Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Statement.doc
|
Rich Text Format data, unknown version
|
initial sample
|
||
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp6D54.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\JNM.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\68A17DB9.wmf
|
Targa image data - Map - RLE 65536 x 65536 x 0 "\005"
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{08186652-BACB-4000-A55F-0BCBA7498F21}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{55454834-8E09-401E-A760-1A1C7B299BE3}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp5A32.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\task.dat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Statement.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15
2020, mtime=Wed Aug 26 14:08:15 2020, atime=Thu Jan 28 02:12:38 2021, length=111234, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$atement.doc
|
data
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\user\AppData\Roaming\JNM.exe
|
C:\Users\user\AppData\Roaming\JNM.exe
|
||
C:\Users\user\AppData\Roaming\JNM.exe
|
C:\Users\user\AppData\Roaming\JNM.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp6D54.tmp'
|
||
C:\Windows\SysWOW64\schtasks.exe
|
'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5A32.tmp'
|
||
C:\Users\user\AppData\Roaming\JNM.exe
|
C:\Users\user\AppData\Roaming\JNM.exe 0
|
||
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0
|
||
C:\Users\user\AppData\Roaming\JNM.exe
|
C:\Users\user\AppData\Roaming\JNM.exe
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\SysWOW64\cmd.exe
|
'C:\Windows\System32\cmd.exe' /c timeout 1
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout 1
|
||
C:\Windows\System32\taskeng.exe
|
taskeng.exe {C7405FE6-0EEB-43B9-A9C9-0A01615FAA8D} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
|
||
C:\Windows\SysWOW64\cmd.exe
|
'C:\Windows\System32\cmd.exe' /c timeout 1
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout 1
|
||
C:\Windows\SysWOW64\cmd.exe
|
'C:\Windows\System32\cmd.exe' /c timeout 1
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout 1
|
There are 8 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://manojvashanava234.sytes.net/WAH.exe
|
84.38.135.158
|
||
http://www.%s.comPA
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu
|
46.243.219.32
|
||
manojvashanava234.sytes.net
|
84.38.135.158
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
84.38.135.158
|
unknown
|
Latvia
|
unknown
|
||
46.243.219.32
|
unknown
|
Netherlands
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
{j7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
#k7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
*m7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EE003
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F40B8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductNonBootFilesIntl_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F40B8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F40B8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F40B8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductNonBootFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Users\user\AppData\Roaming\JNM.exe
|
SMTP Service
|
||
C:\Windows\System32\taskeng.exe
|
data
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
There are 357 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
unkown
|
page execute and read and write
|
||
38C4000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
5389000
|
unkown
|
page read and write
|
||
2501000
|
unkown
|
page read and write
|
||
22E1000
|
unkown
|
page read and write
|
||
5059000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
3549000
|
unkown
|
page read and write
|
||
630000
|
unkown
|
page read and write
|
||
32E9000
|
unkown
|
page read and write
|
||
3549000
|
unkown
|
page read and write
|
||
2541000
|
unkown
|
page read and write
|
||
560000
|
heap private
|
page read and write
|
||
490000
|
heap private
|
page execute and read and write
|
||
460000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
920000
|
unkown
|
page read and write
|
||
480000
|
unkown
|
page read and write
|
||
23EE000
|
unkown
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
510000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
1EF000
|
unkown
|
page read and write
|
||
52CE000
|
unkown
|
page read and write
|
||
BF0000
|
heap private
|
page execute and read and write
|
||
920000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page read and write
|
||
4D6000
|
heap default
|
page read and write
|
||
153000
|
unkown
|
page execute and read and write
|
||
54F000
|
unkown
|
page read and write
|
||
ED0000
|
unkown
|
page readonly
|
||
465000
|
unkown
|
page read and write
|
||
50C1000
|
unkown
|
page read and write
|
||
15D000
|
unkown
|
page execute and read and write
|
||
A60000
|
unkown
|
page readonly
|
||
C9E000
|
unkown
|
page read and write
|
||
630000
|
unkown
|
page read and write
