Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PO4018308875.doc
|
Rich Text Format data, unknown version
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\princedanx[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
downloaded
|
||
C:\Users\user\AppData\Local\Temp\princedan859323.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\princedan859323.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9B09F78D-537D-406E-B057-1B1541B1D39D}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C67C7B4A-7023-4170-93C2-146687425423}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F7C72BCE-A594-453E-9048-97C10E531855}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PO4018308875.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15
2020, mtime=Wed Aug 26 14:08:15 2020, atime=Thu Jul 22 20:14:33 2021, length=50939, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$4018308875.doc
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\user\AppData\Roaming\princedan859323.exe
|
C:\Users\user\AppData\Roaming\princedan859323.exe
|
||
C:\Users\user\AppData\Local\Temp\princedan859323.exe
|
C:\Users\user\AppData\Local\Temp\princedan859323.exe vgyjnbhui
|
||
C:\Users\user\AppData\Local\Temp\princedan859323.exe
|
C:\Users\user\AppData\Local\Temp\princedan859323.exe vgyjnbhui
|
||
C:\Users\user\AppData\Local\Temp\princedan859323.exe
|
C:\Users\user\AppData\Local\Temp\princedan859323.exe vgyjnbhui
|
||
C:\Users\user\AppData\Local\Temp\princedan859323.exe
|
C:\Users\user\AppData\Local\Temp\princedan859323.exe vgyjnbhui
|
||
C:\Users\user\AppData\Local\Temp\princedan859323.exe
|
C:\Users\user\AppData\Local\Temp\princedan859323.exe vgyjnbhui
|
||
C:\Users\user\AppData\Local\Temp\princedan859323.exe
|
C:\Users\user\AppData\Local\Temp\princedan859323.exe vgyjnbhui
|
||
C:\Users\user\AppData\Local\Temp\princedan859323.exe
|
C:\Users\user\AppData\Local\Temp\princedan859323.exe vgyjnbhui
|
||
C:\Users\user\AppData\Local\Temp\princedan859323.exe
|
C:\Users\user\AppData\Local\Temp\princedan859323.exe vgyjnbhui
|
||
C:\Users\user\AppData\Local\Temp\princedan859323.exe
|
C:\Users\user\AppData\Local\Temp\princedan859323.exe vgyjnbhui
|
||
C:\Users\user\AppData\Local\Temp\princedan859323.exe
|
C:\Users\user\AppData\Local\Temp\princedan859323.exe vgyjnbhui
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://topv.xyz/princedanx.exe
|
185.239.243.112
|
||
www.containerflippers.com/np0c/
|
|||
http://go.microso
|
unknown
|
||
http://www.opera.com0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
topv.xyz
|
185.239.243.112
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.239.243.112
|
topv.xyz
|
Moldova Republic of
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
,i7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
tj7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
,k7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ECC16
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F3B3C
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F3B3C
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
SavedLegacySettings
|
||
C:\Users\user\AppData\Roaming\princedan859323.exe
|
FontCachePath
|
There are 314 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3399000
|
unkown
|
page read and write
|
||
3520000
|
unkown
|
page read and write
|
||
3562000
|
unkown
|
page read and write
|
||
58E2000
|
unkown
|
page readonly
|
||
6060000
|
unkown image
|
page readonly
|
||
4960000
|
unkown
|
page read and write
|
||
73DA000
|
unkown
|
page read and write
|
||
46C000
|
unkown image
|
page readonly
|
||
6330000
|
unkown
|
page read and write
|
||
750000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
6730000
|
unkown
|
page read and write
|
||
5220000
|
unkown
|
page read and write
|
||
5C40000
|
unkown
|
page read and write
|
||
297000
|
unkown
|
page execute and read and write
|
||
67A0000
|
unkown
|
page read and write
|
||
6060000
|
unkown image
|
page readonly
|
||
5874000
|
unkown
|
page readonly
|
||
2130000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
