown
|
page read and write
|
||
1E0000
|
heap default
|
page read and write
|
||
2E6000
|
heap private
|
page read and write
|
||
307000
|
unkown
|
page read and write
|
||
1C90000
|
unkown
|
page readonly
|
||
2100000
|
unkown
|
page readonly
|
||
2EA3000
|
unkown
|
page read and write
|
||
35AE000
|
unkown
|
page read and write
|
||
200000
|
heap default
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
390000
|
unkown
|
page readonly
|
||
23E000
|
heap default
|
page read and write
|
||
35EE000
|
unkown
|
page read and write
|
||
273E000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
2520000
|
heap private
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
5C7000
|
heap default
|
page read and write
|
||
39E0000
|
unkown image
|
page readonly
|
||
1D20000
|
unkown
|
page readonly
|
||
2ED8000
|
unkown
|
page read and write
|
||
18F000
|
unkown
|
page read and write
|
||
37C9000
|
unkown
|
page read and write
|
||
2832000
|
heap private
|
page read and write
|
||
21C0000
|
unkown
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
C8E000
|
unkown
|
page read and write
|
||
1F07000
|
unkown
|
page readonly
|
||
2EEE000
|
unkown
|
page read and write
|
||
2504000
|
heap private
|
page read and write
|
||
375F000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2482000
|
heap private
|
page read and write
|
||
37DE000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
300000
|
unkown
|
page read and write
|
||
557000
|
heap default
|
page read and write
|
||
23F0000
|
heap private
|
page read and write
|
||
62B000
|
unkown
|
page read and write
|
||
2A8D000
|
unkown
|
page read and write
|
||
2547000
|
heap private
|
page read and write
|
||
8BF000
|
unkown
|
page read and write
|
||
28B000
|
unkown
|
page read and write
|
||
530000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
2E63000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
383F000
|
unkown
|
page read and write
|
||
39B0000
|
unkown
|
page write copy
|
||
3C0000
|
unkown
|
page execute read
|
||
400000
|
unkown image
|
page readonly
|
||
312F000
|
unkown
|
page read and write
|
||
2B5C000
|
unkown
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
620000
|
heap default
|
page read and write
|
||
2050000
|
heap private
|
page read and write
|
||
69F000
|
heap default
|
page read and write
|
||
335F000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
2610000
|
heap private
|
page read and write
|
||
25FE000
|
unkown
|
page read and write
|
||
29A0000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
540000
|
unkown
|
page readonly
|
||
47F000
|
unkown
|
page readonly
|
||
33AE000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
350000
|
unkown
|
page read and write
|
||
2690000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
2CB000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
2F24000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page write copy
|
||
280000
|
unkown
|
page read and write
|
||
38A0000
|
unkown
|
page readonly
|
||
23D0000
|
unkown
|
page readonly
|
||
38DF000
|
unkown
|
page read and write
|
||
3D0000
|
heap default
|
page read and write
|
||
2D7F000
|
unkown
|
page read and write
|
||
290E000
|
unkown
|
page read and write
|
||
2EC1000
|
unkown
|
page read and write
|
||
34A0000
|
unkown
|
page readonly
|
||
37BF000
|
unkown
|
page read and write
|
||
2EB4000
|
unkown
|
page read and write
|
||
25EE000
|
unkown
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
1DF0000
|
heap private
|
page read and write
|
||
18F000
|
unkown
|
page read and write
|
||
2F0000
|
heap private
|
page read and write
|
||
3823000
|
unkown
|
page read and write
|
||
2D2F000
|
unkown
|
page read and write
|
||
3940000
|
unkown
|
page write copy
|
||
1F00000
|
unkown
|
page read and write
|
||
2300000
|
unkown
|
page readonly
|
||
2DC6000
|
unkown
|
page read and write
|
||
41B000
|
heap default
|
page read and write
|
||
538000
|
unkown
|
page read and write
|
||
5C7000
|
unkown
|
page read and write
|
||
266D000
|
unkown
|
page read and write
|
||
2500000
|
heap private
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
372F000
|
unkown
|
page read and write
|
||
1DC0000
|
unkown
|
page read and write
|
||
34AC000
|
unkown
|
page read and write
|
||
2A70000
|
unkown
|
page read and write
|
||
2ED8000
|
unkown
|
page read and write
|
||
33F000
|
unkown
|
page readonly
