Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Pending Orders Statement -40064778.doc
|
Rich Text Format data, version 1, unknown character set
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\boobov[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
downloaded
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 59134 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{2658F6C0-C679-4D43-96D3-E7E6CC77C67B}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D19B7C91-551E-40AF-9919-E039C2A6E74E}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Cab232D.tmp
|
Microsoft Cabinet archive data, 59134 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tar232E.tmp
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Pending Orders Statement -40064778.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15
2020, mtime=Wed Aug 26 14:08:15 2020, atime=Thu Jan 28 02:29:36 2021, length=354788, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\Desktop\~$nding Orders Statement -40064778.doc
|
data
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://cy.kl-re.com//power/bo/boobov.exe
|
172.111.202.41
|
||
https://xWUrFiDn0aBmFXBFM.net
|
|||
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
|
unknown
|
||
http://127.0.0.1:HTTP/1.1
|
unknown
|
||
http://DynDns.comDynDNS
|
unknown
|
||
http://crl.oces.certifikat.dk/oces.crl0
|
unknown
|
||
http://fedir.comsign.co.il/crl/ComSignCA.crl0
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://crl.chambersign.org/chambersroot.crl0
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
http://ca.sia.it/seccli/repository/CRL.der0J
|
unknown
|
||
http://www.certicamara.com/dpc/0Z
|
unknown
|
||
http://www.digsigtrust.com/DST_TRUST_CPS_v990701.html0
|
unknown
|
||
http://cps.chambersign.org/cps/chambersroot.html0
|
unknown
|
||
http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAI.cr
|
unknown
|
||
http://www.chambersign.org1
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
https://ca.sia.it/seccli/repository/CPS/
|
unknown
|
||
http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
|
unknown
|
||
http://mail.privateemail.com
|
unknown
|
||
http://crl.chambersign.org/publicnotaryroot.crl0
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://www.sk.ee/juur/crl/0
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl0
|
unknown
|
||
http://www.e-certchile.cl/html/productos/download/CPSv1
|
unknown
|
||
http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
|
unknown
|
||
http://193.239.147.103/base/9158412CBF14FB744AFA9F0D01F6CDF2.html
|
193.239.147.103
|
||
http://duylfM.com
|
unknown
|
||
http://www.sk.ee/cps/0
|
unknown
|
||
http://www.valicert.com/1
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://193.239.147.103
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://www.wellsfargo.com/certpolicy0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
|
unknown
|
||
http://servername/isapibackend.dll
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
http://www.comsign.co.il/cps0
|
unknown
|
||
http://cps.chambersign.org/cps/publicnotaryroot.html0
|
unknown
|
There are 36 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cybersng.duckdns.org
|
172.111.202.41
|
||
mail.privateemail.com
|
198.54.122.60
|
||
cy.kl-re.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
172.111.202.41
|
unknown
|
United States
|
unknown
|
||
193.239.147.103
|
unknown
|
Brunei Darussalam
|
unknown
|
||
198.54.122.60
|
unknown
|
United States
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
4<7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
==7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
$>7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ED6EE
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F454A
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F454A
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
SavedLegacySettings
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
EnableFileTracing
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
EnableConsoleTracing
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
FileTracingMask
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
ConsoleTracingMask
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
MaxFileSize
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
FileDirectory
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
EnableFileTracing
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
EnableConsoleTracing
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
FileTracingMask
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
ConsoleTracingMask
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
MaxFileSize
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
FileDirectory
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\poiuytrewsdfghjklmnbvcx.exe
|
Blob
|
There are 335 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2631000
|
unkown
|
page read and write
|
||
3C6A000
|
unkown
|
page read and write
|
||
2A53000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
26EE000
|
unkown
|
page read and write
|
||
2A84000
|
unkown
|
page read and write
|
||
C2F000
|
unkown
|
page read and write
|
||
6B82000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
26E6000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
7510000
|
unkown
|
page read and write
|
||
78D000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
2889000
|
unkown
|
page read and write
|
||