26D000
|
unkown
|
page execute and read and write
|
||
4EA0000
|
heap private
|
page read and write
|
||
5B2000
|
unkown
|
page read and write
|
||
6425000
|
unkown
|
page read and write
|
||
6C0C000
|
unkown
|
page read and write
|
||
5BA000
|
unkown
|
page read and write
|
||
6AE0000
|
unkown
|
page read and write
|
||
663E000
|
unkown
|
page read and write
|
||
4300000
|
unkown
|
page read and write
|
||
168000
|
unkown
|
page read and write
|
||
6637000
|
unkown
|
page read and write
|
||
50A0000
|
unkown
|
page read and write
|
||
46C000
|
unkown image
|
page readonly
|
||
46C000
|
unkown image
|
page readonly
|
||
654C000
|
unkown
|
page read and write
|
||
8F0000
|
unkown image
|
page readonly
|
||
6639000
|
unkown
|
page read and write
|
||
6B25000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
66A6000
|
unkown
|
page read and write
|
||
6868000
|
unkown
|
page read and write
|
||
6A74000
|
unkown
|
page read and write
|
||
8D0000
|
unkown
|
page read and write
|
||
3F8000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
61EE000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page readonly
|
||
690000
|
unkown
|
page read and write
|
||
46C000
|
unkown image
|
page readonly
|
||
3E0000
|
unkown image
|
page readonly
|
||
7BE000
|
unkown
|
page read and write
|
||
46F0000
|
unkown
|
page read and write
|
||
4860000
|
unkown
|
page read and write
|
||
6060000
|
unkown image
|
page readonly
|
||
3E2000
|
unkown image
|
page execute read
|
||
5F10000
|
unkown
|
page write copy
|
||
760000
|
unkown
|
page read and write
|
||
29B000
|
unkown
|
page execute and read and write
|
||
4290000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
3299000
|
unkown
|
page read and write
|
||
46C000
|
unkown image
|
page readonly
|
||
8CA000
|
unkown
|
page read and write
|
||
2170000
|
unkown
|
page read and write
|
||
4EC5000
|
unkown
|
page read and write
|
||
48F0000
|
unkown
|
page read and write
|
||
701000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
6428000
|
unkown
|
page read and write
|
||
5C20000
|
unkown
|
page readonly
|
||
6421000
|
unkown
|
page read and write
|
||
6A9E000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
231A000
|
unkown
|
page read and write
|
||
58B2000
|
unkown
|
page readonly
|
||
50BD000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
638A000
|
unkown
|
page read and write
|
||
5925000
|
unkown
|
page readonly
|
||
66BE000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
46C000
|
unkown image
|
page readonly
|
||
4710000
|
unkown
|
page read and write
|
||
52D4000
|
heap private
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
3E0000
|
unkown image
|
page readonly
|
||
3E0000
|
unkown image
|
page readonly
|
||
58B4000
|
unkown
|
page readonly
|
||
641C000
|
unkown
|
page read and write
|
||
69A000
|
unkown
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
46C000
|
unkown image
|
page readonly
|
||
5996000
|
unkown
|
page readonly
|
||
690000
|
unkown
|
page read and write
|
||
5999000
|
unkown
|
page readonly
|
||
8F0000
|
unkown image
|
page readonly
|
||
5230000
|
unkown
|
page read and write
|
||
831E000
|
unkown
|
page read and write
|
||
4890000
|
unkown
|
page read and write
|
||
46C000
|
unkown image
|
page readonly
|
||
8F2000
|
unkown image
|
page execute read
|
||
370000
|
heap default
|
page read and write
|
||
4720000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
2170000
|
unkown
|
page read and write
|
||
8C0000
|
unkown
|
page read and write
|
||
770000
|
heap private
|
page read and write
|
||
6E0000
|
unkown
|
page execute and read and write
|
||
6060000
|
unkown image
|
page readonly
|
||
3E0000
|
unkown image
|
page readonly
|
||
504E000
|
unkown
|
page read and write
|
||
658C000
|
unkown
|
page read and write
|
||
2291000
|
unkown
|
page read and write
|
||
5A05000
|
unkown
|
page readonly
|
||
66AE000
|
unkown
|
page read and write
|
||
4319000
|
unkown
|
page read and write
|
||
2365000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