|
||
1CB0000
|
unkown
|
page read and write
|
||
1D00000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
416000
|
heap default
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
3193000
|
heap private
|
page read and write
|
||
26E0000
|
heap private
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
387F000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
842000
|
heap private
|
page read and write
|
||
2F6E000
|
unkown
|
page read and write
|
||
286000
|
unkown
|
page read and write
|
||
70930000
|
unkown image
|
page readonly
|
||
3B1E000
|
unkown
|
page read and write
|
||
2BBE000
|
unkown
|
page read and write
|
||
190000
|
heap private
|
page read and write
|
||
385E000
|
unkown
|
page read and write
|
||
1D1F000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
31D0000
|
heap private
|
page read and write
|
||
366F000
|
unkown
|
page read and write
|
||
230000
|
heap default
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
280000
|
unkown
|
page execute and read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
2CB000
|
unkown
|
page read and write
|
||
2650000
|
heap private
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
25EE000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
377E000
|
unkown
|
page read and write
|
||
1D80000
|
unkown
|
page readonly
|
||
2542000
|
heap private
|
page read and write
|
||
223F000
|
unkown
|
page read and write
|
||
58B000
|
unkown
|
page read and write
|
||
7EFAC000
|
unkown
|
page read and write
|
||
73F000
|
unkown
|
page read and write
|
||
327C000
|
unkown
|
page read and write
|
||
39AE000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page execute read
|
||
51B000
|
unkown
|
page read and write
|
||
373F000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
1C4000
|
heap private
|
page read and write
|
||
2CA0000
|
unkown image
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
160000
|
heap private
|
page read and write
|
||
681000
|
heap default
|
page read and write
|
||
130000
|
unkown
|
page readonly
|
||
2B60000
|
heap private
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
1E90000
|
heap private
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
7D6000
|
heap private
|
page read and write
|
||
2900000
|
unkown
|
page readonly
|
||
7EFD7000
|
unkown
|
page read and write
|
||
2D6F000
|
unkown
|
page read and write
|
||
34B000
|
heap default
|
page read and write
|
||
2B74000
|
unkown
|
page read and write
|
||
7CC000
|
unkown
|
page read and write
|
||
262C000
|
unkown
|
page read and write
|
||
42A000
|
unkown image
|
page read and write
|
||
353000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
37CC000
|
unkown
|
page read and write
|
||
37A1000
|
unkown
|
page read and write
|
||
2D21000
|
unkown
|
page read and write
|
||
2CF000
|
heap default
|
page read and write
|
||
1C10000
|
unkown
|
page execute and read and write
|
||
2C5E000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
5CF000
|
heap default
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
7E0000
|
unkown
|
page readonly
|
||
2677000
|
heap private
|
page read and write
|
||
1B0000
|
unkown
|
page execute read
|
||
3910000
|
unkown
|
page write copy
|
||
2C9E000
|
unkown
|
page read and write
|
||
2ED9000
|
unkown
|
page read and write
|
||
2A8000
|
unkown
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
2B64000
|
heap private
|
page read and write
|
||
2B60000
|
unkown
|
page readonly
|
||
490000
|
heap private
|
page read and write
|
||
648000
|
unkown
|
page read and write
|
||
2E95000
|
unkown
|
page read and write
|
||
2E61000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
1C47000
|
heap private
|
page read and write
|
||
4090000
|
unkown
|
page read and write
|
||
302E000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page write copy
|
||
422000
|
unkown image
|
page execute and read and write
|
||
2520000
|
unkown
|
page readonly
|
||
260000
|
heap private
|
page read and write
|
||
3C0000
|
unkown
|
page write copy
|
||
2EC1000
|
unkown
|
page read and write
|
||
280E000
|
unkown
|
page read and write
|
||
2F70000
|
unkown
|
page readonly
|
||
5F0000
|
unkown
|
page read and write
|
||
42A000
|
unkown image
|
page read and write
|
||
330000
|
unkown
|
page read and write
|
||
2A39000
|
unkown
|
page read and write
|
||
2977000
|
heap private