4A62000
|
heap private
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
64CD000
|
unkown
|
page read and write
|
||
3EB000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
649C000
|
unkown
|
page read and write
|
||
D1C000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
477000
|
unkown
|
page read and write
|
||
497000
|
unkown
|
page read and write
|
||
FE0000
|
heap private
|
page execute and read and write
|
||
490000
|
unkown
|
page read and write
|
||
121E000
|
unkown image
|
page readonly
|
||
3E5000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page readonly
|
||
121E000
|
unkown image
|
page readonly
|
||
720000
|
unkown
|
page readonly
|
||
610000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
546A000
|
unkown
|
page read and write
|
||
497000
|
unkown
|
page read and write
|
||
615000
|
unkown
|
page read and write
|
||
910000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
3719000
|
unkown
|
page read and write
|
||
7A0000
|
unkown
|
page read and write
|
||
146000
|
unkown
|
page execute and read and write
|
||
610000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
7A0000
|
unkown
|
page read and write
|
||
91A000
|
unkown
|
page read and write
|
||
4D5000
|
unkown
|
page read and write
|
||
6990000
|
unkown
|
page read and write
|
||
7A0000
|
unkown
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
7A0000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
545E000
|
unkown
|
page read and write
|
||
697000
|
heap default
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
CB4000
|
unkown
|
page read and write
|
||
5C50000
|
unkown
|
page readonly
|
||
3E5000
|
unkown
|
page read and write
|
||
2686000
|
unkown
|
page read and write
|
||
121E000
|
unkown image
|
page readonly
|
||
572D000
|
unkown
|
page read and write
|
||
2692000
|
unkown
|
page read and write
|
||
592E000
|
unkown
|
page read and write
|
||
26AD000
|
unkown
|
page read and write
|
||
549E000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
990000
|
unkown
|
page readonly
|
||
4B0000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
5AB0000
|
unkown
|
page read and write
|
||
64AC000
|
unkown
|
page read and write
|
||
48E000
|
unkown
|
page read and write
|
||
79D000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
615000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
11E2000
|
unkown image
|
page execute read
|
||
11E0000
|
unkown image
|
page readonly
|
||
497000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
CC0000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
497000
|
unkown
|
page read and write
|
||
615000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
2B15000
|
unkown
|
page read and write
|
||
37D9000
|
unkown
|
page read and write
|
||
7F0000
|
heap private
|
page read and write
|
||
810000
|
unkown
|
page read and write
|
||
36D9000
|
unkown
|
page read and write
|
||
3819000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
E30000
|
heap private
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
4C1E000
|
unkown
|
page read and write
|
||
5FDE000
|
stack
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
76A000
|
heap default
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
56EC000
|
unkown
|
page read and write
|
||
7552000
|
unkown
|
page read and write
|
||
27AA000
|
unkown
|
page read and write
|
||
56C0000
|
unkown
|
page readonly
|
||
910000
|
unkown
|
page read and write
|
||
497000
|
unkown
|
page read and write
|
||
2B0D000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
6445000
|
unkown
|
page read and write
|
||
548A000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
7A10000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
4C60000
|
heap private
|
page read and write
|
||
5AB0000
|
unkown
|
page read and write
|
||
6498000
|
unkown
|
page read and write
|
||
272B000
|
unkown
|
page read and write
|
||
124000
|
unkown
|
page read and write
|
||
11E0000
|
unkown image
|
page readonly
|
||
1FE000
|
unkown
|
page read and write
|
||
121E000
|
unkown image
|
page readonly
|
||
7A0000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page execute and read and write
|
||
6B4000
|
heap default
|
page read and write
|
||
65C0000
|
heap private
|
page read and write
|
||
CC0000
|
unkown
|
page read and write
|
||
3699000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
430000
|
heap private
|
page read and write
|
||
5120000
|
heap private
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
13D000
|
unkown
|
page execute and read and write
|
||
420000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
8426000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
3E8000
|
unkown
|
page read and write
|
||
7A0000
|
unkown
|
page read and write
|
||
770000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
7A0000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
613000
|
unkown
|
page read and write
|
||
292C000
|
unkown
|
page read and write
|
||
64B1000
|
unkown
|
page read and write
|
||
2727000
|
unkown
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
3E8000
|
unkown
|
page read and write
|
||
288E000
|
unkown
|
page read and write
|
||
4A0000
|
heap private
|
page read and write
|
||
37F9000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
83DA000
|
unkown
|
page read and write
|
||
3631000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
FBE000
|
unkown
|
page read and write
|
||
56BE000
|
stack
|
page read and write
|
||