8B0000
|
unkown
|
page read and write
|
||
8C0000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
6060000
|
unkown image
|
page readonly
|
||
6534000
|
unkown
|
page read and write
|
||
264000
|
unkown
|
page read and write
|
||
2333000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page readonly
|
||
6060000
|
unkown image
|
page readonly
|
||
20C0000
|
unkown
|
page readonly
|
||
70C000
|
unkown
|
page read and write
|
||
8A0000
|
unkown
|
page read and write
|
||
67DC000
|
unkown
|
page read and write
|
||
6B76000
|
unkown
|
page read and write
|
||
2140000
|
unkown
|
page read and write
|
||
2130000
|
unkown
|
page read and write
|
||
6AB6000
|
unkown
|
page read and write
|
||
8A0000
|
unkown
|
page read and write
|
||
75C6000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
6B17000
|
unkown
|
page read and write
|
||
661A000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
871E000
|
unkown
|
page read and write
|
||
5166000
|
unkown
|
page read and write
|
||
4900000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
5050000
|
unkown
|
page read and write
|
||
46C000
|
unkown image
|
page readonly
|
||
46C000
|
unkown image
|
page readonly
|
||
6AD8000
|
unkown
|
page read and write
|
||
4AD0000
|
unkown
|
page readonly
|
||
6818000
|
unkown
|
page read and write
|
||
48E0000
|
unkown
|
page read and write
|
||
6AEB000
|
unkown
|
page read and write
|
||
6FEF000
|
unkown
|
page read and write
|
||
52B0000
|
unkown
|
page read and write
|
||
67AE000
|
unkown
|
page read and write
|
||
613000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
690000
|
unkown
|
page read and write
|
||
6AE3000
|
unkown
|
page read and write
|
||
700000
|
unkown
|
page read and write
|
||
5330000
|
unkown
|
page readonly
|
||
286000
|
unkown
|
page execute and read and write
|
||
680000
|
unkown
|
page execute and read and write
|
||
8A0000
|
unkown
|
page read and write
|
||
8A0000
|
unkown
|
page read and write
|
||
4310000
|
unkown
|
page read and write
|
||
750000
|
unkown
|
page read and write
|
||
6B1D000
|
unkown
|
page read and write
|
||
66EF000
|
unkown
|
page read and write
|
||
2150000
|
unkown
|
page read and write
|
||
6B61000
|
unkown
|
page read and write
|
||
5BE0000
|
unkown
|
page readonly
|
||
5CB0000
|
unkown
|
page read and write
|
||
680000
|
unkown
|
page read and write
|
||
8A0000
|
unkown
|
page read and write
|
||
6292000
|
unkown
|
page read and write
|
||
66A8000
|
unkown
|
page read and write
|
||
8A0000
|
unkown
|
page read and write
|
||
2C0000
|
heap private
|
page read and write
|
||
5E90000
|
unkown
|
page read and write
|
||
4720000
|
unkown
|
page read and write
|
||
66F7000
|
unkown
|
page read and write
|
||
670B000
|
unkown
|
page read and write
|
||
35B9000
|
unkown
|
page read and write
|
||
2130000
|
unkown
|
page read and write
|
||
6454000
|
unkown
|
page read and write
|
||
4300000
|
unkown
|
page read and write
|
||
534000
|
heap default
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
8A0000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
680000
|
unkown
|
page read and write
|
||
6B63000
|
unkown
|
page read and write
|
||
6AA8000
|
unkown
|
page read and write
|
||
75E3000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
68DE000
|
unkown
|
page read and write
|
||
2150000
|
unkown
|
page read and write
|
||
4ACE000
|
unkown
|
page read and write
|
||
8D0000
|
unkown
|
page read and write
|
||
5A12000
|
unkown
|
page readonly
|
||
8D0000
|
unkown
|
page read and write
|
||
5955000
|
unkown
|
page readonly
|
||
69CB000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
6827000
|
unkown
|
page read and write
|
||
6666000
|
unkown
|
page read and write
|
||
5BA2000
|
unkown
|
page readonly
|
||
750000
|
unkown
|
page read and write
|
||
6E0000
|
unkown
|
page read and write
|
||
5DA000
|
unkown
|
page read and write
|
||
5C40000
|
unkown
|
page read and write
|
||
656F000
|
unkown
|
page read and write
|
||
66C7000
|
unkown
|
page read and write
|