|
||
CE0000
|
unkown image
|
page readonly
|
||
4B0000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
68B0000
|
unkown
|
page read and write
|
||
4ADF000
|
stack
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
CE0000
|
unkown image
|
page readonly
|
||
3411000
|
unkown
|
page read and write
|
||
4B0000
|
unkown
|
page write copy
|
||
3F0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page execute and read and write
|
||
253E000
|
unkown
|
page read and write | page guard
|
||
1EB000
|
unkown
|
page read and write
|
||
150000
|
unkown image
|
page readonly
|
||
435E000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page readonly
|
||
52AB000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
475000
|
unkown
|
page read and write
|
||
980000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
42C4000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
2980000
|
unkown
|
page readonly
|
||
4C0000
|
unkown
|
page read and write
|
||
A20000
|
unkown
|
page read and write
|
||
1E5000
|
unkown
|
page read and write
|
||
273000
|
unkown
|
page execute and read and write
|
||
1EC000
|
unkown
|
page read and write
|
||
9D0000
|
heap default
|
page read and write
|
||
4006000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page read and write
|
||
27D000
|
unkown
|
page execute and read and write
|
||
4066000
|
unkown
|
page read and write
|
||
500000
|
unkown
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
CE2000
|
unkown image
|
page execute read
|
||
1E2000
|
heap default
|
page read and write
|
||
3A0000
|
heap default
|
page read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
20000
|
heap private
|
page read and write
|
||
640000
|
unkown
|
page read and write
|
||
49BE000
|
unkown
|
page read and write
|
||
766000
|
unkown
|
page read and write
|
||
5E8000
|
unkown
|
page read and write
|
||
AB0000
|
unkown
|
page readonly
|
||
43E000
|
heap default
|
page read and write
|
||
1110000
|
heap private
|
page read and write
|
||
656000
|
unkown
|
page read and write
|
||
217000
|
heap private
|
page read and write
|
||
4B6000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
4F5E000
|
unkown
|
page read and write
|
||
3726000
|
unkown
|
page read and write
|
||
980000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page execute and read and write
|
||
443000
|
heap default
|
page read and write
|
||
4126000
|
unkown
|
page read and write
|
||
5E5000
|
heap private
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
2E0000
|
heap default
|
page read and write
|
||
17D000
|
stack
|
page read and write
|
||
597000
|
heap default
|
page read and write
|
||
22DE000
|
unkown
|
page read and write | page guard
|
||
650000
|
unkown
|
page read and write
|
||
2A6F000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
55F000
|
unkown
|
page read and write
|
||
740000
|
heap private
|
page read and write
|
||
817000
|
unkown
|
page execute and read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
204B000
|
heap private
|
page read and write
|
||
9B7000
|
unkown
|
page readonly
|
||
980000
|
unkown
|
page read and write
|
||
274000
|
unkown
|
page read and write
|
||
450000
|
heap private
|
page execute and read and write
|
||
2850000
|
heap private
|
page read and write
|
||
640000
|
unkown
|
page read and write
|
||
288B000
|
heap private
|
page read and write
|
||
A00000
|
unkown
|
page readonly
|
||
527000
|
heap default
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
519000
|
heap default
|
page read and write
|
||
2712000
|
unkown
|
page read and write
|
||
766000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
95F000
|
unkown
|
page read and write
|
||
210000
|
heap private
|
page read and write
|
||
BD5000
|
heap private
|
page read and write
|
||
699D000
|
unkown
|
page read and write
|
||
CE2000
|
unkown image
|
page execute read
|
||
625E000
|
unkown
|
page read and write
|
||
740000
|
heap private
|
page execute and read and write
|
||
5410000
|
heap private
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
4EE000
|
unkown
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1B0000
|
heap private
|
page read and write
|
||
444000
|
heap default
|
page read and write
|
||
960000
|
unkown
|
page read and write
|
||
6BD0000
|
unkown
|
page read and write
|
||
57E000
|
unkown
|
page read and write
|
||
1ED000
|
unkown
|
page read and write
|
||
C2000
|
unkown
|
page read and write
|
||
611E000
|
stack
|
page read and write
|
||
603E000
|
unkown
|
page read and write
|
||
517F000
|
unkown
|
page read and write
|
||
152000
|
unkown image
|
page execute read
|
||
CCE000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
69B0000
|
unkown
|
page read and write
|
||
CE0000
|
unkown image
|
page readonly
|
||
5C0000
|
unkown
|
page read and write
|
||
150000
|
unkown image
|
page readonly
|
||
8E0000
|
unkown
|
page read and write
|
||
910000
|
unkown
|
page read and write
|
||
420000
|
heap default
|
page read and write
|
||
A60000
|
heap private