4A40000
|
heap private
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
2B13000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
547F000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
118F000
|
unkown
|
page read and write
|
||
5098000
|
heap private
|
page read and write
|
||
5AB0000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
875D000
|
unkown
|
page read and write
|
||
930000
|
unkown
|
page read and write
|
||
CB0000
|
unkown
|
page read and write
|
||
83FE000
|
unkown
|
page read and write
|
||
B9E000
|
unkown
|
page read and write
|
||
2B3F000
|
unkown
|
page read and write
|
||
2895000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
152000
|
unkown
|
page read and write
|
||
4C0000
|
heap default
|
page read and write
|
||
5AB0000
|
unkown
|
page read and write
|
||
652E000
|
unkown
|
page read and write
|
||
620B000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
230000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
683C000
|
unkown
|
page read and write
|
||
8391000
|
unkown
|
page read and write
|
||
6493000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
5489000
|
unkown
|
page read and write
|
||
A560000
|
unkown
|
page read and write
|
||
615000
|
unkown
|
page read and write
|
||
7F7000
|
heap private
|
page read and write
|
||
3D51000
|
unkown
|
page read and write
|
||
8760000
|
unkown
|
page read and write
|
||
698E000
|
unkown
|
page read and write
|
||
368000
|
stack
|
page read and write
|
||
5499000
|
unkown
|
page read and write
|
||
910000
|
unkown
|
page read and write
|
||
615000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
CE0000
|
unkown
|
page write copy
|
||
36B9000
|
unkown
|
page read and write
|
||
64B1000
|
unkown
|
page read and write
|
||
3BF2000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
2B0F000
|
unkown
|
page read and write
|
||
F6E000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
268E000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
B1E0000
|
unkown
|
page read and write
|
||
800000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
800000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
615000
|
unkown
|
page read and write
|
||
3659000
|
unkown
|
page read and write
|
||
5AB0000
|
unkown
|
page read and write
|
||
4C8B000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
66D0000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
930000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
615000
|
unkown
|
page read and write
|
||
610000
|
heap private
|
page read and write
|
||
810000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
15B000
|
unkown
|
page execute and read and write
|
||
611000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
580000
|
unkown
|
page execute and read and write
|
||
64A9000
|
unkown
|
page read and write
|
||
549B000
|
unkown
|
page read and write
|
||
615000
|
unkown
|
page read and write
|
||
11E2000
|
unkown image
|
page execute read
|
||
610000
|
unkown
|
page read and write
|
||
14A000
|
unkown
|
page execute and read and write
|
||
260000
|
unkown
|
page readonly
|
||
497000
|
unkown
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
644000
|
heap default
|
page read and write
|
||
121E000
|
unkown image
|
page readonly
|
||
611000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
CB0000
|
unkown
|
page read and write
|
||
36F9000
|
unkown
|
page read and write
|
||
11E0000
|
unkown image
|
page readonly
|
||
490000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
4FC0000
|
unkown
|
page write copy
|
||
79C2000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
8426000
|
unkown
|
page read and write
|
||
910000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
910000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
11E0000
|
unkown image
|
page readonly
|
||
497000
|
unkown
|
page read and write
|
||
497000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
4AEF000
|
stack
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
FB0000
|
heap private
|
page read and write
|
||
6495000
|
unkown
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
11E2000
|
unkown image
|
page execute read
|
||
CE70000
|
unkown
|
page read and write
|
||
5090000
|
heap private
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
AF60000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
2683000
|
unkown
|
page read and write
|
||
3631000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
65CB000
|
heap private
|
page read and write
|
||
515E000
|
unkown
|
page read and write | page guard
|
||
813000
|
unkown
|
page read and write
|
||
14A000
|
unkown
|
page execute and read and write
|
||
11E0000
|
unkown image
|
page readonly
|
||
940000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
940000
|
unkown
|
page read and write
|
||
2656000
|
unkown
|
page read and write
|
||
12D000
|
unkown
|
page execute and read and write
|
||
4A44000
|
heap private
|
page read and write
|
||
5F5000
|
unkown
|
page read and write
|
||
4CD000
|
unkown
|
page read and write
|
||
5AB0000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
378000
|
unkown
|
page read and write
|
||
9B60000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page read and write
|
||
BDD000
|
unkown
|
page read and write
|
||
114E000
|
unkown
|
page read and write
|
||
576C000
|
unkown
|
page read and write
|
||
108C000
|
unkown
|
page read and write
|
||
616000
|
unkown
|
page read and write
|
||