||
4740000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
5240000
|
unkown
|
page read and write
|
||
4E90000
|
unkown
|
page read and write
|
||
8D0000
|
unkown
|
page read and write
|
||
4710000
|
unkown
|
page read and write
|
||
550000
|
heap default
|
page read and write
|
||
5AD000
|
unkown
|
page read and write
|
||
5210000
|
unkown
|
page read and write
|
||
510D000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
66AC000
|
unkown
|
page read and write
|
||
4ED0000
|
heap private
|
page read and write
|
||
59E2000
|
unkown
|
page readonly
|
||
46C000
|
unkown image
|
page readonly
|
||
62D0000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
766000
|
unkown
|
page read and write
|
||
6131000
|
unkown
|
page read and write
|
||
66C5000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
6312000
|
unkown
|
page read and write
|
||
234C000
|
unkown
|
page read and write
|
||
8A0000
|
unkown
|
page read and write
|
||
61AE000
|
unkown
|
page read and write
|
||
2140000
|
unkown
|
page read and write
|
||
4970000
|
unkown
|
page read and write
|
||
8B0000
|
unkown
|
page read and write
|
||
71A000
|
heap private
|
page read and write
|
||
750000
|
unkown
|
page read and write
|
||
4310000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
810E000
|
unkown
|
page read and write
|
||
46C000
|
unkown image
|
page readonly
|
||
67EB000
|
unkown
|
page read and write
|
||
6705000
|
unkown
|
page read and write
|
||
6187000
|
unkown
|
page read and write
|
||
66C0000
|
unkown
|
page read and write
|
||
66CC000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
6B6B000
|
unkown
|
page read and write
|
||
46C000
|
unkown image
|
page readonly
|
||
8C0000
|
unkown
|
page read and write
|
||
6898000
|
unkown
|
page read and write
|
||
4EC0000
|
unkown
|
page read and write
|
||
5166000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
5152000
|
unkown
|
page read and write
|
||
663B000
|
unkown
|
page read and write
|
||
217E000
|
unkown
|
page read and write
|
||
5892000
|
unkown
|
page readonly
|
||
64BD000
|
unkown
|
page read and write
|
||
5E0E000
|
unkown
|
page read and write
|
||
661E000
|
unkown
|
page read and write
|
||
68F2000
|
unkown
|
page read and write
|
||
6C59000
|
unkown
|
page read and write
|
||
55D000
|
heap default
|
page read and write
|
||
6483000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
4850000
|
unkown
|
page read and write
|
||
4890000
|
unkown
|
page read and write
|
||
630000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
5182000
|
unkown
|
page read and write
|
||
46C000
|
unkown image
|
page readonly
|
||
228F000
|
unkown
|
page read and write
|
||
4900000
|
unkown
|
page read and write
|
||
699000
|
unkown
|
page read and write
|
||
666D000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
23AF000
|
unkown
|
page read and write
|
||
6060000
|
unkown image
|
page readonly
|
||
484F000
|
unkown
|
page read and write
|
||
738000
|
heap private
|
page read and write
|
||
63FA000
|
unkown
|
page read and write
|
||
627E000
|
unkown
|
page read and write
|
||
4EAC000
|
heap private
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
6939000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
6431000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
6F37000
|
unkown
|
page read and write
|
||
4729000
|
unkown
|
page read and write
|
||
6A5E000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
680000
|
unkown
|
page read and write
|
||
5936000
|
unkown
|
page readonly
|
||
634F000
|
unkown
|
page read and write
|
||
5310000
|
unkown
|
page readonly
|
||
6F30000
|
unkown
|
page read and write
|
||
680000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
5E90000
|
unkown
|
page read and write
|
||
5250000
|
unkown
|
page read and write
|
||
5166000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
5912000
|
unkown
|
page readonly
|
||
617000
|
unkown
|
page read and write
|
||
5060000
|
heap private
|
page execute and read and write
|
||
46C000
|
unkown image
|
page readonly