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
120000
|
heap private
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
750000
|
unkown
|
page write copy
|
||
4D0000
|
unkown
|
page read and write
|
||
350000
|
heap private
|
page execute and read and write
|
||
39B000
|
heap default
|
page read and write
|
||
31A000
|
unkown
|
page execute and read and write
|
||
540000
|
unkown
|
page readonly
|
||
4E0000
|
unkown
|
page read and write
|
||
197000
|
unkown
|
page execute and read and write
|
||
920000
|
unkown
|
page read and write
|
||
4630000
|
unkown
|
page readonly
|
||
4F2000
|
heap private
|
page read and write
|
||
658000
|
unkown
|
page read and write
|
||
230000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
70000
|
unkown
|
page read and write
|
||
42F000
|
heap default
|
page read and write
|
||
4C8000
|
unkown
|
page read and write
|
||
922000
|
unkown
|
page read and write
|
||
236F000
|
unkown
|
page read and write
|
||
440000
|
heap default
|
page read and write
|
||
25C000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
4F91000
|
unkown
|
page read and write
|
||
3541000
|
unkown
|
page read and write
|
||
187000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page read and write
|
||
9F0000
|
heap private
|
page execute and read and write
|
||
619C000
|
unkown
|
page read and write
|
||
1F5000
|
unkown
|
page read and write
|
||
3D81000
|
unkown
|
page read and write
|
||
617000
|
heap default
|
page read and write
|
||
4D0000
|
heap private
|
page read and write
|
||
5BE000
|
unkown
|
page read and write
|
||
3C7000
|
heap default
|
page read and write
|
||
CA000
|
unkown
|
page execute and read and write
|
||
5F0E000
|
unkown
|
page read and write
|
||
538000
|
stack
|
page read and write
|
||
5C6000
|
stack
|
page read and write
|
||
384C000
|
unkown
|
page read and write
|
||
457000
|
unkown
|
page read and write
|
||
4930000
|
unkown
|
page readonly
|
||
8E0000
|
unkown
|
page read and write
|
||
A7000
|
heap private
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
820000
|
heap private
|
page read and write
|
||
6040000
|
heap private
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
150000
|
unkown image
|
page readonly
|
||
6A0000
|
unkown
|
page read and write
|
||
1BD000
|
heap default
|
page read and write
|
||
6230000
|
heap private
|
page read and write
|
||
83F000
|
unkown
|
page execute and read and write
|
||
214C000
|
unkown
|
page read and write
|
||
6270000
|
heap private
|
page execute and read and write
|
||
19D000
|
stack
|
page read and write
|
||
4800000
|
unkown
|
page readonly
|
||
6234000
|
heap private
|
page read and write
|
||
4E50000
|
unkown
|
page readonly
|
||
657000
|
unkown
|
page read and write
|
||
890000
|
unkown
|
page read and write
|
||
2010000
|
heap private
|
page read and write
|
||
CE0000
|
unkown image
|
page readonly
|
||
4C0000
|
unkown
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
18C000
|
unkown
|
page read and write
|
||
787000
|
heap default
|
page read and write
|
||
50C2000
|
unkown
|
page read and write
|
||
29E000
|
unkown
|
page read and write
|
||
1E8000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
4F92000
|
unkown
|
page read and write
|
||
4BD2000
|
heap private
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
A29000
|
unkown
|
page read and write
|
||
49EF000
|
unkown
|
page read and write
|
||
6F00000
|
unkown
|
page read and write
|
||
373000
|
heap default
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
4FA000
|
heap default
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
650000
|
unkown
|
page read and write
|
||
630000
|
unkown
|
page read and write
|
||
22D0000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
464000
|
heap default
|
page read and write
|
||
23C000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
140000
|
unkown
|
page write copy
|
||
17A000
|
unkown
|
page execute and read and write
|
||
140000
|
unkown
|
page read and write
|
||
6B00000
|
unkown
|
page read and write
|
||
844000
|
unkown
|
page execute and read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
180000
|
heap default
|
page read and write
|
||
100000
|
unkown
|
page write copy
|
||
4CAE000
|
unkown
|
page read and write
|
||
768000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
8C4000
|
heap default
|
page read and write
|
||
100000
|
unkown
|
page write copy
|
||
B0000
|
unkown
|
page readonly
|
||
1C8000
|
heap default
|
page read and write
|
||
ED0000
|
unkown
|
page readonly
|
||
640000
|
unkown
|
page read and write
|
||
4D0000
|
heap private
|
page execute and read and write
|
||
32C000
|
heap default
|
page read and write
|
||
5F8000
|
unkown
|
page read and write
|
||
37E5000
|
unkown
|
page read and write
|
||
304000
|
heap default
|
page read and write
|
||
46C000
|
heap default
|
page read and write
|
||
B20000
|
unkown
|
page read and write
|
||
28D000
|
unkown
|
page execute and read and write
|
||
CE0000
|
unkown image
|
page readonly
|
||
