Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
IMG-11862.doc
|
Rich Text Format data, unknown version
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\IMG-11862[1].pdf
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
downloaded
|
||
C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\Public\69577.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\3oj1Gnn[1].htm
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{6894A6BA-6F93-4194-97B0-E6749671AC21}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9312A5BA-14BB-458B-BB2D-5B313121AE89}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E42C9A4D-C73B-45F3-859A-E103BFD96442}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\IMG-11862.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:14
2020, mtime=Wed Aug 26 14:08:14 2020, atime=Thu Jan 28 02:08:36 2021, length=1817663, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\WBLPQVYT.txt
|
ASCII text
|
downloaded
|
||
C:\Users\user\Desktop\~$G-11862.doc
|
data
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\Public\69577.exe
|
C:\Users\Public\69577.exe
|
||
C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
|
C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
|
||
C:\Windows\explorer.exe
|
|||
C:\Windows\SysWOW64\systray.exe
|
C:\Windows\SysWOW64\systray.exe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\SysWOW64\cmd.exe
|
/c del 'C:\Users\user\AppData\Local\Temp\AddInProcess32.exe'
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://neuromedic.com.br/cgi./IMG-11862.pdf
|
177.70.106.69
|
||
http://www.bucklandnewton.net/bsl/?NN=GgBvVf5PQIOdcMEbYgw1IQ+nD3ax/bg71NWpn/5pwbnZwl7mOlCqEE4iezeCyF4VQz1gwg==&Epu=zv50BpeHpnjp
|
208.91.197.39
|
||
http://www.theprintshop.ink/bsl/?NN=iMJGa3GxI6UtmkdzIO42CvbImt4iBZLhcRTuFhGcNs1w9EATRUa5v41vQqTOTJ8d8FsBhw==&Epu=zv50BpeHpnjp
|
35.208.61.46
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://pki.goog/gsr2/GTS1O1.crt0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
http://ocsp.pki.goog/gsr202
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
||
https://pki.goog/repository/0
|
unknown
|
||
http://treyresearch.net
|
unknown
|
||
http://auto.search.msn.com/response.asp?MT=
|
unknown
|
||
http://schema.org/WebPage
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
|
unknown
|
||
http://ocsp.pki.goog/gts1o1core0
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
http://www.msn.com/?ocid=iehp
|
unknown
|
||
http://crl.pki.goog/GTS1O1core.crl0
|
unknown
|
||
http://www.%s.com
|
unknown
|
||
http://www.piriform.com/ccleaner
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://%s.com
|
unknown
|
||
http://crl.pki.goog/gsr2/gsr2.crl0?
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
http://servername/isapibackend.dll
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
http://bit.ly/3oj1Gnn
|
67.199.248.10
|
There are 25 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.theprintshop.ink
|
35.208.61.46
|
||
www.bucklandnewton.net
|
208.91.197.39
|
||
neuromedic.com.br
|
177.70.106.69
|
||
bit.ly
|
67.199.248.10
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
35.208.61.46
|
unknown
|
United States
|
unknown
|
||
208.91.197.39
|
unknown
|
Virgin Islands (BRITISH)
|
unknown
|
||
177.70.106.69
|
unknown
|
Brazil
|
unknown
|
||
67.199.248.10
|
unknown
|
United States
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
f%5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
`&5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
8'5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EDF67
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F9260
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F9260
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
SavedLegacySettings
|
||
C:\Users\Public\69577.exe
|
EnableFileTracing
|
||
C:\Users\Public\69577.exe
|
EnableConsoleTracing
|
||
C:\Users\Public\69577.exe
|
FileTracingMask
|
||
C:\Users\Public\69577.exe
|
ConsoleTracingMask
|
||
C:\Users\Public\69577.exe
|
MaxFileSize
|
||
C:\Users\Public\69577.exe
|
FileDirectory
|
||
C:\Users\Public\69577.exe
|
EnableFileTracing
|
||
C:\Users\Public\69577.exe
|
EnableConsoleTracing
|
||
C:\Users\Public\69577.exe
|
FileTracingMask
|
||
C:\Users\Public\69577.exe
|
ConsoleTracingMask
|
||
C:\Users\Public\69577.exe
|
MaxFileSize
|
||
C:\Users\Public\69577.exe
|
FileDirectory
|
||
C:\Users\Public\69577.exe
|
Blob
|
||
C:\Users\Public\69577.exe
|
Blob
|
||
C:\Users\Public\69577.exe
|
Blob
|
||
C:\Users\Public\69577.exe
|
Blob
|
||
C:\Users\Public\69577.exe
|
Blob
|
||
C:\Users\Public\69577.exe
|
Blob
|
There are 331 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
260000
|
unkown
|
page execute and read and write
|
||
80000
|
unkown
|
page execute and read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
1B10000
|
unkown
|
page read and write
|
||
3E52000
|
unkown
|
page read and write
|
||
3CE6000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page execute and read and write
|
||
2830000
|
unkown
|
page read and write
|
||
25B5000
|
unkown
|
page read and write
|
||
2545000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
164000
|
unkown
|
page read and write
|
||
5CE2000
|
unkown
|
page readonly
|
||
500000
|
unkown
|
page read and write
|
||
1E9000
|
heap default
|
page read and write
|
||
1AF0000
|
unkown
|
page read and write
|
||
4090000
|
heap private
|
page read and write
|
||
579E000
|
stack
|
page read and write
|
||
2652000
|
unkown
|
page read and write
|
||
414D000
|
unkown
|
page read and write
|
||
BEC3000
|
heap private
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
D4000
|
heap private
|
page read and write
|
||
680000
|
unkown
|
page read and write
|
||
1F5000
|
heap default
|
page read and write
|
||
6F9000
|
unkown
|
page execute and read and write
|
||
2A20000
|
unkown
|
page readonly
|
||
47A0000
|
unkown
|
page read and write
|
||
3860000
|
unkown
|
page readonly
|
||
2E80000
|
unkown
|
page read and write
|
||
73EE000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
990000
|
unkown
|
page execute and read and write
|
||
24A0000
|
unkown
|
page read and write
|
||
1F00000
|
unkown
|
page execute and read and write
|
||
5E4A000
|
unkown
|
page readonly