3637000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
C9E000
|
unkown
|
page read and write
|
||
150000
|
heap private
|
page execute and read and write
|
||
74D0000
|
heap private
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
7A1000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
5DE000
|
unkown
|
page read and write
|
||
3639000
|
unkown
|
page read and write
|
||
790000
|
unkown
|
page read and write
|
||
525D000
|
unkown
|
page read and write
|
||
7510000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
123000
|
unkown
|
page execute and read and write
|
||
490000
|
unkown
|
page read and write
|
||
549E000
|
unkown
|
page read and write
|
||
515F000
|
unkown
|
page read and write
|
||
C970000
|
unkown
|
page read and write
|
||
910000
|
unkown
|
page read and write
|
||
66D000
|
heap default
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
26EA000
|
unkown
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
800000
|
unkown
|
page readonly
|
||
3E5000
|
unkown
|
page read and write
|
||
620000
|
heap default
|
page read and write
|
||
276D000
|
unkown
|
page read and write
|
||
54E0000
|
heap private
|
page execute and read and write
|
||
4CE0000
|
unkown
|
page readonly
|
||
910000
|
unkown
|
page read and write
|
||
615000
|
unkown
|
page read and write
|
||
649C000
|
unkown
|
page read and write
|
||
4C65000
|
heap private
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
267E000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
11E2000
|
unkown image
|
page execute read
|
||
612000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
820000
|
heap private
|
page read and write
|
||
63F0000
|
unkown
|
page read and write
|
||
4BAF000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
497000
|
unkown
|
page read and write
|
||
5AB0000
|
unkown
|
page read and write
|
||
3739000
|
unkown
|
page read and write
|
||
6F3000
|
heap default
|
page read and write
|
||
624D000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
495E000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
930000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
910000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
7A0000
|
unkown
|
page read and write
|
||
5463000
|
unkown
|
page read and write
|
||
810000
|
unkown
|
page read and write
|
||
4C60000
|
unkown
|
page readonly
|
||
790000
|
unkown
|
page readonly
|
||
3E5000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
497000
|
unkown
|
page read and write
|
||
6DC000
|
heap default
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
284B000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
910000
|
unkown
|
page read and write
|
||
147000
|
unkown
|
page execute and read and write
|
||
EAF000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
3779000
|
unkown
|
page read and write
|
||
497000
|
unkown
|
page read and write
|
||
121E000
|
unkown image
|
page readonly
|
||
3E0000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
11E2000
|
unkown image
|
page execute read
|
||
497000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
950000
|
heap private
|
page execute and read and write
|
||
CA0000
|
heap private
|
page execute and read and write
|
||
815000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
5460000
|
unkown
|
page read and write
|
||
6498000
|
unkown
|
page read and write
|
||
2735000
|
unkown
|
page read and write
|
||
5260000
|
unkown
|
page read and write
|
||
64CD000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
480000
|
heap private
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
615000
|
unkown
|
page read and write
|
||
87A2000
|
unkown
|
page read and write
|
||
4C82000
|
heap private
|
page read and write
|
||
327000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
487000
|
heap private
|
page read and write
|
||
71C0000
|
heap private
|
page read and write
|
||
19B000
|
unkown
|
page execute and read and write
|
||
4C5E000
|
stack
|
page read and write
|
||
74A000
|
heap default
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
8424000
|
unkown
|
page read and write
|
||
800000
|
unkown
|
page read and write
|
||
804C000
|
unkown
|
page read and write
|
||
910000
|
unkown
|
page readonly
|
||
5490000
|
unkown
|
page read and write
|
||
4C5C000
|
unkown
|
page read and write
|
||
497000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
4630000
|
unkown
|
page readonly
|
||
5F0000
|
unkown
|
page read and write
|
||
615000
|
unkown
|
page read and write
|
||
660000
|
heap default
|
page read and write
|
||
123000
|
unkown
|
page execute and read and write
|
||
610000
|
unkown
|
page read and write
|
||
11E0000
|
unkown image
|
page readonly
|
||
155000
|
unkown
|
page execute and read and write
|
||
828000
|
heap private
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
2696000
|
unkown
|
page read and write
|
||
3759000
|
unkown
|
page read and write
|
||
124000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
936000
|
unkown
|
page read and write
|
||
66CE000
|
unkown
|
page read and write
|
||
4CA0000
|
heap private
|
page execute and read and write
|
||
AEE000
|
unkown
|
page read and write
|
||
272D000
|
unkown
|
page read and write
|
||
5AB0000
|
unkown
|
page read and write
|
||
64A9000
|
unkown
|
page read and write
|
||
627000
|
heap default
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
914000
|
unkown
|
page read and write
|
||
BBE0000
|
unkown
|
page read and write
|
||
5260000
|
unkown