1FC000
|
unkown
|
page read and write
|
||
20B000
|
unkown
|
page execute and read and write
|
||
C60000
|
heap private
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
5B0000
|
unkown
|
page read and write
|
||
3B7000
|
unkown
|
page execute and read and write
|
||
25C000
|
unkown
|
page read and write
|
||
BB000
|
unkown
|
page read and write
|
||
21DF000
|
unkown
|
page read and write
|
||
22DF000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
B40000
|
unkown
|
page read and write
|
||
215F000
|
unkown
|
page read and write
|
||
24D000
|
stack
|
page read and write
|
||
6ED000
|
unkown
|
page read and write
|
||
625000
|
unkown
|
page read and write
|
||
6E0000
|
heap private
|
page read and write
|
||
3666000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
208000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page execute and read and write
|
||
4C6000
|
unkown
|
page read and write
|
||
601000
|
heap default
|
page read and write
|
||
201000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
5FB000
|
heap default
|
page read and write
|
||
207000
|
unkown
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2B62000
|
unkown
|
page read and write
|
||
930000
|
unkown
|
page readonly
|
||
1FC000
|
unkown
|
page read and write
|
||
70000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
64C0000
|
unkown
|
page readonly
|
||
4B0000
|
unkown
|
page read and write
|
||
2310000
|
unkown
|
page readonly
|
||
539C000
|
unkown
|
page read and write
|
||
2350000
|
heap private
|
page execute and read and write
|
||
540000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
344000
|
unkown
|
page read and write
|
||
4DE0000
|
unkown
|
page readonly
|
||
12A000
|
unkown
|
page read and write
|
||
240000
|
heap private
|
page read and write
|
||
2E7000
|
heap default
|
page read and write
|
||
19D000
|
unkown
|
page execute and read and write
|
||
9B0000
|
unkown
|
page readonly
|
||
5F92000
|
heap private
|
page read and write
|
||
CE2000
|
unkown image
|
page execute read
|
||
650000
|
unkown
|
page read and write
|
||
CE2000
|
unkown image
|
page execute read
|
||
4800000
|
unkown
|
page readonly
|
||
4AB0000
|
unkown
|
page readonly
|
||
A3000
|
unkown
|
page execute and read and write
|
||
187000
|
heap default
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
4660000
|
unkown
|
page read and write
|
||
230E000
|
unkown
|
page read and write
|
||
2855000
|
heap private
|
page read and write
|
||
4A0000
|
unkown
|
page write copy
|
||
5D0000
|
heap private
|
page read and write
|
||
5C7000
|
heap private
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
298000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
B17000
|
heap private
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page read and write
|
||
7A4000
|
heap default
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
9A0000
|
unkown
|
page readonly
|
||
3E8000
|
unkown
|
page read and write
|
||
AD000
|
unkown
|
page execute and read and write
|
||
32B000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page read and write
|
||
5EA000
|
unkown
|
page read and write
|
||
4006000
|
unkown
|
page read and write
|
||
5AD000
|
heap default
|
page read and write
|
||
9AE000
|
unkown
|
page read and write
|
||
C4F000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
1FA000
|
unkown
|
page execute and read and write
|
||
6252000
|
heap private
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
493F000
|
unkown
|
page read and write
|
||
1BE0000
|
unkown
|
page readonly
|
||
130000
|
unkown
|
page read and write
|
||
4470000
|
unkown
|
page readonly
|
||
4DDF000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
3BB000
|
unkown
|
page execute and read and write
|
||
5AD000
|
unkown
|
page read and write
|
||
849000
|
unkown
|
page execute and read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
374000
|
heap private
|
page read and write
|
||
4B20000
|
unkown
|
page readonly
|
||
422000
|
unkown
|
page execute and read and write
|
||
382A000
|
unkown
|
page read and write
|
||
2AB000
|
unkown
|
page execute and read and write
|
||
5F90000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
637C000
|
unkown
|
page read and write
|
||
4C00000
|
unkown
|
page readonly
|
||
8EC000
|
heap default
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
613C000
|
unkown
|
page read and write
|
||
300000
|
heap default
|
page read and write
|
||
6B00000
|
unkown
|
page read and write
|
||
3666000
|
unkown
|
page read and write
|
||
10C000
|
unkown
|
page read and write
|
||
CE0000
|
unkown image
|
page readonly
|
||
530000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page read and write
|
||
930000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
4530000
|
unkown
|
page readonly
|
||
8E0000
|
unkown
|
page read and write
|
||
8E5000
|
unkown
|
page read and write
|
||
3A7000
|
unkown
|
page execute and read and write
|
||
810000
|
unkown
|
page readonly
|
||
25D8000
|
unkown
|
page read and write
|