|
||
282000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
619F000
|
unkown
|
page read and write
|
||
667E000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
46C000
|
unkown image
|
page readonly
|
||
180000
|
unkown
|
page readonly
|
||
3E0000
|
unkown image
|
page readonly
|
||
64B6000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
49B2000
|
heap private
|
page read and write
|
||
730E000
|
unkown
|
page read and write
|
||
4740000
|
unkown
|
page read and write
|
||
666A000
|
unkown
|
page read and write
|
||
5152000
|
unkown
|
page read and write
|
||
4DB0000
|
unkown
|
page read and write
|
||
2160000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
6F45000
|
unkown
|
page read and write
|
||
66F9000
|
unkown
|
page read and write
|
||
2396000
|
unkown
|
page read and write
|
||
5152000
|
unkown
|
page read and write
|
||
8B0000
|
unkown
|
page read and write
|
||
6677000
|
unkown
|
page read and write
|
||
23E1000
|
unkown
|
page read and write
|
||
23F3000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
51A0000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
6712000
|
unkown
|
page read and write
|
||
6457000
|
unkown
|
page read and write
|
||
292000
|
unkown
|
page read and write
|
||
6B1A000
|
unkown
|
page read and write
|
||
6546000
|
unkown
|
page read and write
|
||
4880000
|
unkown
|
page read and write
|
||
6E0000
|
unkown
|
page read and write
|
||
6661000
|
unkown
|
page read and write
|
||
5906000
|
unkown
|
page readonly
|
||
6060000
|
unkown image
|
page readonly
|
||
6450000
|
unkown
|
page read and write
|
||
8AF000
|
unkown
|
page read and write
|
||
52D8000
|
heap private
|
page read and write
|
||
8C0000
|
unkown
|
page read and write
|
||
65A2000
|
unkown
|
page read and write
|
||
4990000
|
heap private
|
page read and write
|
||
4850000
|
unkown
|
page read and write
|
||
8B0000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
2F0000
|
unkown
|
page read and write
|
||
5196000
|
unkown
|
page read and write
|
||
56B8000
|
unkown
|
page readonly
|
||
6F0000
|
unkown
|
page read and write
|
||
59B2000
|
unkown
|
page readonly
|
||
6F0000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
6130000
|
unkown
|
page read and write
|
||
52C0000
|
unkown
|
page read and write
|
||
85CE000
|
unkown
|
page read and write | page guard
|
||
5000000
|
unkown
|
page read and write
|
||
51A0000
|
unkown
|
page read and write
|
||
8B0000
|
unkown
|
page read and write
|
||
2180000
|
unkown
|
page read and write
|
||
5108000
|
unkown
|
page read and write
|
||
4730000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
3E0000
|
unkown image
|
page readonly
|
||
644A000
|
unkown
|
page read and write
|
||
68AC000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
59D5000
|
unkown
|
page readonly
|
||
250000
|
unkown
|
page read and write
|
||
5D20000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
27D000
|
unkown
|
page execute and read and write
|
||
67C000
|
unkown
|
page read and write
|
||
23C8000
|
unkown
|
page read and write
|
||
8D0000
|
unkown
|
page read and write
|
||
6AF7000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
8C0000
|
unkown
|
page read and write
|
||
4FFE000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
621E000
|
unkown
|
page read and write
|
||
4730000
|
unkown
|
page read and write
|
||
9A0000
|
unkown
|
page readonly
|
||
6F0000
|
unkown
|
page read and write
|
||
2180000
|
unkown
|
page read and write
|
||
35DA000
|
unkown
|
page read and write
|
||
5020000
|
unkown
|
page read and write
|
||
6680000
|
unkown
|
page read and write
|
||
66B4000
|
unkown
|
page read and write
|
||
4994000
|
heap private
|
page read and write
|
||
48DE000
|
unkown
|
page read and write
|
||
6060000
|
unkown image
|
page readonly
|
||
6F0000
|
unkown
|
page read and write
|
||
66F2000
|
unkown
|
page read and write
|
||
5196000
|
unkown
|
page read and write
|
||
614B000
|
unkown
|
page read and write
|
||
2160000
|
unkown
|
page read and write
|
||