|
||
2074000
|
unkown
|
page execute and read and write
|
||
2510000
|
unkown
|
page write copy
|
||
680000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2A90000
|
unkown
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
24CC000
|
unkown
|
page read and write
|
||
2070000
|
unkown
|
page readonly
|
||
2EA0000
|
unkown
|
page read and write
|
||
254B000
|
unkown
|
page read and write
|
||
2AF0000
|
unkown
|
page read and write
|
||
504E000
|
unkown
|
page read and write
|
||
603F000
|
stack
|
page read and write
|
||
2701000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
2E40000
|
unkown
|
page read and write
|
||
24B7000
|
unkown
|
page read and write
|
||
50C0000
|
unkown
|
page readonly
|
||
26BF000
|
unkown
|
page read and write
|
||
4860000
|
unkown
|
page write copy
|
||
924000
|
unkown
|
page execute and read and write
|
||
6297000
|
unkown
|
page read and write
|
||
2100000
|
unkown
|
page readonly
|
||
25F2000
|
unkown
|
page read and write
|
||
3BEE000
|
unkown
|
page read and write
|
||
24C5000
|
unkown
|
page read and write
|
||
5DF000
|
unkown
|
page read and write
|
||
82DC000
|
unkown
|
page read and write
|
||
588000
|
heap private
|
page read and write
|
||
1DF0000
|
unkown
|
page execute and read and write
|
||
26E8000
|
unkown
|
page read and write
|
||
2BC0000
|
unkown
|
page write copy
|
||
210000
|
unkown
|
page read and write
|
||
252A000
|
unkown
|
page read and write
|
||
2491000
|
unkown
|
page read and write
|
||
254D000
|
unkown
|
page read and write
|
||
265E000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
256A000
|
unkown
|
page read and write
|
||
26AE000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page readonly
|
||
2F7000
|
heap default
|
page read and write
|
||
B320000
|
unkown
|
page read and write
|
||
CDA0000
|
unkown
|
page read and write
|
||
2673000
|
unkown
|
page read and write
|
||
38A0000
|
unkown
|
page readonly
|
||
8E0F000
|
stack
|
page read and write
|
||
2503000
|
unkown
|
page read and write
|
||
82D0000
|
unkown
|
page read and write
|
||
26EE000
|
unkown
|
page read and write
|
||
DB8000
|
unkown image
|
page readonly
|
||
2E90000
|
unkown
|
page read and write
|
||
9668000
|
unkown
|
page readonly
|
||
243D000
|
unkown
|
page read and write
|
||
22FF000
|
unkown
|
page read and write
|
||
548F000
|
stack
|
page read and write
|
||
273B000
|
unkown
|
page read and write
|
||
1BE1000
|
unkown
|
page read and write
|
||
1BB0000
|
unkown
|
page readonly
|
||
25FA000
|
unkown
|
page read and write
|
||
78EE000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
26CD000
|
unkown
|
page read and write
|
||
3840000
|
unkown
|
page readonly
|
||
25F2000
|
unkown
|
page read and write
|
||
D60000
|
unkown image
|
page execute read
|
||
797000
|
unkown
|
page read and write
|
||
35C6000
|
unkown
|
page readonly
|
||
2B20000
|
unkown
|
page readonly
|
||
3F0000
|
unkown
|
page readonly
|
||
428F000
|
unkown
|
page read and write
|
||
750000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page write copy
|
||
3679000
|
unkown
|
page readonly
|
||
4FE1000
|
heap private
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
1C0E000
|
unkown
|
page read and write
|
||
625F000
|
stack
|
page read and write
|
||
E00000
|
unkown image
|
page readonly
|
||
AA7000
|
unkown
|
page execute and read and write
|
||
2590000
|
unkown
|
page read and write
|
||
3E7000
|
heap default
|
page read and write
|
||
265C000
|
unkown
|
page read and write
|
||
243F000
|
unkown
|
page read and write
|
||
C7E0000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page read and write
|
||
A3E4000
|
unkown
|
page write copy
|
||
257F000
|
unkown
|
page read and write
|
||
1BE1000
|
unkown
|
page read and write
|
||
3C59000
|
unkown
|
page read and write
|
||
179000
|
unkown
|
page read and write
|
||
1C10000
|
unkown
|
page execute and read and write
|
||
DFF000
|
stack
|
page read and write
|
||
1DD0000
|
unkown
|
page read and write
|
||
25A4000
|
unkown
|
page read and write
|
||
2626000
|
unkown
|
page read and write
|
||
495E000
|
unkown
|
page read and write
|
||
C3F000
|
unkown
|
page read and write
|
||
265C000
|
unkown
|
page read and write
|
||
3572000
|
unkown
|
page readonly
|
||
8C2A000
|
unkown
|
page readonly
|
||
26AC000
|
unkown
|
page read and write
|
||
2499000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
49FD000
|
unkown
|
page read and write
|
||
247A000
|
unkown
|
page read and write
|
||
1BD1000
|
unkown
|
page read and write
|
||
FCF000
|
stack
|
page read and write
|
||
30D000
|
unkown
|
page read and write
|
||
46E0000
|
unkown
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
44C0000
|
unkown
|
page read and write
|
||
24D8000
|
unkown
|
page read and write
|
||
2C60000
|
unkown
|
page read and write
|
||
2B80000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page execute and read and write
|
||
C0000
|
unkown
|
page read and write
|
||
9CF0000
|
unkown
|
page read and write
|
||
21A6000
|
unkown
|
page read and write
|
||
2EE000
|
unkown
|
page read and write
|
||
2536000
|
unkown
|
page read and write
|
||
2570000
|
unkown
|
page readonly
|
||
1A0000
|
heap default
|
page read and write
|
||
4ABF000
|
stack
|
page read and write
|
||
CD24000
|
unkown
|
page read and write
|
||
BAE000
|
unkown
|
page read and write
|
||
26A2000
|
unkown
|
page read and write
|
||
26C1000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
700000
|
heap private
|
page read and write
|
||
3542000
|
unkown
|
page readonly
|
||
580000
|
heap private
|
page read and write
|
||
255D000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
597E000
|
stack
|
page read and write
|
||
1D3E000
|
unkown
|
page read and write
|
||
48B0000
|
heap private
|
page read and write
|
||
253C000
|
unkown
|
page read and write
|
||
5A1E000
|
unkown
|
page read and write
|
||
2587000
|
unkown
|
page readonly
|
||
34F2000
|
unkown
|
page readonly
|
||
2EF0000
|
heap private
|
page read and write
|
||
2C90000
|
unkown
|
page read and write
|
||
3B20000
|
unkown
|
page read and write
|
||
58B6000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page read and write
|
||
253E000
|
unkown
|
page read and write
|
||
2060000
|
unkown
|