||
4C72000
|
heap private
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
B6D000
|
unkown
|
page read and write
|
||
6420000
|
unkown
|
page readonly
|
||
2020000
|
unkown
|
page readonly
|
||
B70000
|
heap private
|
page execute and read and write
|
||
970000
|
unkown
|
page readonly
|
||
4B0000
|
unkown
|
page readonly
|
||
ED0000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page execute and read and write
|
||
700000
|
unkown
|
page readonly
|
||
150000
|
unkown image
|
page readonly
|
||
B10000
|
heap private
|
page read and write
|
||
296000
|
unkown
|
page read and write
|
||
50C1000
|
unkown
|
page read and write
|
||
A30000
|
unkown
|
page readonly
|
||
152000
|
unkown image
|
page execute read
|
||
2471000
|
unkown
|
page read and write
|
||
2531000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
4C50000
|
heap private
|
page read and write
|
||
4660000
|
unkown
|
page readonly
|
||
CE0000
|
unkown image
|
page readonly
|
||
3529000
|
unkown
|
page read and write
|
||
20BE000
|
unkown
|
page read and write
|
||
B8D000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page read and write
|
||
1EE000
|
unkown
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
65E000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
620000
|
unkown
|
page read and write
|
||
545F000
|
stack
|
page read and write
|
||
382C000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
193000
|
unkown
|
page execute and read and write
|
||
5050000
|
heap private
|
page read and write
|
||
230000
|
unkown
|
page read and write
|
||
650000
|
unkown
|
page read and write
|
||
5B0000
|
heap private
|
page execute and read and write
|
||
4F7B000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page read and write
|
||
9A000
|
unkown
|
page read and write
|
||
49AE000
|
unkown
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
740000
|
unkown
|
page readonly
|
||
8A0000
|
unkown
|
page readonly
|
||
9B4000
|
heap default
|
page read and write
|
||
6C1F000
|
unkown
|
page read and write
|
||
4C6000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
24FF000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
343000
|
unkown
|
page execute and read and write
|
||
1EF000
|
unkown
|
page read and write
|
||
A0E000
|
unkown
|
page read and write
|
||
5F70000
|
heap private
|
page read and write
|
||
450F000
|
stack
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
11B000
|
unkown
|
page execute and read and write
|
||
560000
|
unkown
|
page read and write
|
||
B0000
|
heap default
|
page read and write
|
||
23EC000
|
unkown
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
4D92000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
6810000
|
unkown
|
page read and write
|
||
C0000
|
unkown
|
page readonly
|
||
BB7000
|
heap private
|
page read and write
|
||
39D000
|
unkown
|
page execute and read and write
|
||
4BB0000
|
heap private
|
page read and write
|
||
27BC000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
590000
|
heap default
|
page read and write
|
||
1FF000
|
unkown
|
page read and write
|
||
3B0000
|
heap default
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
656000
|
unkown
|
page read and write
|
||
A10000
|
unkown
|
page read and write
|
||
630000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
A4000
|
unkown
|
page read and write
|
||
5B4000
|
heap default
|
page read and write
|
||
4CE0000
|
unkown
|
page readonly
|
||
3471000
|
unkown
|
page read and write
|
||
3501000
|
unkown
|
page read and write
|
||
BCE000
|
unkown
|
page read and write
|
||
A20000
|
unkown
|
page read and write
|
||
5DF000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
BC000
|
unkown
|
page read and write
|
||
13D000
|
unkown
|
page execute and read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
59E000
|
unkown
|
page read and write
|
||
650000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
1AA000
|
unkown
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
4A00000
|
unkown
|
page read and write
|
||
5F74000
|
heap private
|
page read and write
|
||
4CDE000
|
stack
|
page read and write
|
||
29BC000
|
unkown
|
page read and write
|
||
34D000
|
unkown
|
page execute and read and write
|
||
80000
|
unkown
|
page readonly
|
||
700000
|
heap private
|
page read and write
|
||
5760000
|
unkown
|
page readonly
|
||
4BB4000
|
heap private
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
62D0000
|
heap private
|
page execute and read and write
|
||
540000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
9C7000
|
unkown
|
page readonly
|
||
4F6000
|
heap default
|
page read and write
|
||
252E000
|
unkown
|
page read and write | page guard
|
||
245000
|
unkown
|
page read and write
|
||
54F2000
|
unkown
|
page read and write
|
||
327000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page read and write
|
||
9D0000
|
unkown
|
page readonly
|
||
700000
|
heap private
|
page execute and read and write
|
||
340000
|
unkown
|
page readonly
|
||
697E000
|
stack
|