6A95000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
55A000
|
heap default
|
page read and write
|
||
64E4000
|
unkown
|
page read and write
|
||
5260000
|
unkown
|
page execute and read and write
|
||
647F000
|
unkown
|
page read and write
|
||
59E9000
|
unkown
|
page readonly
|
||
65A0000
|
unkown
|
page read and write
|
||
510C000
|
unkown
|
page read and write
|
||
750000
|
unkown
|
page read and write
|
||
65A7000
|
unkown
|
page read and write
|
||
641A000
|
unkown
|
page read and write
|
||
255A000
|
unkown
|
page read and write
|
||
4980000
|
unkown
|
page read and write
|
||
63D9000
|
unkown
|
page read and write
|
||
8F0000
|
unkown image
|
page readonly
|
||
6B22000
|
unkown
|
page read and write
|
||
52DB000
|
heap private
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
48E0000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
6A72000
|
unkown
|
page read and write
|
||
6626000
|
unkown
|
page read and write
|
||
5182000
|
unkown
|
page read and write
|
||
5872000
|
unkown
|
page readonly
|
||
6CFA000
|
unkown
|
page read and write
|
||
46C000
|
unkown image
|
page readonly
|
||
3E2000
|
unkown image
|
page execute read
|
||
3E0000
|
unkown image
|
page readonly
|
||
8A2000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
750000
|
unkown
|
page execute and read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
2E0000
|
unkown
|
page execute and read and write
|
||
97C000
|
unkown image
|
page readonly
|
||
5196000
|
unkown
|
page read and write
|
||
6B2D000
|
unkown
|
page read and write
|
||
5942000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page read and write
|
||
28A000
|
unkown
|
page execute and read and write
|
||
6DE000
|
unkown
|
page read and write
|
||
64B0000
|
unkown
|
page read and write
|
||
5972000
|
unkown
|
page readonly
|
||
2160000
|
unkown
|
page read and write
|
||
6855000
|
unkown
|
page read and write
|
||
750000
|
unkown
|
page read and write
|
||
4880000
|
unkown
|
page read and write
|
||
6F1A000
|
unkown
|
page read and write
|
||
5030000
|
unkown
|
page read and write
|
||
630000
|
unkown
|
page read and write
|
||
46F0000
|
unkown
|
page read and write
|
||
633B000
|
unkown
|
page read and write
|
||
6599000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
2300000
|
unkown
|
page read and write
|
||
4885000
|
unkown
|
page read and write
|
||
6050000
|
unkown
|
page read and write
|
||
4EF0000
|
unkown
|
page read and write
|
||
647D000
|
unkown
|
page read and write
|
||
658E000
|
unkown
|
page read and write
|
||
6623000
|
unkown
|
page read and write
|
||
75CB000
|
unkown
|
page read and write
|
||
263000
|
unkown
|
page execute and read and write
|
||
6E0000
|
unkown
|
page read and write
|
||
6B38000
|
unkown
|
page read and write
|
||
249000
|
unkown
|
page read and write
|
||
46C000
|
unkown image
|
page readonly
|
||
6C95000
|
unkown
|
page read and write
|
||
4950000
|
unkown
|
page read and write
|
||
5182000
|
unkown
|
page read and write
|
||
51A0000
|
unkown
|
page read and write
|
||
5143000
|
unkown
|
page read and write
|
||
66B1000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
6CD5000
|
unkown
|
page read and write
|
||
4420000
|
unkown
|
page readonly
|
||
8F2000
|
unkown image
|
page execute read
|
||
8E0000
|
unkown
|
page read and write
|
||
616000
|
unkown
|
page read and write
|
||
5FD0000
|
unkown
|
page read and write
|
||
56B2000
|
unkown
|
page readonly
|
||
3E0000
|
unkown image
|
page readonly
|
||
5A35000
|
unkown
|
page readonly
|
||
766000
|
unkown
|
page read and write
|
||
6060000
|
unkown image
|
page readonly
|
||
4700000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
6A24000
|
unkown
|
page read and write
|
||
6769000
|
unkown
|
page read and write
|
||
6A53000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
62CE000
|
unkown
|
page read and write
|
||
6F81000
|
unkown
|
page read and write
|
||
6280000
|
unkown
|
page read and write
|
||
5127000
|
unkown
|
page read and write
|
||
5E90000
|
unkown
|
page read and write
|