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
20B0000
|
unkown
|
page readonly
|
||
38E0000
|
unkown
|
page readonly
|
||
307000
|
heap default
|
page read and write
|
||
4E0000
|
unkown
|
page execute and read and write
|
||
379E000
|
unkown
|
page read and write
|
||
550000
|
heap default
|
page read and write
|
||
2F60000
|
heap private
|
page read and write
|
||
337D000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
240000
|
unkown
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
2EF3000
|
unkown
|
page read and write
|
||
2EEE000
|
unkown
|
page read and write
|
||
20C0000
|
unkown
|
page readonly
|
||
2460000
|
heap private
|
page read and write
|
||
630000
|
heap private
|
page read and write
|
||
2D9E000
|
unkown
|
page read and write
|
||
39A0000
|
unkown image
|
page readonly
|
||
1DA7000
|
unkown
|
page readonly
|
||
18A000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
8A1000
|
heap private
|
page read and write
|
||
244000
|
heap default
|
page read and write
|
||
390000
|
unkown
|
page write copy
|
||
3FF000
|
unkown
|
page readonly
|
||
29D000
|
unkown
|
page read and write
|
||
2650000
|
unkown
|
page readonly
|
||
620000
|
unkown
|
page readonly
|
||
2710000
|
heap private
|
page read and write
|
||
25F0000
|
unkown
|
page read and write
|
||
389C000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
25FC000
|
unkown
|
page read and write
|
||
937000
|
heap default
|
page read and write
|
||
3CA0000
|
unkown
|
page readonly
|
||
1C40000
|
heap private
|
page read and write
|
||
2390000
|
unkown
|
page readonly
|
||
250000
|
heap private
|
page read and write
|
||
1E46000
|
unkown
|
page read and write
|
||
1C6D000
|
unkown
|
page read and write
|
||
2B70000
|
unkown
|
page readonly
|
||
940000
|
heap default
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
25ED000
|
unkown
|
page read and write
|
||
361F000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
650000
|
unkown
|
page readonly
|
||
2D65000
|
unkown
|
page read and write
|
||
27B0000
|
heap private
|
page read and write
|
||
8E4000
|
heap default
|
page read and write
|
||
285C000
|
unkown
|
page read and write
|
||
25D0000
|
unkown
|
page read and write
|
||
2730000
|
unkown
|
page read and write
|
||
37BF000
|
unkown
|
page read and write
|
||
33DD000
|
unkown
|
page read and write
|
||
7EFAC000
|
unkown
|
page read and write
|
||
320000
|
unkown
|
page readonly
|
||
401000
|
unkown image
|
page execute read
|
||
400000
|
unkown image
|
page readonly
|
||
1C0000
|
heap private
|
page read and write
|
||
1CC0000
|
unkown
|
page read and write
|
||
393F000
|
unkown
|
page read and write
|
||
18A000
|
unkown
|
page read and write
|
||
190000
|
heap default
|
page read and write
|
||
25C4000
|
heap private
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
24C0000
|
heap private
|
page read and write
|
||
1CB0000
|
heap private
|
page read and write
|
||
2D70000
|
heap private
|
page read and write
|
||
2770000
|
heap private
|
page read and write
|
||
372F000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1C20000
|
heap private
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
18A000
|
unkown
|
page read and write
|
||
2E86000
|
unkown
|
page read and write
|
||
22E0000
|
heap private
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
290000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2CF9000
|
unkown
|
page read and write
|
||
42A000
|
unkown image
|
page read and write
|
||
750000
|
heap private
|
page read and write
|
||
24FF000
|
unkown
|
page read and write
|
||
3826000
|
unkown
|
page read and write
|
||
2D94000
|
unkown
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
38A0000
|
unkown
|
page readonly
|
||
667000
|
heap default
|
page read and write
|
||
2619000
|
heap private
|
page read and write
|
||
2490000
|
unkown
|
page readonly
|
||
2E0000
|
heap private
|
page read and write
|
||
1E30000
|
unkown
|
page readonly
|
||
381D000
|
unkown
|
page read and write
|
||
42D000
|
unkown image
|
page readonly
|
||
2BA0000
|
heap private
|
page read and write
|
||
240000
|
heap private
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
170000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
8E0000
|
unkown
|
page readonly
|
||
20C0000
|
unkown
|
page readonly
|
||
423000
|
unkown image
|
page execute read
|
There are 987 hidden memdumps, click here to show them.