page read and write
|
||
2A7000
|
unkown
|
page execute and read and write
|
||
7C0000
|
heap default
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
4D4000
|
heap private
|
page read and write
|
||
5C2000
|
unkown
|
page read and write
|
||
1F7000
|
unkown
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
69B0000
|
unkown
|
page read and write
|
||
81C000
|
unkown
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
990000
|
heap default
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page readonly
|
||
760000
|
unkown
|
page read and write
|
||
3B6000
|
unkown
|
page read and write
|
||
B6E000
|
unkown
|
page read and write
|
||
4C54000
|
heap private
|
page read and write
|
||
32E1000
|
unkown
|
page read and write
|
||
96E000
|
unkown
|
page read and write
|
||
346000
|
stack
|
page read and write
|
||
4C0000
|
heap default
|
page read and write
|
||
5CB0000
|
unkown
|
page read and write
|
||
5FF000
|
heap default
|
page read and write
|
||
800000
|
unkown
|
page execute and read and write
|
||
900000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
6120000
|
unkown
|
page read and write
|
||
B40000
|
unkown
|
page read and write
|
||
14B000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
3606000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
27BE000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
997000
|
heap default
|
page read and write
|
||
544000
|
heap default
|
page read and write
|
||
C7000
|
unkown
|
page execute and read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
650000
|
unkown
|
page read and write
|
||
6980000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
544000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
258000
|
heap private
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
630000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
4EF000
|
unkown
|
page read and write
|
||
177000
|
unkown
|
page execute and read and write
|
||
B40000
|
unkown
|
page read and write
|
||
9C0000
|
heap private
|
page read and write
|
||
201000
|
unkown
|
page read and write
|
||
515000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
63F0000
|
unkown
|
page readonly
|
||
150000
|
unkown image
|
page readonly
|
||
3E0000
|
unkown
|
page readonly
|
||
194000
|
unkown
|
page read and write
|
||
650000
|
unkown
|
page read and write
|
||
2BC5000
|
unkown
|
page read and write
|
||
6760000
|
unkown
|
page read and write
|
||
CE2000
|
unkown image
|
page execute read
|
||
60A0000
|
heap private
|
page read and write
|
||
AA0000
|
unkown
|
page readonly
|
||
CE2000
|
unkown image
|
page execute read
|
||
1DC000
|
unkown
|
page read and write
|
||
4F60000
|
unkown
|
page write copy
|
||
250000
|
unkown
|
page execute and read and write
|
||
648000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page read and write
|
||
6A2000
|
unkown
|
page read and write
|
||
8A7000
|
heap default
|
page read and write
|
||
21E0000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
2A7C000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
29B8000
|
unkown
|
page read and write
|
||
260000
|
heap private
|
page read and write
|
||
4BFE000
|
unkown
|
page read and write
|
||
1F20000
|
unkown
|
page readonly
|
||
4B0000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
3C0000
|
heap default
|
page read and write
|
||
620000
|
heap default
|
page read and write
|
||
16D000
|
unkown
|
page execute and read and write
|
||
1F3000
|
unkown
|
page read and write
|
||
4FBF000
|
unkown
|
page read and write
|
||
520000
|
heap default
|
page read and write
|
||
A0000
|
heap default
|
page read and write
|
||
124000
|
heap private
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
480000
|
unkown
|
page readonly
|
||
4FC1000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
575C000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
B30000
|
heap private
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
97E000
|
unkown
|
page read and write
|
||
A60000
|
heap private
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
52F1000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
CE2000
|
unkown image
|
page execute read
|
||
154000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
556C000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
520000
|
heap default
|
page read and write
|
||
370000
|
heap private
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page execute and read and write
|
||
A0000
|
heap private
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page readonly
|
||
65A000
|
unkown
|
page read and write
|
||
6BD0000
|
unkown
|
page read and write
|
||
707000
|
heap private
|
page read and write
|
||
8BE000
|
unkown
|
page execute and read and write
|
||
220000
|
unkown
|
page read and write
|
||
4780000
|
unkown
|
page readonly
|
||
6EE000
|
unkown
|
page read and write
|
||
9A0000
|
unkown
|
page readonly
|
||
650000
|
unkown
|
page read and write
|
||
134000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
4D91000