page readonly
|
||
2342000
|
heap private
|
page read and write
|
||
1B9A000
|
unkown
|
page read and write
|
||
24DA000
|
unkown
|
page read and write
|
||
2BB000
|
heap default
|
page read and write
|
||
3312000
|
unkown
|
page readonly
|
||
32A000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
80D0000
|
unkown
|
page read and write
|
||
1B0000
|
heap private
|
page read and write
|
||
2EF9000
|
heap private
|
page read and write
|
||
25F4000
|
unkown
|
page read and write
|
||
3C38000
|
unkown
|
page read and write
|
||
2E50000
|
unkown
|
page read and write
|
||
613E000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
D0000
|
heap default
|
page read and write
|
||
2EF9000
|
heap private
|
page read and write
|
||
35E5000
|
unkown
|
page readonly
|
||
33D1000
|
unkown
|
page read and write
|
||
25F2000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
6F76000
|
unkown
|
page read and write
|
||
2587000
|
unkown
|
page read and write
|
||
5B71000
|
unkown
|
page readonly
|
||
163000
|
unkown
|
page execute and read and write
|
||
69F000
|
stack
|
page read and write
|
||
4130000
|
unkown
|
page read and write
|
||
2568000
|
unkown
|
page read and write
|
||
2585000
|
unkown
|
page read and write
|
||
2710000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
E02000
|
unkown image
|
page execute read
|
||
1D50000
|
unkown
|
page read and write
|
||
BC9B000
|
unkown
|
page read and write
|
||
59E000
|
unkown
|
page read and write
|
||
2550000
|
unkown
|
page read and write
|
||
246E000
|
unkown
|
page read and write
|
||
4616000
|
unkown
|
page read and write
|
||
26F0000
|
unkown
|
page execute and read and write
|
||
25A6000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page read and write
|
||
D4000
|
heap private
|
page read and write
|
||
2910000
|
unkown
|
page execute and read and write
|
||
26EA000
|
unkown
|
page read and write
|
||
CCE0000
|
unkown
|
page read and write
|
||
319000
|
unkown
|
page read and write
|
||
2664000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page readonly
|
||
489000
|
heap default
|
page read and write
|
||
8BCD000
|
unkown
|
page readonly
|
||
2581000
|
unkown
|
page read and write
|
||
820000
|
unkown
|
page execute and read and write
|
||
6A0000
|
unkown
|
page execute and read and write
|
||
2100000
|
unkown
|
page readonly
|
||
192000
|
unkown
|
page read and write
|
||
2662000
|
unkown
|
page read and write
|
||
5B20000
|
unkown
|
page readonly
|
||
8AC2000
|
unkown
|
page readonly
|
||
30D000
|
unkown
|
page read and write
|
||
26D9000
|
unkown
|
page read and write
|
||
1BEA000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
5A20000
|
heap private
|
page read and write
|
||
2666000
|
unkown
|
page read and write
|
||
21E0000
|
unkown
|
page readonly
|
||
AB0E000
|
unkown
|
page read and write
|
||
A0F000
|
unkown
|
page read and write
|
||
1C13000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
30B000
|
unkown
|
page read and write
|
||
1BB0000
|
unkown
|
page readonly
|
||
8951000
|
unkown
|
page readonly
|
||
E02000
|
unkown image
|
page execute read
|
||
4F0000
|
unkown
|
page read and write
|
||
2520000
|
unkown
|
page readonly
|
||
270A000
|
unkown
|
page read and write
|
||
2F90000
|
unkown
|
page readonly
|
||
2BB000
|
heap default
|
page read and write
|
||
4297000
|
unkown
|
page read and write
|
||
255B000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
2559000
|
unkown
|
page read and write
|
||
68F000
|
unkown
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
2605000
|
unkown
|
page read and write
|
||
25F000
|
unkown
|
page read and write
|
||
5800000
|
heap private
|
page execute and read and write
|
||
25E8000
|
unkown
|
page read and write
|
||
1F5000
|
heap default
|
page read and write
|
||
20F0000
|
unkown
|
page execute and read and write
|
||
499D000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
39F4000
|
unkown
|
page read and write
|
||
966B000
|
unkown
|
page readonly
|
||
404000
|
heap default
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
1EF7000
|
unkown
|
page execute and read and write
|
||
1BD1000
|
unkown
|
page read and write
|
||
2A71000
|
unkown
|
page read and write
|
||
259E000
|
unkown
|
page read and write
|
||
2497000
|
unkown
|
page read and write
|
||
254F000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
46B0000
|
unkown
|
page read and write
|
||
62C5000
|
unkown
|
page readonly
|
||
3642000
|
unkown
|
page readonly
|
||
2482000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
2507000
|
unkown
|
page read and write
|
||
24E6000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
2ED0000
|
unkown
|
page readonly
|
||
4F0000
|
unkown
|
page read and write
|
||
C0000
|
unkown
|
page execute and read and write
|
||
6695000
|
unkown
|
page readonly
|
||
518D000
|
unkown
|
page read and write
|
||
2E38000
|
unkown
|
page read and write
|
||
324000
|
unkown
|
page read and write
|
||
33C1000
|
unkown
|
page read and write
|
||
968E000
|
unkown
|
page readonly
|
||
2EF0000
|
heap private
|
page read and write
|
||
4ACB000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
2060000
|
unkown
|
page execute and read and write
|
||
4BE0000
|
unkown
|
page readonly
|
||
2641000
|
unkown
|
page read and write
|
||
2B50000
|
unkown
|
page readonly
|
||
59B8000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
2489000
|
unkown
|
page read and write
|
||
2708000
|
unkown
|
page read and write
|
||
26FB000
|
unkown
|
page read and write
|
||
2A71000
|
unkown
|
page read and write
|
||
2447000
|
unkown
|
page read and write
|
||
52B0000
|
unkown
|
page read and write
|
||
2560000
|
unkown
|
page readonly
|
||
388000
|
stack
|
page read and write
|
||
6FB3000
|
heap private
|
page read and write
|
||
2478000
|
unkown
|
page read and write
|
||
569E000
|
stack
|
page read and write
|
||
2F70000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
830000
|
unkown
|
page execute and read and write
|
||
4BDD000
|
stack
|
page read and write
|
||
B2A4000
|
heap private
|
page read and write
|
||
E08000
|
unkown image
|
page readonly
|
||
25AD000
|
unkown
|
page read and write
|
||
231000
|
heap default
|
page read and write
|
||
24EB000
|
unkown
|