||
5144000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
60BE000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
75E7000
|
unkown
|
page read and write
|
||
75D1000
|
unkown
|
page read and write
|
||
59B9000
|
unkown
|
page readonly
|
||
4EE0000
|
unkown
|
page read and write
|
||
6A5B000
|
unkown
|
page read and write
|
||
61B3000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
5108000
|
unkown
|
page read and write
|
||
441E000
|
unkown
|
page read and write
|
||
315000
|
unkown
|
page read and write
|
||
6F70000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page write copy
|
||
8C0000
|
unkown
|
page read and write
|
||
5143000
|
unkown
|
page read and write
|
||
2150000
|
unkown
|
page read and write
|
||
63F5000
|
unkown
|
page read and write
|
||
639E000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
237E000
|
unkown
|
page read and write
|
||
494C000
|
unkown
|
page read and write
|
||
6201000
|
unkown
|
page read and write
|
||
5894000
|
unkown
|
page readonly
|
||
310000
|
unkown
|
page read and write
|
||
5129000
|
unkown
|
page read and write
|
||
6B59000
|
unkown
|
page read and write
|
||
52D0000
|
heap private
|
page read and write
|
||
680000
|
unkown
|
page read and write
|
||
5966000
|
unkown
|
page readonly
|
||
68C000
|
unkown
|
page read and write
|
||
700000
|
unkown
|
page read and write
|
||
8A5000
|
unkown
|
page read and write
|
||
6685000
|
unkown
|
page read and write
|
||
6EF4000
|
unkown
|
page read and write
|
||
6485000
|
unkown
|
page read and write
|
||
753C000
|
unkown
|
page read and write
|
||
675A000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page execute read
|
||
621A000
|
unkown
|
page read and write
|
||
680000
|
unkown
|
page read and write
|
||
6AA0000
|
unkown
|
page read and write
|
||
750000
|
unkown
|
page read and write
|
||
710000
|
heap private
|
page read and write
|
||
46C000
|
unkown image
|
page readonly
|
||
2130000
|
unkown
|
page read and write
|
||
700000
|
unkown
|
page read and write
|
||
4A0000
|
heap private
|
page execute and read and write
|
||
97C000
|
unkown image
|
page readonly
|
||
4700000
|
unkown
|
page read and write
|
||
665F000
|
unkown
|
page read and write
|
||
510000
|
heap default
|
page read and write
|
||
85CF000
|
unkown
|
page read and write
|
||
3291000
|
unkown
|
page read and write
|
||
5127000
|
unkown
|
page read and write
|
||
510C000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
50E4000
|
unkown
|
page read and write
|
||
6A65000
|
unkown
|
page read and write
|
||
58F5000
|
unkown
|
page readonly
|
||
3E2000
|
unkown image
|
page execute read
|
||
5985000
|
unkown
|
page readonly
|
||
6AB4000
|
unkown
|
page read and write
|
||
517000
|
heap default
|
page read and write
|
||
8B0000
|
unkown
|
page read and write
|
||
46C000
|
unkown image
|
page readonly
|
||
4870000
|
unkown
|
page read and write
|
||
636000
|
unkown
|
page read and write
|
||
670F000
|
unkown
|
page read and write
|
||
762000
|
unkown
|
page read and write
|
||
653F000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
64E0000
|
unkown
|
page read and write
|
||
599D000
|
unkown
|
page readonly
|
||
3E2000
|
unkown image
|
page execute read
|
||
629000
|
unkown
|
page read and write
|
||
3E0000
|
unkown image
|
page readonly
|
||
6B5B000
|
unkown
|
page read and write
|
||
320000
|
heap private
|
page execute and read and write
|
||
62E2000
|
unkown
|
page read and write
|
||
6971000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
5C00000
|
unkown
|
page readonly
|
||
3E2000
|
unkown image
|
page execute read
|
||
5A19000
|
unkown
|
page readonly
|
||
7C0000
|
unkown
|
page readonly
|
||
617000
|
unkown
|
page read and write
|
||
6E46000
|
unkown
|
page read and write
|
||
57B2000
|
unkown
|
page readonly
|
||
5040000
|
unkown
|
page read and write
|
||
4EB0000
|
unkown
|
page read and write
|
||
6631000
|
unkown
|
page read and write
|
||
64BA000
|
unkown
|
page read and write
|
There are 603 hidden memdumps, click here to show them.