|
unkown
|
page read and write
|
||
447000
|
heap default
|
page read and write
|
||
B50000
|
unkown
|
page read and write
|
||
152000
|
unkown image
|
page execute read
|
||
133000
|
unkown
|
page execute and read and write
|
||
4066000
|
unkown
|
page read and write
|
||
9DE000
|
heap default
|
page read and write
|
||
5C5000
|
unkown
|
page read and write
|
||
22D0000
|
unkown
|
page readonly
|
||
760000
|
unkown
|
page read and write
|
||
52EF000
|
unkown
|
page read and write
|
||
650000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
252F000
|
unkown
|
page read and write
|
||
930000
|
unkown
|
page readonly
|
||
43CE000
|
unkown
|
page read and write
|
||
675D000
|
unkown
|
page read and write
|
||
4910000
|
heap private
|
page read and write
|
||
268000
|
heap private
|
page read and write
|
||
8A0000
|
heap default
|
page read and write
|
||
4B30000
|
heap private
|
page read and write
|
||
1F2000
|
unkown
|
page read and write
|
||
1F1000
|
unkown
|
page read and write
|
||
626000
|
unkown
|
page read and write
|
||
780000
|
heap default
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
4B8000
|
unkown
|
page read and write
|
||
4914000
|
heap private
|
page read and write
|
||
4F1E000
|
unkown
|
page read and write
|
||
145000
|
unkown
|
page read and write
|
||
CE0000
|
unkown image
|
page readonly
|
||
528E000
|
unkown
|
page read and write | page guard
|
||
5311000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
297D000
|
unkown
|
page read and write
|
||
460000
|
heap default
|
page read and write
|
||
450000
|
unkown
|
page execute and read and write
|
||
657E000
|
unkown
|
page read and write
|
||
630000
|
unkown
|
page read and write
|
||
BB0000
|
heap private
|
page read and write
|
||
1EC000
|
unkown
|
page read and write
|
||
960000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
64BE000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
3FE000
|
heap default
|
page read and write
|
||
7CC000
|
heap default
|
page read and write
|
||
B0000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
6310000
|
unkown
|
page readonly
|
||
4B0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
610000
|
unkown
|
page readonly
|
||
280000
|
unkown
|
page read and write
|
||
5DA0000
|
unkown
|
page read and write
|
||
4ACF000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
1F9000
|
unkown
|
page read and write
|
||
69B0000
|
unkown
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
520000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
253F000
|
unkown
|
page read and write
|
||
70000
|
unkown
|
page readonly
|
||
B0D000
|
unkown
|
page read and write
|
||
62EE000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
1C6000
|
heap default
|
page read and write
|
||
6AFE000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
400000
|
heap private
|
page execute and read and write
|
||
240000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
4D2F000
|
stack
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
560C000
|
unkown
|
page read and write
|
||
B40000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page read and write
|
||
A10000
|
unkown
|
page readonly
|
||
150000
|
unkown image
|
page readonly
|
||
920000
|
unkown
|
page read and write
|
||
7A0000
|
unkown
|
page readonly
|
||
660000
|
unkown
|
page readonly
|
||
925000
|
unkown
|
page read and write
|
||
23F0000
|
unkown
|
page readonly
|
||
9D0000
|
unkown
|
page readonly
|
||
246E000
|
unkown
|
page read and write | page guard
|
||
615000
|
heap default
|
page read and write
|
||
560000
|
heap default
|
page read and write
|
||
19A000
|
unkown
|
page execute and read and write
|
||
470000
|
unkown
|
page read and write
|
||
51DE000
|
unkown
|
page read and write
|
||
4932000
|
heap private
|
page read and write
|
||
370000
|
heap private
|
page read and write
|
||
690000
|
unkown
|
page readonly
|
||
8E0000
|
unkown
|
page read and write
|
||
316000
|
unkown
|
page execute and read and write
|
||
4B6000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
CE0000
|
unkown image
|
page readonly
|
||
5C0000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page execute and read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
4530000
|
unkown
|
page readonly
|
||
1F2000
|
unkown
|
page read and write
|
||
2411000
|
unkown
|
page read and write
|
||
4F0000
|
heap private
|
page execute and read and write
|
||
1F2000
|
unkown
|
page read and write
|
||
BEE000
|
unkown
|
page read and write
|
||
464E000
|
unkown
|
page read and write
|
||
29E0000
|
unkown
|
page read and write
|
||
2E0000
|
heap private
|
page read and write
|
||
B10000
|
unkown
|
page read and write
|
||
4D0000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
152000
|
unkown image
|
page execute read
|
||
4C0000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
1E7000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
C20000
|
unkown
|
page read and write
|
||
1E30000
|
unkown
|
page readonly
|
||
920000
|
unkown