page read and write
|
||
2681000
|
unkown
|
page read and write
|
||
24F1000
|
unkown
|
page read and write
|
||
23E7000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page readonly
|
||
2611000
|
unkown
|
page read and write
|
||
44F000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
A330000
|
unkown
|
page write copy
|
||
A3DF000
|
unkown
|
page write copy
|
||
35F6000
|
unkown
|
page readonly
|
||
24BF000
|
unkown
|
page read and write
|
||
30C000
|
stack
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
6264000
|
unkown
|
page read and write
|
||
1DD000
|
heap default
|
page read and write
|
||
9BF0000
|
unkown
|
page read and write
|
||
3585000
|
unkown
|
page readonly
|
||
4510000
|
unkown
|
page execute and read and write
|
||
F0000
|
unkown
|
page read and write
|
||
25BB000
|
unkown
|
page read and write
|
||
77F9000
|
unkown
|
page read and write
|
||
24B4000
|
unkown
|
page read and write
|
||
CF2000
|
unkown image
|
page execute read
|
||
2EC0000
|
unkown
|
page readonly
|
||
54AD000
|
unkown
|
page read and write
|
||
680000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
710B000
|
unkown
|
page read and write
|
||
7040000
|
heap private
|
page read and write
|
||
3555000
|
unkown
|
page readonly
|
||
442E000
|
unkown
|
page read and write
|
||
2E70000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
2735000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
2E38000
|
unkown
|
page read and write
|
||
2324000
|
heap private
|
page read and write
|
||
3596000
|
unkown
|
page readonly
|
||
2AC0000
|
unkown
|
page read and write
|
||
1B80000
|
unkown
|
page read and write
|
||
2643000
|
unkown
|
page read and write
|
||
DB8000
|
unkown image
|
page readonly
|
||
2BE0000
|
unkown
|
page readonly
|
||
1BC1000
|
unkown
|
page read and write
|
||
C3E000
|
unkown
|
page read and write | page guard
|
||
2594000
|
unkown
|
page read and write
|
||
9010000
|
unkown
|
page read and write
|
||
2CA0000
|
unkown
|
page read and write
|
||
6A0000
|
heap private
|
page read and write
|
||
9475000
|
unkown
|
page readonly
|
||
38B0000
|
unkown
|
page read and write
|
||
2BC0000
|
unkown
|
page write copy
|
||
4F0000
|
unkown
|
page read and write
|
||
21C0000
|
unkown
|
page readonly
|
||
2EC000
|
unkown
|
page read and write
|
||
BEA0000
|
heap private
|
page read and write
|
||
3A0000
|
heap private
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
2650000
|
unkown
|
page read and write
|
||
2645000
|
unkown
|
page read and write
|
||
780000
|
unkown
|
page read and write
|
||
62F2000
|
unkown
|
page readonly
|
||
440000
|
heap default
|
page read and write
|
||
58AF000
|
unkown
|
page read and write
|
||
B142000
|
unkown
|
page read and write
|
||
428C000
|
unkown
|
page read and write
|
||
2BE0000
|
unkown
|
page readonly
|
||
3619000
|
unkown
|
page readonly
|
||
26D5000
|
unkown
|
page read and write
|
||
2533000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
C9E000
|
unkown
|
page read and write
|
||
231000
|
heap default
|
page read and write
|
||
CDE2000
|
unkown
|
page read and write
|
||
2080000
|
unkown
|
page execute and read and write
|
||
7B40000
|
unkown
|
page read and write
|
||
6FE000
|
unkown
|
page read and write
|
||
D0000
|
heap private
|
page read and write
|
||
4291000
|
unkown
|
page read and write
|
||
2CA0000
|
unkown
|
page read and write
|
||
24C1000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
2601000
|
unkown
|
page read and write
|
||
5AB0000
|
unkown
|
page readonly
|
||
1C70000
|
unkown
|
page read and write
|
||
C220000
|
unkown
|
page read and write
|
||
C120000
|
unkown
|
page read and write
|
||
3566000
|
unkown
|
page readonly
|
||
1D64000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page readonly
|
||
2609000
|
unkown
|
page read and write
|
||
2E60000
|
unkown
|
page readonly
|
||
2700000
|
unkown
|
page readonly
|
||
25F8000
|
unkown
|
page read and write
|
||
62CF000
|
unkown
|
page read and write
|
||
967E000
|
unkown
|
page readonly
|
||
182000
|
unkown
|
page read and write
|
||
39E0000
|
unkown
|
page read and write
|
||
926F000
|
stack
|
page read and write
|
||
271E000
|
unkown
|
page read and write
|
||
BD000
|
unkown
|
page read and write
|
||
E00000
|
unkown image
|
page readonly
|
||
600000
|
unkown
|
page read and write
|
||
2607000
|
unkown
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
270000
|
heap default
|
page read and write
|
||
CD66000
|
unkown
|
page read and write
|
||
1DD000
|
heap default
|
page read and write
|
||
24C7000
|
unkown
|
page read and write
|
||
1D0000
|
heap default
|
page read and write
|
||
3412000
|
unkown
|
page readonly
|
||
2AD000
|
heap default
|
page read and write
|
||
1BC1000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
4F7E000
|
unkown
|
page read and write
|
||
26FD000
|
unkown
|
page read and write
|
||
2587000
|
unkown
|
page readonly
|
||
85BE000
|
unkown
|
page read and write
|
||
44E0000
|
unkown
|
page read and write
|
||
1C70000
|
unkown
|
page readonly
|
||
1F80000
|
unkown
|
page execute and read and write
|
||
2520000
|
unkown
|
page readonly
|
||
26C0000
|
unkown
|
page readonly
|
||
2510000
|
unkown
|
page write copy
|
||
314000
|
heap default
|
page read and write
|
||
265C000
|
unkown
|
page read and write
|
||
5ED000
|
unkown
|
page read and write
|
||
35FD000
|
unkown
|
page readonly
|
||
710000
|
unkown
|
page readonly
|
||
23F000
|
unkown
|
page read and write
|
||
34F4000
|
unkown
|
page readonly
|
||
E08000
|
unkown image
|
page readonly
|
||
16E000
|
unkown
|
page read and write
|
||
9000000
|
heap private
|
page read and write
|
||
2380000
|
heap private
|
page execute and read and write
|
||
1B10000
|
unkown
|
page read and write
|
||
24F9000
|
unkown
|
page read and write
|
||
94CF000
|
unkown
|
page readonly
|
||
C3000
|
unkown
|
page execute and read and write
|
||
658E000
|
stack
|
page read and write
|
||
2705000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
6F6F000
|
unkown
|
page read and write
|
||
2E2E000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
25F6000
|
unkown
|
page read and write
|
||
260000
|
heap default
|
page read and write
|
||
2583000
|
unkown
|
page read and write
|
||
2551000
|
unkown
|