|
page read and write
|
||
549A000
|
unkown
|
page read and write
|
||
615000
|
unkown
|
page read and write
|
||
21C000
|
unkown
|
page read and write
|
||
E42000
|
heap private
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
736000
|
heap default
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page read and write
|
||
497000
|
unkown
|
page read and write
|
||
497000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
615000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
659E000
|
unkown
|
page read and write
|
||
615000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
29C4000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
11E0000
|
unkown image
|
page readonly
|
||
26AB000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
615000
|
unkown
|
page read and write
|
||
92B000
|
unkown
|
page read and write
|
||
619000
|
unkown
|
page read and write
|
||
546F000
|
stack
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
6D0000
|
heap default
|
page read and write
|
||
713E000
|
unkown
|
page read and write
|
||
12D000
|
unkown
|
page execute and read and write
|
||
5476000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
548E000
|
unkown
|
page read and write
|
||
570000
|
unkown
|
page read and write
|
||
612000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
157000
|
unkown
|
page execute and read and write
|
||
648E000
|
unkown
|
page read and write
|
||
B1DE000
|
unkown
|
page read and write
|
||
338000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
5DE000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
790000
|
unkown
|
page read and write
|
||
2885000
|
unkown
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
3799000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page read and write
|
||
5499000
|
unkown
|
page read and write
|
||
9160000
|
unkown
|
page read and write
|
||
738E000
|
unkown
|
page read and write
|
||
5AB0000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
3679000
|
unkown
|
page read and write
|
||
4A1E000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
C96D000
|
unkown
|
page read and write
|
||
4F0000
|
heap default
|
page read and write
|
||
4630000
|
unkown
|
page readonly
|
||
F3E000
|
unkown
|
page read and write
|
||
649C000
|
unkown
|
page read and write
|
||
64A0000
|
unkown
|
page read and write
|
||
497000
|
unkown
|
page read and write
|
||
83DA000
|
unkown
|
page read and write
|
||
8090000
|
unkown
|
page readonly
|
||
610000
|
unkown
|
page read and write
|
||
548F000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
197000
|
unkown
|
page execute and read and write
|
||
4C9D000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
50B6000
|
heap private
|
page read and write
|
||
790000
|
unkown
|
page execute and read and write
|
||
497000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
6E0000
|
heap default
|
page read and write
|
||
6493000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
4C88000
|
unkown
|
page read and write
|
||
60AD000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
690000
|
heap default
|
page read and write
|
||
EAE000
|
unkown
|
page read and write | page guard
|
||
5E0000
|
unkown
|
page read and write
|
||
3E5000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
8426000
|
unkown
|
page read and write
|
||
37B9000
|
unkown
|
page read and write
|
||
70D000
|
heap default
|
page read and write
|
||
D6E000
|
unkown
|
page read and write
|
||
13A000
|
unkown
|
page read and write
|
||
11E0000
|
unkown image
|
page readonly
|
||
4C89000
|
unkown
|
page read and write
|
||
5C4C000
|
unkown
|
page read and write
|
||
497000
|
unkown
|
page read and write
|
||
8760000
|
unkown
|
page read and write
|
||
5A5E000
|
unkown
|
page read and write
|
||
3839000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
6712000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page readonly
|
||
63ED000
|
unkown
|
page read and write
|
||
11E2000
|
unkown image
|
page execute read
|
||
610000
|
unkown
|
page read and write
|
||
64CF000
|
unkown
|
page read and write
|
||
5F2000
|
unkown
|
page read and write
|
||
612000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
4D0000
|
unkown
|
page read and write
|
||
142000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
5AB0000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
497000
|
unkown
|
page read and write
|
||
2631000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
58DC000
|
unkown
|
page read and write
|
||
8C12000
|
unkown
|
page read and write
|
||
497000
|
unkown
|
page read and write
|
||
DF0000
|
heap private
|
page read and write
|
||
587E000
|
unkown
|
page read and write
|
||
6495000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
2A81000
|
unkown
|
page read and write
|
||
11E0000
|
unkown image
|
page readonly
|
||
5AB0000
|
unkown
|
page read and write
|
||
2B17000
|
unkown
|
page read and write
|
||
230000
|
unkown
|
page read and write
|
||
7390000
|
unkown
|
page read and write
|
||
495000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
132000
|
unkown
|
page read and write
|
||
7EE000
|
unkown
|
page read and write
|
||
6498000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
64CD000
|
unkown
|
page read and write
|
||
567F000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
527D000
|
unkown
|
page read and write
|
||
19A000
|
unkown
|
page read and write
|
There are 624 hidden memdumps, click here to show them.