|
page read and write
|
||
27AE000
|
unkown
|
page read and write
|
||
D00000
|
unkown
|
page readonly
|
||
69A0000
|
unkown
|
page read and write
|
||
69E000
|
unkown
|
page read and write
|
||
3A5000
|
heap default
|
page read and write
|
||
528F000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
23EE000
|
unkown
|
page read and write
|
||
B20000
|
unkown
|
page read and write
|
||
1EE0000
|
heap private
|
page read and write
|
||
1EA000
|
unkown
|
page read and write
|
||
1F2000
|
unkown
|
page read and write
|
||
B40000
|
unkown
|
page read and write
|
||
320000
|
heap default
|
page read and write
|
||
205000
|
unkown
|
page read and write
|
||
295C000
|
unkown
|
page read and write
|
||
290000
|
heap default
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
770000
|
heap default
|
page read and write
|
||
60C0000
|
unkown
|
page read and write
|
||
480000
|
unkown
|
page execute and read and write
|
||
570000
|
unkown
|
page readonly
|
||
613E000
|
unkown
|
page read and write
|
||
CE0000
|
unkown image
|
page readonly
|
||
2014000
|
heap private
|
page read and write
|
||
5C0000
|
heap private
|
page read and write
|
||
18B000
|
unkown
|
page execute and read and write
|
||
980000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page execute and read and write
|
||
655000
|
unkown
|
page read and write
|
||
956000
|
heap default
|
page read and write
|
||
3606000
|
unkown
|
page read and write
|
||
635000
|
unkown
|
page read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
4CB0000
|
unkown
|
page readonly
|
||
240000
|
unkown
|
page readonly
|
||
7E9000
|
heap default
|
page read and write
|
||
8E0000
|
heap default
|
page read and write
|
||
4E4F000
|
stack
|
page read and write
|
||
48BF000
|
unkown
|
page read and write
|
||
24FE000
|
unkown
|
page read and write | page guard
|
||
5C0000
|
unkown
|
page read and write
|
||
725000
|
heap private
|
page read and write
|
||
322000
|
unkown
|
page read and write
|
||
3A3000
|
heap default
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
4FE1000
|
unkown
|
page read and write
|
||
990000
|
unkown
|
page readonly
|
||
480000
|
unkown
|
page readonly
|
||
3D0000
|
unkown
|
page read and write
|
||
650000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
630000
|
unkown
|
page read and write
|
||
427000
|
heap default
|
page read and write
|
||
CE2000
|
unkown image
|
page execute read
|
||
AA0000
|
unkown
|
page readonly
|
||
470000
|
heap private
|
page execute and read and write
|
||
CE0000
|
unkown image
|
page readonly
|
||
462E000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
56C000
|
heap default
|
page read and write
|
||
4D1000
|
heap default
|
page read and write
|
||
650000
|
unkown
|
page read and write
|
||
23D0000
|
heap private
|
page execute and read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
117000
|
unkown
|
page execute and read and write
|
||
8E2000
|
unkown
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
91E000
|
unkown
|
page execute and read and write
|
||
3531000
|
unkown
|
page read and write
|
||
4D91000
|
unkown
|
page read and write
|
||
BF0000
|
unkown
|
page readonly
|
||
110000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
48C0000
|
unkown
|
page readonly
|
||
250000
|
heap private
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
4CDD000
|
unkown
|
page read and write
|
||
650000
|
unkown
|
page read and write
|
||
8D0000
|
unkown
|
page execute and read and write
|
||
192000
|
unkown
|
page read and write
|
||
50D0000
|
heap private
|
page read and write
|
||
380000
|
heap default
|
page read and write
|
||
358000
|
unkown
|
page read and write
|
||
6B00000
|
unkown
|
page read and write
|
||
6BD0000
|
unkown
|
page read and write
|
||
6EF0000
|
unkown
|
page read and write
|
||
CE0000
|
unkown image
|
page readonly
|
||
5F1000
|
heap default
|
page read and write
|
||
490000
|
unkown
|
page readonly
|
||
5EE000
|
unkown
|
page read and write
|
||
5CAC000
|
unkown
|
page read and write
|
||
246F000
|
unkown
|
page read and write
|
||
527000
|
heap default
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
236E000
|
unkown
|
page read and write | page guard
|
||
1DF000
|
unkown
|
page read and write
|
||
1A0000
|
heap private
|
page read and write
|
||
535E000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
4F91000
|
unkown
|
page read and write
|
||
5E0000
|
heap private
|
page execute and read and write
|
||
240000
|
unkown
|
page read and write
|
||
910000
|
unkown
|
page readonly
|
||
7F0000
|
unkown
|
page readonly
|
||
5C0000
|
unkown
|
page read and write
|
||
DD000
|
unkown
|
page read and write
|
||
B40000
|
unkown
|
page read and write
|
||
7D6000
|
heap default
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
B52000
|
unkown
|
page read and write
|
||
3AA000
|
unkown
|
page execute and read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
2A98000
|
unkown
|
page read and write
|
There are 916 hidden memdumps, click here to show them.