page read and write
|
||
4294000
|
unkown
|
page read and write
|
||
2553000
|
unkown
|
page read and write
|
||
319000
|
unkown
|
page read and write
|
||
25C1000
|
unkown
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
5980000
|
unkown
|
page read and write
|
||
61D000
|
unkown
|
page read and write
|
||
CEA3000
|
unkown
|
page read and write
|
||
26F9000
|
unkown
|
page read and write
|
||
257D000
|
unkown
|
page read and write
|
||
1D0000
|
heap default
|
page read and write
|
||
2540000
|
unkown
|
page read and write
|
||
3AEF000
|
unkown
|
page read and write
|
||
B10000
|
unkown
|
page execute and read and write
|
||
4F30000
|
unkown
|
page readonly
|
||
6360000
|
unkown
|
page read and write
|
||
16D000
|
unkown
|
page execute and read and write
|
||
2D30000
|
unkown
|
page read and write
|
||
BEA5000
|
heap private
|
page read and write
|
||
842E000
|
unkown
|
page read and write
|
||
449000
|
unkown
|
page read and write
|
||
2C80000
|
unkown
|
page read and write
|
||
9BCF000
|
unkown
|
page readonly
|
||
3B50000
|
unkown
|
page read and write
|
||
2B6000
|
heap default
|
page read and write
|
||
3649000
|
unkown
|
page readonly
|
||
2470000
|
unkown
|
page read and write
|
||
8555000
|
unkown
|
page read and write
|
||
3BEF000
|
unkown
|
page read and write
|
||
2619000
|
unkown
|
page read and write
|
||
2573000
|
unkown
|
page read and write
|
||
6A7000
|
heap private
|
page read and write
|
||
4440000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
2557000
|
unkown
|
page read and write
|
||
2443000
|
unkown
|
page read and write
|
||
260D000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
646E000
|
unkown
|
page read and write
|
||
8738000
|
unkown
|
page read and write
|
||
C320000
|
unkown
|
page read and write
|
||
CF0000
|
unkown image
|
page readonly
|
||
CF0000
|
unkown image
|
page readonly
|
||
910000
|
unkown
|
page execute and read and write
|
||
AFD000
|
unkown
|
page read and write
|
||
5230000
|
unkown
|
page read and write
|
||
35A2000
|
unkown
|
page readonly
|
||
975F000
|
unkown
|
page read and write
|
||
2C90000
|
unkown
|
page read and write
|
||
24DE000
|
unkown
|
page read and write
|
||
B08E000
|
unkown
|
page read and write
|
||
62BD000
|
unkown
|
page read and write
|
||
95FD000
|
stack
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
9B0000
|
unkown
|
page execute and read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
26E6000
|
unkown
|
page read and write
|
||
D0000
|
heap default
|
page read and write
|
||
250000
|
unkown
|
page execute and read and write
|
||
42CB000
|
unkown
|
page read and write
|
||
1AF0000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
3C40000
|
unkown
|
page readonly
|
||
44B0000
|
unkown
|
page write copy
|
||
FD0000
|
unkown
|
page readonly
|
||
20E0000
|
unkown
|
page execute and read and write
|
||
2D30000
|
unkown
|
page read and write
|
||
25A2000
|
unkown
|
page read and write
|
||
927000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
2750000
|
unkown
|
page read and write
|
||
4070000
|
unkown
|
page readonly
|
||
600000
|
unkown
|
page read and write
|
||
1EF0000
|
unkown
|
page execute and read and write
|
||
2660000
|
unkown
|
page read and write
|
||
2E70000
|
unkown
|
page read and write
|
||
5080000
|
heap private
|
page read and write
|
||
25A0000
|
unkown
|
page read and write
|
||
1B9A000
|
unkown
|
page read and write
|
||
4F0E000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
1D61000
|
unkown
|
page read and write
|
||
948D000
|
stack
|
page read and write
|
||
2658000
|
unkown
|
page read and write
|
||
6F94000
|
heap private
|
page read and write
|
||
4450000
|
unkown
|
page readonly
|
||
66EF000
|
unkown
|
page readonly
|
||
1C60000
|
unkown
|
page read and write
|
||
B150000
|
unkown
|
page read and write
|
||
2538000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
267B000
|
unkown
|
page read and write
|
||
B2C3000
|
heap private
|
page read and write
|
||
3B0000
|
unkown
|
page execute and read and write
|
||
25B9000
|
unkown
|
page read and write
|
||
2690000
|
unkown
|
page readonly
|
||
2F70000
|
unkown
|
page readonly
|
||
7A0000
|
unkown
|
page read and write
|
||
3635000
|
unkown
|
page readonly
|
||
A329000
|
unkown
|
page read and write
|
||
420000
|
heap default
|
page read and write
|
||
2596000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page execute and read and write
|
||
41AD000
|
unkown
|
page read and write
|
||
7AC0000
|
heap private
|
page read and write
|
||
8C000
|
unkown
|
page read and write
|
||
BB20000
|
unkown
|
page read and write
|
||
7150000
|
heap private
|
page read and write
|
||
5980000
|
unkown
|
page read and write
|
||
96F4000
|
unkown
|
page readonly
|
||
4F0000
|
unkown
|
page read and write
|
||
239F000
|
unkown
|
page read and write
|
||
AA4000
|
unkown
|
page execute and read and write
|
||
3C18000
|
unkown
|
page read and write
|
||
6DEF000
|
unkown
|
page readonly
|
||
2ED0000
|
unkown
|
page readonly
|
||
2677000
|
unkown
|
page read and write
|
||
2474000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page readonly
|
||
197000
|
unkown
|
page execute and read and write
|
||
47A6000
|
unkown
|
page read and write
|
||
760000
|
heap private
|
page execute and read and write
|
||
43BC000
|
unkown
|
page read and write
|
||
264C000
|
unkown
|
page read and write
|
||
2647000
|
unkown
|
page read and write
|
||
249B000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
2070000
|
unkown
|
page readonly
|
||
2534000
|
unkown
|
page read and write
|
||
31E000
|
heap default
|
page read and write
|
||
186000
|
unkown
|
page execute and read and write
|
||
CF2000
|
unkown image
|
page execute read
|
||
600000
|
unkown
|
page read and write
|
||
179000
|
unkown
|
page read and write
|
||
500000
|
unkown
|
page read and write
|
||
9768000
|
unkown
|
page readonly
|
||
600000
|
unkown
|
page read and write
|
||
18A000
|
unkown
|
page execute and read and write
|
||
4196000
|
unkown
|
page read and write
|
||
267D000
|
unkown
|
page read and write
|
||
1BF5000
|
heap private
|
page read and write
|
||
24AC000
|
unkown
|
page read and write
|
||
26B6000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page read and write
|
||
2480000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page read and write
|
||
CA0000
|
heap private
|
page read and write
|
||
32A000
|
unkown
|
page read and write
|
||
325000
|
unkown
|
page read and write
|
||
3E0000
|
heap default
|
page read and write
|
||
288F000
|
unkown
|
page read and write
|
||
270C000
|
unkown
|
page read and write
|
||
25B7000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page read and write
|
||
2A60000
|
unkown
|
page read and write
|
||
BF20000
|
unkown
|
page read and write
|
||
2CE0000
|
unkown
|
page read and write
|
||
1D70000
|
unkown
|
page read and write
|
||
447000
|
heap default
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
10000
|
heap private
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
2449000
|
unkown
|
page read and write
|
||
D60000
|
unkown image
|
page execute read
|
||
4060000
|
unkown
|
page read and write
|
||
82B0000
|
unkown
|
page read and write
|
||
26C5000
|
unkown
|
page read and write
|
||
24FF000
|
unkown
|
page read and write
|
||
794000
|
unkown
|
page read and write
|
||
60FC000
|
unkown
|
page read and write
|
||
4470000
|
unkown
|
page readonly
|
||
1E3000
|
heap default
|
page read and write
|
||
856E000
|
unkown
|
page read and write
|
||
247C000
|
unkown
|
page read and write
|
||
B14A000
|
unkown
|
page read and write
|
||
2A50000
|
unkown
|
page readonly
|
||
2B50000
|
unkown
|
page readonly
|
||
68AE000
|
unkown
|
page readonly
|
||
8ABE000
|
unkown
|
page read and write
|
||
26D0000
|
unkown
|
page readonly
|
||
2830000
|
unkown
|
page read and write
|
||
8A7E000
|
unkown
|
page read and write
|
||
253A000
|
unkown
|
page read and write
|
||
8C9D000
|
stack
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
42C000
|
heap default
|
page read and write
|
||
2549000
|
unkown
|
page read and write
|
||
262E000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
4E8000
|
unkown
|
page read and write
|
||
CF0000
|
unkown image
|
page readonly
|
||
2C2000
|
heap default
|
page read and write
|
||
10000
|
heap private
|
page read and write
|
||
B140000
|
unkown
|
page read and write
|
||
25BF000
|
unkown
|
page read and write
|
||
26B2000
|
unkown
|
page read and write
|
||
1B40000
|
unkown
|
page readonly
|
||
600000
|
unkown
|
page read and write
|
||
2740000
|
unkown
|
page read and write
|
||
24AE000
|
unkown
|
page read and write
|
||
2B30000
|
unkown
|
page readonly
|
||
25E6000
|
unkown
|
page read and write
|
||
9A0000
|
unkown
|
page execute and read and write
|
||
3AF0000
|
unkown
|
page read and write
|
||
6988000
|
unkown
|
page readonly
|
||
2690000
|
unkown
|
page readonly
|
||
BCF0000
|
heap private
|
page read and write
|
||
930000
|
unkown
|
page execute and read and write
|
||
2CC0000
|
unkown
|
page read and write
|
||
31B000
|
unkown
|
page read and write
|
||
24B0000
|
unkown
|
page write copy
|
||
C56E000
|
unkown
|
page read and write
|
||
59A0000
|
unkown
|
page read and write
|
||
6B0000
|
unkown
|
page execute and read and write
|
||
4234000
|
unkown
|
page read and write
|
||
2A60000
|
unkown
|
page read and write
|
||
1D7000
|
heap default
|
page read and write
|
||
9F79000
|
unkown
|
page read and write
|
||
70FE000
|
unkown
|
page read and write
|
||
24B0000
|
unkown
|
page write copy
|
||
4F0000
|
unkown
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
2AB4000
|
unkown
|
page read and write
|
||
2532000
|
unkown
|
page read and write
|
||
2B40000
|
unkown
|
page readonly
|
||
B20000
|
unkown
|
page execute and read and write
|
||
28F3000
|
unkown
|
page read and write
|
||
8644000
|
unkown
|
page read and write
|
||
24F7000
|
unkown
|
page read and write
|
||
26C3000
|
unkown
|
page read and write
|
||
259A000
|
unkown
|
page read and write
|
||
2AC0000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
2BB000
|
heap default
|
page read and write
|
||
2320000
|
heap private
|
page read and write
|
||
1B5A000
|
unkown
|
page read and write
|
||
2476000
|
unkown
|
page read and write
|
||
35D2000
|
unkown
|
page readonly
|
||
2718000
|
unkown
|
page read and write
|
||
25FC000
|
unkown
|
page read and write
|
||
2493000
|
unkown
|
page read and write
|
||
AAF0000
|
unkown
|
page read and write
|
||
34D2000
|
unkown
|
page readonly
|
||
180000
|
unkown
|
page write copy
|
||
3E27000
|
unkown
|
page readonly
|
||
52AE000
|
stack
|
page read and write
|
||
2630000
|
unkown
|
page read and write
|
||
1D8E000
|
unkown
|
page read and write
|
||
273D000
|
unkown
|
page read and write
|
||
2CF0000
|
unkown
|
page read and write
|
||
C610000
|
unkown
|
page read and write
|
||
3612000
|
unkown
|
page readonly
|
||
6A0000
|
unkown
|
page read and write
|
||
7410000
|
heap private
|
page read and write
|
||
4B50000
|
unkown
|
page readonly
|
||
30B000
|
unkown
|
page read and write
|
||
25D000
|
heap default
|
page read and write
|
||
464000
|
heap default
|
page read and write
|
||
587E000
|
unkown
|
page read and write
|
||
6276000
|
unkown
|
page read and write
|
||
3940000
|
unkown
|
page read and write
|
||
62C3000
|
unkown
|
page read and write
|
||
272D000
|
unkown
|
page read and write
|
||
582B000
|
unkown
|
page read and write
|
||
41DB000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page readonly
|
||
23F1000
|
unkown
|
page read and write
|
||
2E40000
|
unkown
|
page read and write
|
||
2C2000
|
heap default
|
page read and write
|
||
8666000
|
unkown
|
page read and write
|
||
791000
|
unkown
|
page read and write
|
||
24E2000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
2675000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
46B8000
|
unkown
|
page read and write
|
||
2669000
|
unkown
|
page read and write
|
||
CE23000
|
unkown
|
page read and write
|
||
21E0000
|
unkown
|
page readonly
|
||
7A0000
|
unkown
|
page readonly
|
||
B148000
|
unkown
|
page read and write
|
||
271C000
|
unkown
|
page read and write
|
||
6060000
|
heap private
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
25A0000
|
unkown
|
page readonly
|
||
6F90000
|
heap private
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
19B000
|
unkown
|
page execute and read and write
|
||
27F000
|
unkown
|
page read and write
|
||
2666000
|
unkown
|
page read and write
|
||
641E000
|
unkown
|
page read and write | page guard
|
||
2100000
|
unkown
|
page execute and read and write
|
||
25F0000
|
unkown
|
page read and write
|
||
260000
|
heap default
|
page read and write
|
||
26B0000
|
unkown
|
page readonly
|
||
76C0000
|
heap private
|
page read and write
|
||
4B4E000
|
unkown
|
page read and write
|
||
627E000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
24DC000
|
unkown
|
page read and write
|
||
2445000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
680000
|
unkown
|
page read and write
|
||
CCA2000
|
unkown
|
page read and write
|
||
C6E0000
|
unkown
|
page read and write
|
||
248F000
|
unkown
|
page read and write
|
||
A3E9000
|
unkown
|
page write copy
|
||
2F0000
|
heap default
|
page read and write
|
||
20FF000
|
unkown
|
page read and write
|
||
3665000
|
unkown
|
page readonly
|
||
277000
|
heap default
|
page read and write
|
||
4610000
|
unkown
|
page read and write
|
||
2C80000
|
unkown
|
page read and write
|
||
258A000
|
unkown
|
page read and write
|
||
3695000
|
unkown
|
page readonly
|
||
86B0000
|
unkown
|
page read and write
|
||
2EC0000
|
unkown
|
page readonly
|
||
1DCF000
|
unkown
|
page read and write
|
||
2710000
|
unkown
|
page readonly
|
||
740000
|
unkown
|
page read and write
|
||
2613000
|
unkown
|
page read and write
|
||
A5B7000
|
unkown
|
page read and write
|
||
C8E0000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page read and write
|
||
26BA000
|
unkown
|
page read and write
|
||
2077000
|
unkown
|
page execute and read and write
|
||
888E000
|
unkown
|
page read and write
|
||
3672000
|
unkown
|
page readonly
|
||
24E8000
|
unkown
|
page read and write
|
||
1B40000
|
unkown
|
page readonly
|
||
2DBF000
|
unkown
|
page read and write
|
||
5680000
|
heap private
|
page read and write
|
||
263B000
|
unkown
|
page read and write
|
||
A53E000
|
unkown
|
page read and write
|
||
2441000
|
unkown
|
page read and write
|
||
3512000
|
unkown
|
page readonly
|
||
2D20000
|
unkown
|
page execute read
|
||
260000
|
unkown
|
page read and write
|
||
2E50000
|
unkown
|
page read and write
|
||
258C000
|
unkown
|
page read and write
|
||
8890000
|
unkown
|
page readonly
|
||
39F0000
|
unkown
|
page read and write
|
||
2060000
|
unkown
|
page readonly
|
||
1D67000
|
unkown
|
page read and write
|
||
E00000
|
unkown image
|
page readonly
|
||
247E000
|
unkown
|
page read and write
|
||
C6D9000
|
unkown
|
page read and write
|
||
8398000
|
unkown
|
page read and write
|
||
5490000
|
unkown
|
page read and write
|
||
6914000
|
unkown
|
page readonly
|
||
2A80000
|
unkown
|
page read and write
|
||
2A50000
|
unkown
|
page readonly
|
||
260B000
|
unkown
|
page read and write
|
||
596F000
|
unkown
|
page read and write
|
||
2617000
|
unkown
|
page read and write
|
||
8FEE000
|
stack
|
page read and write
|
||
1F70000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page read and write
|
||
6888000
|
unkown
|
page readonly
|
||
3802000
|
unkown
|
page readonly
|
||
690000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
4500000
|
unkown
|
page readonly
|
||
3880000
|
unkown
|
page readonly
|
||
2B40000
|
unkown
|
page readonly
|
||
2505000
|
unkown
|
page read and write
|
||
861C000
|
unkown
|
page read and write
|
||
1E00000
|
unkown
|
page execute and read and write
|
||
259C000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
3514000
|
unkown
|
page readonly
|
||
26B0000
|
unkown
|
page readonly
|
||
26F0000
|
unkown
|
page readonly
|
||
2EE0000
|
unkown
|
page readonly
|
||
263D000
|
unkown
|
page read and write
|
||
23C1000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page readonly
|
||
597A000
|
unkown
|
page read and write
|
||
4263000
|
unkown
|
page read and write
|
||
6260000
|
unkown
|
page read and write
|
||
24D4000
|
unkown
|
page read and write
|
||
2D20000
|
unkown
|
page execute read
|
||
AB0000
|
unkown
|
page execute and read and write
|
||
2724000
|
unkown
|
page read and write
|
||
25FE000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
4520000
|
unkown
|
page readonly
|
||
2B20000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page readonly
|
||
272F000
|
unkown
|
page read and write
|
||
7AB5000
|
heap private
|
page read and write
|
||
1FC000
|
unkown
|
page read and write
|
||
44E000
|
unkown
|
page read and write
|
||
2649000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
D0000
|
heap private
|
page read and write
|
||
2F90000
|
unkown
|
page readonly
|
||
1C13000
|
heap private
|
page read and write
|
||
2733000
|
unkown
|
page read and write
|
||
47A000
|
heap default
|
page read and write
|
||
4FD0000
|
heap private
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
550000
|
unkown
|
page readonly
|
||
7490000
|
unkown
|
page write copy
|
||
14B000
|
unkown
|
page read and write
|
||
2CF0000
|
unkown
|
page read and write
|
||
2402000
|
unkown
|
page read and write
|
||
4026000
|
unkown
|
page read and write
|
||
90D2000
|
unkown
|
page readonly
|
||
448E000
|
unkown
|
page read and write
|
||
1EE0000
|
unkown
|
page execute and read and write
|
||
4051000
|
unkown
|
page read and write
|
||
2679000
|
unkown
|
page read and write
|
||
324000
|
unkown
|
page read and write
|
||
1B5A000
|
unkown
|
page read and write
|
||
2570000
|
unkown
|
page readonly
|
||
26D3000
|
unkown
|
page read and write
|
||
3C10000
|
unkown
|
page read and write
|
||
2834000
|
unkown
|
page execute and read and write
|
||
393E000
|
unkown
|
page read and write
|
||
26C0000
|
unkown
|
page readonly
|
||
20FF000
|
unkown
|
page read and write
|
||
24D0000
|
unkown
|
page read and write
|
||
419A000
|
unkown
|
page read and write
|
||
2CB0000
|
unkown
|
page read and write
|
||
2A90000
|
unkown
|
page read and write
|
||
2CB0000
|
unkown
|
page read and write
|
||
72F0000
|
heap private
|
page read and write
|
||
1E3000
|
heap default
|
page read and write
|
||
26F0000
|
unkown
|
page readonly
|
||
975E000
|
unkown
|
page read and write | page guard
|
||
2AB4000
|
unkown
|
page read and write
|
||
262C000
|
unkown
|
page read and write
|
||
23FE000
|
unkown
|
page read and write
|
||
2550000
|
unkown
|
page read and write
|
||
24E0000
|
unkown
|
page read and write
|
||
42A000
|
heap default
|
page read and write
|
||
1C70000
|
unkown
|
page readonly
|
||
3A6000
|
unkown
|
page read and write
|
||
CE60000
|
unkown
|
page read and write
|
||
33CD000
|
unkown
|
page read and write
|
||
BD70000
|
unkown
|
page read and write
|
||
2700000
|
unkown
|
page readonly
|
||
43D0000
|
unkown
|
page write copy
|
||
2B80000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
17D000
|
unkown
|
page execute and read and write
|
||
24C9000
|
unkown
|
page read and write
|
||
2EB0000
|
unkown
|
page read and write
|
||
48D000
|
heap default
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
5B1E000
|
stack
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
2A80000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
5829000
|
unkown
|
page read and write
|
||
62C3000
|
unkown
|
page read and write
|
||
726D000
|
unkown
|
page read and write
|
||
2AF0000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
26FF000
|
unkown
|
page read and write
|
||
A3DA000
|
unkown
|
page write copy
|
||
690000
|
unkown
|
page read and write
|
||
39EB000
|
unkown
|
page read and write
|
||
252C000
|
unkown
|
page read and write
|
||
2495000
|
unkown
|
page read and write
|
||
26D1000
|
unkown
|
page read and write
|
||
4226000
|
unkown
|
page read and write
|
||
2555000
|
unkown
|
page read and write
|
||
2615000
|
unkown
|
page read and write
|
||
4110000
|
unkown
|
page read and write
|
||
1E9000
|
heap default
|
page read and write
|
||
1BF5000
|
heap private
|
page read and write
|
||
261B000
|
unkown
|
page read and write
|
||
77F0000
|
unkown
|
page read and write
|
||
1BED000
|
unkown
|
page read and write
|
||
25A0000
|
unkown
|
page readonly
|
||
4590000
|
unkown
|
page readonly
|
||
179000
|
unkown
|
page read and write
|
||
61A000
|
unkown
|
page read and write
|
||
2B30000
|
unkown
|
page readonly
|
||
2071000
|
unkown
|
page execute and read and write
|
||
2CE0000
|
unkown
|
page read and write
|
||
6291000
|
unkown
|
page read and write
|
||
25D000
|
heap default
|
page read and write
|
||
2656000
|
unkown
|
page read and write
|
||
2710000
|
unkown
|
page readonly
|
||
2666000
|
unkown
|
page read and write
|
||
1BF0000
|
heap private
|
page read and write
|
||
4253000
|
unkown
|
page read and write
|
||
7AB0000
|
heap private
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
2703000
|
unkown
|
page read and write
|
||
2501000
|
unkown
|
page read and write
|
||
688B000
|
unkown
|
page readonly
|
||
B2A0000
|
heap private
|
page read and write
|
||
271A000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
263F000
|
unkown
|
page read and write
|
||
480A000
|
heap private
|
page read and write
|
||
80C9000
|
unkown
|
page read and write
|
||
33C7000
|
unkown
|
page read and write
|
||
82FD000
|
unkown
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
2540000
|
unkown
|
page read and write
|
||
AA1000
|
unkown
|
page execute and read and write
|
||
1EF4000
|
unkown
|
page execute and read and write
|
||
A90000
|
unkown
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
24FD000
|
unkown
|
page read and write
|
||
1F60000
|
unkown
|
page execute and read and write
|
||
67E000
|
unkown
|
page read and write
|
||
C61B000
|
unkown
|
page read and write
|
||
689E000
|
unkown
|
page readonly
|
||
1B4000
|
heap private
|
page read and write
|
||
24E4000
|
unkown
|
page read and write
|
||
24FB000
|
unkown
|
page read and write
|
||
A3BE000
|
unkown
|
page write copy
|
||
A3B9000
|
unkown
|
page write copy
|
||
25BD000
|
unkown
|
page read and write
|
||
248D000
|
unkown
|
page read and write
|
||
2570000
|
unkown
|
page read and write
|
||
1B80000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
28F3000
|
unkown
|
page read and write
|
||
2722000
|
unkown
|
page read and write
|
||
26D0000
|
unkown
|
page readonly
|
||
26E0000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
25A8000
|
unkown
|
page read and write
|
||
26CF000
|
unkown
|
page read and write
|
||
4530000
|
heap private
|
page read and write
|
||
854C000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
36E000
|
unkown
|
page read and write
|
||
579E000
|
unkown
|
page read and write
|
||
25AA000
|
unkown
|
page read and write
|
||
2A20000
|
unkown
|
page readonly
|
||
2DBF000
|
unkown
|
page read and write
|
||
641F000
|
unkown
|
page read and write
|
||
4460000
|
unkown
|
page read and write
|
||
800000
|
unkown
|
page read and write
|
||
26D7000
|
unkown
|
page read and write
|
||
24C3000
|
unkown
|
page read and write
|
||
5DED000
|
unkown
|
page readonly
|
||
2533000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
2CD0000
|
unkown
|
page write copy
|
||
2EFE000
|
heap private
|
page read and write
|
||
2737000
|
unkown
|
page read and write
|
||
C020000
|
unkown
|
page read and write
|
||
2EF5000
|
heap private
|
page read and write
|
||
1BF0000
|
heap private
|
page read and write
|
||
2969000
|
unkown
|
page execute and read and write
|
||
4800000
|
heap private
|
page read and write
|
||
2EF5000
|
heap private
|
page read and write
|
||
35B5000
|
unkown
|
page readonly
|
||
8471000
|
unkown
|
page read and write
|
||
2EE0000
|
unkown
|
page readonly
|
||
2EE000
|
unkown
|
page read and write
|
||
B3E000
|
unkown
|
page read and write
|
||
3318000
|
unkown
|
page readonly
|
||
2EB0000
|
unkown
|
page read and write
|
||
90A5000
|
unkown
|
page readonly
|
||
210000
|
unkown
|
page read and write
|
||
260F000
|
unkown
|
page read and write
|
||
265A000
|
unkown
|
page read and write
|
||
34D4000
|
unkown
|
page readonly
|
||
26B8000
|
unkown
|
page read and write
|
||
2E60000
|
unkown
|
page readonly
|
||
26B4000
|
unkown
|
page read and write
|
||
2540000
|
unkown
|
page read and write
|
||
2CC0000
|
unkown
|
page read and write
|
||
1D7000
|
heap default
|
page read and write
|
||
2EFE000
|
heap private
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
2900000
|
unkown
|
page read and write
|
||
2CD0000
|
unkown
|
page write copy
|
||
2E2E000
|
unkown
|
page read and write
|
||
305F000
|
unkown
|
page read and write
|
||
35F9000
|
unkown
|
page readonly
|
||
210000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
There are 1065 hidden memdumps, click here to show them.